in python:
The mode of a list of numbers is the number listed most often. The median of a list of numbers is the value in the middle of the list if the list is arranged in order. For this software solution you will do the following:

Take 10 numbers as input from the user and display the number with the highest mode. If there is a tie, you will need to show all of those numbers.
Your program must create a user-defined function that takes an array of numbers as a parameter and returns the value that appears the most often in the array.
For those same 10 numbers your program must create a user-defined function that takes an array of numbers as a parameter and returns the value which is the median for those numbers.

please help!

Answers

Answer 1

Python can be used to implement central of tendencies such as mean, median and mode using the statistic module

The program in Python, where comments are used to explain each line is as follows:

#This imports the statistics module

import statistics

#This defines the function that calculates the mode

def calcMode(myList):

   #This prints the mode

   print(statistics.multimode(myList))

#This defines the function that calculates the median

def calcMedian(myList):

   #This prints the median

   print(statistics.median(myList))

#The main method begins here

#This initializes the list

myList = []

#The following iteration gets input for the list

for i in range(10):

   myList.append(int(input()))

#This calls the calcMode method

calcMode(myList)

#This calls the calcMedian method

calcMedian(myList)

Read more about similar programs at:

https://brainly.com/question/25026386


Related Questions

The wiring and connectors that carry the power to a motor must be in good condition. When a connection becomes loose, oxidation of the copper wire occurs. The oxidation ____. A. acts as an electrical resistance and causes the connection to heat more B. has no effect on the electrical connection C. decreases the resistance D. none of the above

Answers

Answer: A. acts as an electrical resistance and causes the connection to heat more.

Explanation:

The wiring and connectors that carry the power to a motor must be in good condition. It should be noted that in a case whereby the connection becomes loose, then the oxidation of the copper wire occurs and thee oxidation will act as an electrical resistance and then results in the connection to heat more.

In such case, this has an effect on the electrical connection and increases the resistance. Therefore, the correct option is A.

What is the difference, if any, between a project manager and a producer on a digital media production team? A project manager oversees the entire project, while the producer just oversees the creative element. A project manager just oversees the creative element, while a producer oversees the entire project. A project manager is in charge of the people involved in the project, while the producer secures the funds. A project manager secures the funds for the project, while the producer is in charge of the people involved.

Answers

Answer:

A project manager just oversees the creative element, while a producer oversees the entire project.

It is B

Answer:

b

Explanation:

got it right on the quiz

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers

Answers

Answer:

Log inSign up

Server Unit 5 Quiz

STUDY

Flashcards

Learn

Write

Spell

Test

Play

Match

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers?

Tap card to see the definition

Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

Tap again to see the term

You want to create policies in a new GPO that affect only computers with Windows 8 installed. You don't want to reorganize your computer accounts to do this, and you want computers that are upgraded to Windows 10 to fall out of the GPO's scope automatically. What can you do?

Tap card to see the definition

Configure a WMI filter on the GPO that specifies Windows 8 as the OS. Link the GPO to the domain.

Tap again to see the term

1/20

Created by

Bannieboy

Tags related to this set

IT Essentials: PC Hardware And Software

Marketing

Right Click

Inheritance

Terms in this set (20)

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers?

Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

You want to create policies in a new GPO that affect only computers with Windows 8 installed. You don't want to reorganize your computer accounts to do this, and you want computers that are upgraded to Windows 10 to fall out of the GPO's scope automatically. What can you do?

Configure a WMI filter on the GPO that specifies Windows 8 as the OS. Link the GPO to the domain.

You have just finished configuring a GPO that modifies several settings on computers in the Operations OU and linked the GPO to the OU. You right-click the Operations OU and click Group Policy Update. You check on a few computers in the Operations department and find that the policies haven't been applied. On one computer, you run gpupdate and find that the policies are applied correctly. What's a likely reason the policies weren't applied to all computers when you tried to update them remotely?

You need to configure the firewall on the computers.

No computers in an OU seem to be getting computer policies from the GPO linked to the OU, but users in the OU are getting user policies from this GPO. Which of the following are possible reasons that computer policies in the GPO aren't affecting the computers? (Choose all that apply.)

-The Computer Configuration settings are disabled.

-The computer accounts have Deny Read permission.

An administrator would like to configure a computer to load policy information that is stored locally to speed system start-up. What client-side feature should the administrator select?

Group Policy caching

A junior administrator deleted a GPO accidentally, but you had backed it up. What should you do to restore the deleted GPO?

Right-click the Group Policy Objects folder and click Manage Backups.

You want to create an HTML report that shows which policies and GPOs are applied to a particular user and computer. Which command should you use?

gpresult

Users who log on from a branch office connected to the DC via a slow WAN link are complaining of slow logon times when you assign applications via group policies. What can you do to speed their logons?

Configure asynchronous processing when a slow link is detected

A java program is composed of data members and functions.​
true or false ?

Answers

Answer:

true

Explanation:

Which of the following are characteristics of distributed version control systems? Select 3 options.

Developers must be connected to the internet to make changes to the project files.

A full copy of all project files is stored on each developer’s computer.

Project files are maintained in a central repository.

It allows many developers to work on the same project from anywhere at the same time.

The process may require file locking, depending on file type.

Answers

Answer:

Explanation:

Distributed Version Control Systems are a must for any development team. Some of the characteristics of these systems include

Project files are maintained in a central repository.

It allows many developers to work on the same project from anywhere at the same time.

A full copy of all project files is stored on each developer’s computer.

It is somewhat similar to a Centralized Version Control system, with the main difference being that every team developer has a complete project copy in their own system. This allows them to work on the project without access to the internet. Instead, they make changes and update their own server version. This updated version later gets pushed to the centralized server.

Answer:

1. It allows many developers to work on the same project from anywhere at the same time.

2. Project files are maintained in a central repository.

3. A full copy of all project files is stored on each developer’s computer.

Explanation:

i did the assignment

what is a computer in daily life​

Answers

Answer:

The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to convert raw facts and data into meaningful information and knowledge. Computer science is explored and challenged by humans daily. The computer is like an electronic magical device for our life.

Explanation:

Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?

Answers

Answer:

Platform as a Service (PaaS).

Explanation:

Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Basically, cloud computing comprises three (3) service models and these include;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

In this scenario, the type of service Don's company signed up for is called Platform as a Service (PaaS).

What is the top 3 cloud provider in the world with statics or data including the example and reason(s).

Answers

Answer:

Amaz*n

Micros*ft

G*ogle

Explanation:

The top three cloud providers in the world right now with respect to our answer above have the following popular products: Amaz*n web services(AWS), Go*ogle Cloud Platform(GCP), Micros*ft Azure services. Why? These guys, notably Amazon(being number 1 cloud provider in the world) are largerly pioneers when you think anything "the cloud". Amazon for instance is known for its great reliability and large investment into cloud infrastructure and services. Simply put, these guys have the deepest pockets and market to keep being the top cloud providers in the world. They are the world's most valuable companies in the world with Amazon and Microsoft worth over 1 trillion dollars. A noteworthy statistic, Amazon's most profitable business, AWS has grown at a steady rate of 30% in the last year, raking over 10 billion dollars in first quarter of 2020.

Write either True or False. a) Software is touchable part of computer system. b) System software provides easy interaction between user and computer c) Every computer needs to have own operating system. d) A computer can only understand the program written in assembly language. SANJIWANI Computer Book 7​

Answers

Answer:

A: False B: False C: True D: False

Explanation:

What type of operating system is Linux? An outsourced operating system An open source operating system A closed source operating system A variable source operating system

Answers

Answer:

Linux is a free, open source operating system.

Explanation:

Answer:

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage.

A user is configuring an email client application and decides to use the TCP/IP suite protocol that will store all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. This protocol will store the email messages on the email server until the user explicitly deletes them.Which of the following TCP/IP port numbers will the client application typically use while using this protocol to contact the email server?A. 21B. 80C. 110D. 143

Answers

Answer:

D. 143

Explanation:

A server that allows the entire management of an email account through more than one email client such that the clients the messages of the clients are stored on the server pending being deleted by the user, is an IMAP server

The port that the IMAP server listens to is the port number 143, therefore, the client application typically makes use of port 143 while using the TCP/IP protocol to contact the email server

how big is an iphone xr

Answers

Answer:

the iPhone xr display measure in at 6 .1 inches

the phone measures up to 6.1 in

Write the contribution of Charles Babbage in the history of computer.​

Answers

Answer:

The main contributions of Charles Babbage are;

1 ) He invented difference engine and analytical engine.

2) He gave basic concept of of mathematics in his analytical engine.

3) He also keep the concept of using binary digits in his machine.

4) He had led to the the foundation of modern computer in his analytical engine including the concept of of input, processing and output

Hope it helps.... :)

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe

Answers

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

What impact, if any, have advances in technology had on people’s ability to communicate through media? Advances in technology have had no measurable impact on people’s ability to communicate through media. Advances in technology have made it more difficult for people to communicate through media. Advances in technology have made it easier for people to communicate through media. Advances in technology have had made it both easier and more difficult to communicate through media.

Answers

Answer:

What impact, if any, have advances in technology had on people's ability to communicate through media? Advances in technology have made it easier for people to communicate through media.

Answer:

advances in technology made it easier for ppl to communicate through media

Explanation:

because i got it right

write a program to print grade according to percentage which is entered by the user at run time.​

Answers

Explanation:

pseudo code

var A=90%

var B=80%

var C=70%

var F=60%

var input=input

if(input>=A){

console.log(" A")

}

if(input>=B){

console.log(" B")

}

if(input>=C){

console.log(" C")

}

if(input>=F){

console.log("F")

}

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

the second generation computer used. as a memory device

Answers

Answer:

The period from 1959-1965 was the second generation. Transistors that are cheaper, consumed less power, were used in this generation, were more compact, were more reliable, and were faster than first-generation vacuum tubing machines.

Explanation:

The primary memories and the magnet tapes and magnetic discs were used as secondary storage equipment in this generation.

The montage language and high programming languages such as FORTRAN, COBOL, have been used in this generation. The computers used batch processing and operating system multi-programming.

A memory is like the brain of human beings. It is used for storing information and instructions. Computer memory is the storage space on the computer that processes data and saves instructions for processing.

The memory is split into many small parts known as cells. There is a unique address for each location or cell, which varies from 0 to memory minus one.

There are three basic types of memory:

Memory Cache

Main Memory/Primary Memory

The Memory of a Second Kind

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variable names, and lowercase for constants and functions c. lowercase for variable names and constants, and uppercase for functions d. uppercase for variable names and constants, and lowercase for functions

Answers

Answer:

b) uppercase for variable names, and lowercase for constants and functions  

Explanation:

Given

Programming language: prolog

Required

The case type for variables, constants and functions

In prolog,

Variable names begin with uppercase

e.g. Name, NAME

While constants and functions begin with lowercase

e.g. name, addnumbers()

Hence, (b) is correct

Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason

Answers

I think that a successful business analyst could be a good programmer because if they had the write training and experience they could learn about that field of work and become good at programming

Distinguish between afax and a telephone call (5points)​

Answers

Answer:
A fax is an exact copy of a document made by electronic scanning where as a telephone call is a communication or conversation via a telephone

After completing initial diagnostic procedures and allocating system resources, a startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility. This option is commonly referred to as a:

Answers

Answer:

Boor sequence

Explanation:

A computer is an.............. device.​

Answers

Explanation:

A computer is an electronic device

Answer:

Computers are electronic devices that process information.

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

In order for two queries to be UNION-compatible, they must: Select one: A. both have the same number of lines in their SQL statements. B. both output compatible data types for each column and return the same number of rows. C. both return at least one row. D. both return exactly one row.

Answers

Answer: B. both output compatible data types for each column and return the same number of rows.

Explanation:

In order for two queries to be UNION-compatible, they must be both output compatible data types for each column and return the same number of rows.

It should be noted that two relations are union compatible when both relations have the same attributes and also the domain regarding the identical attributes are thesame.

whats an MAR? lolz better not take my points #bonkers

Answers

Answer:

[tex]\huge\mathcal{\fcolorbox{aqua}{azure}{\red{✿ʏᴏᴜʀ- ᴀɴsᴡᴇʀ ♡❖}}}[/tex]

A Medication Administration Record (MAR, or eMAR for electronic versions), commonly referred to as a drug chart, is the report that serves as a legal record of the drugs administered to a patient at a facility by a health care professional. The MAR is a part of a patient's permanent record on their medical chart

▓▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓

[tex]\boxed{\pmb{\green{\sf{MAR}}}}[/tex]

medication administration record:-

 A computer-generated schedule for administering medications to a patient for a defined period of time, including dosing, timing of administration and details about the physician’s orders.

▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓▓

what is computer hardware?list any 4 computer hardware​

Answers

The parts of computer which can be touched ,seen and felt are commonly known as computer hardware.
Any 4 computer hardware are:-
1. CPU
2. Motherboard
3. Keyboard
4. Mouse,etc

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?

Answers

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

Other Questions
vvorth 1 points(01.02 MC)Which of the following describes the correct process for solving the equation 2x - 4 = 20 and arrives at the correct solution?O Add 4 to both sides, and then divide by 2. The solution is x = 12.O Divide both sides by -4, and then subtract 2. The solution is x = -7.O Subtract 4 from both sides, and then divide by 2. The solution is x = -12.O Multiply both sides by -4, and then divide by 2. The solution is x = -40. After analyzing a data set using the one-way ANOVA model, the same data are analyzed using the randomized block design ANOVA model. SS (Treatment) in the one-way ANOVA model is ________ the SS (Treatment) in the randomized block design ANOVA model. a. Always equal to.b. Always greater than.c. Always less than.d. Sometimes greater than. CAN YOU GUYS HELP ME PLS IM FAILING GET THIS CORRECT PLS IM FAILING BADDD ITS PYTHAGOREAN THEOREM Simplify the square root of 75 Please answer in detail 5.What two words make up the contraction in this sentence?Wed hate to have to cancel the trip after so much planning.A. We hadB. We wouldC. We haveD. We did Alan's aunt gave him $95 to spend on clothes at the mall. He bought 5 shirts that cost $6 each and a pair of pants that cost $17. How much money does Alan have left to buy more clothes? (one more) Conduct a mini-census by counting the members of your extended family, and emphasize age. Try to include three or four generations, if possible. Create a table and include total population plus percentages of each generation. Next, begin to analyze age patterns in your family. What issues are important and specific to each group? What trends can you predict about your own family over the next ten years based on this census? For example, how will family members needs and interests and relationships change the family dynamic? proof of basic proportionality theorem Find h(-5) when: h(x) = x2 + 2x + 2 Petty cash is disbursed by Manuela Luisina in the Cashier's Office. Manuela also maintains records of disbursements, places requests to the Finance Department to replace expended funds, and periodically reconciles the petty cash balance. This represents a(n) ________ segregation of duties. What is the volume of the rectangular prism. A. 16in. 3B. 22 1/2in. 3C. 200 in. 3D. 212 1/2in. 3 75,000 live bacteria are present in a culture in a flask. When an antibiotic isadded to the culture, the number of live bacteria is reduced as shown by theequation. Approximately how many hours have passed when there are 4500bacteria left alive?4500 = 75,000 e-0.1733t Looking up from his computer monitor, Jason mopped his brow, exhaled sharply, and picked up his phone. Before the investigators can determine whether a larceny-theft crime has been committed, they mustlook for the footprints of the thief.examine the scene of the crime properly.understand the legal elements.look for the evidence left by the thief. Find the sum of the first 40 terms of an arithmetic series whose first term is 7 and 40th term is 115. Type answer as an integer (no decimals)arithmetic sum formula:Sn = (a1 ++ an)geometric sum formula:az (1 - p)S =1-rAnswer: William and Theodore have decided to start a travel business called Excellent Adventures. Since their business primarily involves time-travel their clients may be harmed during a small but significant portion of the travels. Consequently, William and Theodore would like a business form that will shield both of their personal wealth from any legal claims that the firm might be subject to after one of the travel mishaps. If William and Theodore are the only investors in this U.S. domiciled firm, which legal form of organization would be best for Excellent Adventures to protect both William and Theodore what is 14.005 as a fraction Divide $128 in the ratio 2:3:7 Based on the code you created in this Unit, propose a way to re-use most of the code (with different information in the variables like "city" and "rates") for a part of a similar app that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you've written (you can defend your proposal if the connection is not immediately obvious).