The output of the code would be a. = operator is not a sequence point
What is a Code Output?An output is just what happens once all the code is done, the end result. after all the calculation are done its what gets put into the console.
Hence, it can be seen that using the post-increment operator i++ along with the assignment operator causes the given code to have undefined behavior.
The expression i++ + i does not specify an evaluation order, resulting in possible variations depending on the used compiler or optimization settings.
Read more about programs here:
https://brainly.com/question/26134656
#SPJ1
Can someone give me answers for 1-4
Answer:
you want me help u with this one?
2. The different amount of shades of color
3. The artist had given every marvel or DC or villian the color that fit them and the texture is also very nice in the picture.
4. The artist maybe could make the pic a little bit more high quality cause in the image is sort of blurry and you cant really see the further people that well.
Which of these terms applies to a relay that has two isolated circuits and two contact positions per pole?
The term that applies to a relay with two isolated circuits and two contact positions per pole is "double-pole double-throw" (DPDT) relay. This type of relay has two sets of contacts that can switch between two separate circuits, allowing for more complex switching configurations than a single-pole relay. The two contact positions per pole refer to the two different positions the contacts can take when the relay is energized or de-energized.
In BSD socket API,which call is used for transmitting data in the connectionless mode?
Answer:
UDP is the answer
Explanation:
UDP enables best-effort connectionless transfer to individual block of information, while TCP enables reliable transfer of a stream of bytes. That's two modes of services available through the circuit interface, connection-oriented and connection-less.
does anyone know what this is?… it says DR on the back
The image is a DR-type security tag, used to prevent theft of objects through concealment in a store. This device activates store alarms by detecting metal inside this label.
What is seen in the image?The image shows the back of a DR-type security label. The main feature of this label is that it is adhesive and is attached to different products in order to prevent theft.
This label has metal sheets inside that cause the security device (metal detector alarm) to activate once the thief hides the product and tries to leave the store. This product is usually glued in a hidden place on the product so that the thief does not know that the alarm is going to sound.
According to the above, the DR tag allows store owners to have their items protected from thieves who try to hide them and remove them from the store.
Learn more about security in: https://brainly.com/question/8293680
#SPJ1
Please help I have no idea what to do :(
Write a program that simulates a coin flipping. Each time the program runs, it should print either “Heads” or “Tails”.
There should be a 0.5 probability that “Heads” is printed, and a 0.5 probability that “Tails” is printed.
There is no actual coin being flipped inside of the computer, and there is no simulation of a metal coin actually flipping through space. Instead, we are using a simplified model of the situation, we simply generate a random probability, with a 50% chance of being true, and a 50% chance of being false.
A Java Script program that simulates a coin flipping, so that each time the program runs, it should print either “Heads” or “Tails” along with the other details given is stated below.
Code for the above coin simulationvar NUM_FLIPS = 10;
var RANDOM = Randomizer.nextBoolean();
var HEADS = "Heads";
var TAILS = "Tails";
function start(){
var flips = flipCoins();
printArray(flips);
countHeadsAndTails(flips);
}
// This function should flip a coin NUM_FLIPS
// times, and add the result to an array. We
// return the result to the caller.
function flipCoins(){
var flips = [];
for(var i = 0; i < NUM_FLIPS; i++){
if(Randomizer.nextBoolean()){
flips.push(HEADS);
}else{
flips.push(TAILS);
}
}
return flips;
}
function printArray(arr){
for(var i = 0; i < arr.length; i++){
println("Flip Number " + (i+1) + ": " + arr[i]);
}
}
function countHeadsAndTails(flips){
var countOne = 0;
var countTwo = 0;
for(var i = 0; i < flips.length; i++){
if(flips[i] == HEADS){
countOne+=1;
}
else {
countTwo+=1;
}
}
println("Number of Heads: " + countOne);
println("Number of Tails: " + countTwo);
}
Learn more about Java Script:
https://brainly.com/question/18554491
#SPJ1
network connections can be tested using an
Answer:
Electronic device
Explanation:
If the electronic device can pick up the signal and be able to use it, then it would work.
Is there a parrapa level for stage 1 in umjammer lammy?
Answer:yes there WAS a parrapa level but it was scrapped from the game I think you can find it in beta versions of the game but
what don't you like about creating a new document using Microsoft office button
Python question
The following code achieves the task of adding commas and apostrophes, therefore splitting names in the list. However, in the case where both first and last names are given how would I "tell"/write a code that understands the last name and doesn't split them both. For example 'Jack Hansen' as a whole, rather than 'Jack' 'Hansen'.
names = "Jack Tomas Ponce Ana Mike Jenny"
newList = list(map(str, names.split()))
print(newList) #now the new list has comma, and apostrophe
Answer:
You can use regular expressions to match patterns in the names and split them accordingly. One way to do this is to use the re.split() function, which allows you to split a string based on a regular expression.
For example, you can use the regular expression (?<=[A-Z])\s(?=[A-Z]) to match a space between two capital letters, indicating a first and last name. Then use the re.split() function to split the names based on this regular expression.
Here is an example of how you can use this approach to split the names in your list:
(Picture attached)
This will give you the output ['Jack', 'Tomas', 'Ponce', 'Ana', 'Mike', 'Jenny', 'Jack Hansen']. As you can see, the name "Jack Hansen" is not split, as it matches the pattern of first and last name.
It's worth noting that this approach assumes that all first and last names will have the first letter capitalized and the last names capitalized too. If this is not the case in your data, you may need to adjust the regular expression accordingly.
What is the function of the wheel button on the mouse?
Answer:
To scroll up and down on any page without using the vertical scroll bar on the right hand side of a document or webpage.
Explanation:
Took the tech class for this
Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If the input file is Mary had a little lamb Whose Fleece was a white as snow. And everywhere that Mary went, The lamb was sure to go! then the program produces the output file /* 1 */ Mary had a little lamb /* 2 */ Whose Fleece was a white as snow. /* 3 */ And everywhere that Mary went, /* 4 */ The lamb was sure to go! The line numbers are enclosed in /* */ delimiters so the program can be used for numbering Java source files. Prompt the user for the input and output file names.
#!/bin/bash
INPUT_FILE=$1
count=1
while IFS= read -r line; do
echo $count - $line
count=$(($count + 1))
done < $INPUT_FILE
Which would be considered a peripheral device?
A. a printer that can be connected from outside the computer to communicate with it
B. a CPU
C. RAM
D. an internal hardware part like a motherboard or hard drive
Answer:
D is the correct answer of this question
Air parcel 1 is at the same temperature as the surrounding air. Air parcel 2 is warmer than the surrounding air. Air parcel 1 and Air parcel 2 started with the same amount of water vapor in them. Which air parcel will have more rainfall and why? * 1 point Captionless Image
Answer:
If this is Amplify, the answer is C which is Air parcel 1 will lose energy to the surrounding air, which will cause more water vapor to fall as rain.
Explanation:
If this is amplifying, then the correct response is C, meaning that Air parcel 1 will lose energy to the surrounding air, increasing the amount of water vapor that rains.
What is an Amplifier?A sign's power can be increased using an electronic device known as an amplifier, electronic amplifier, or amp.
Named after French physicist André-Marie Ampère, the term "ampère" first appeared in 1881 to describe "the current that one volt can transmit through a resistance of one ohm" (1775-1836). adopted in 1881 at the Electric Congress in Paris. reduced form. amplifier (n.)
The triode vacuum tube, developed by Lee De Forest in 1906, was the first widely used device that could amplify, and it led to the creation of the first amplifier in 1912. Up until the 1960s and 1970s, practically all amplifiers employed vacuum tubes until being replaced by transistors.
The technique of increasing the amplitude of an electromagnetic light wave is known as light amplification. The three main categories of this procedure are laser, parametric, and scattering.
In order to reduce the risk of electrocution, the amplifier ground is the ground wire that safely offers the least possible electrical resistance to earth ground or chassis ground. Usually, power mains outlet connections, power supply, or the car chassis are used to ground amps.
To read more about Amplifiers, refer to - https://brainly.com/question/14100137
#SPJ2
Need help with Exercise 5 (JAVA)
Using knowledge in computational language in JAVA it is possible to write a code that install java and set java home to point to the java installation directory.
Writting the code:
For Maven I tried :
1. open cmd
2. type mvn -version
3. Error appeared :
C:\Users\Admin>mvn -version
ERROR: JAVA_HOME is set to an invalid directory.
JAVA_HOME = "C:\Program Files\Java\jre7\bin"
Please set the JAVA_HOME variable in your environment to match the
location of your Java installation
For ANT I tried and worked :
1. open cmd
2. type mvn -version
3. Apache Ant(TM) version 1.9.1 compiled on May 15 2013
There are multiple ways to copy elements from one array in Java, like you can manually copy elements by using a loop, create a clone of the array, use Arrays. copyOf() method or System. arrayCopy() to start copying elements from one array to another in Java.
See more about java at:
brainly.com/question/12975450
#SPJ1
What feature allows a person to key on the new lines without tapping the return or enter key
The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap
How to determine the featureWhen the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.
In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.
This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.
Learn more about word wrap at: https://brainly.com/question/26721412
#SPJ1
which statements describes the size of an atom
answer:
A statement that I always think about to understand the size of an atom. If you squish a person down to the size of an atom. It will make a black hole. and if you squish the whole Earth. down to the size of a jelly bean it will also make a black hole. This is just a approximation.
-----------------------
I use the scale to understand how small that is I am open to hear more principles if you were talking about math wise that would be glad to help.
if you have anymore questions I will try to answer your questions to what I know.
.
Tamanika got a raise in her hourly pay, from $15.90 to $17.65. Find the percent increase
Write a program that repeatedly takes integers from the user as long as he
wants to input. The program then, shows a summary of the inputs. The summary
should include: 1) minimum of the inputs, 2) maximum of the inputs, 3) total Even
inputs , 4) total Odd inputs, 5) Average of Even numbers, 6) Average of Odd
numbers, and 7) the total Average
Answer:
Written in Python:
evens = 0
odds = 0
oddtotal = 0
eventotal = 0
total = 0
mylst = []
tryag = "Y"
while tryag == "Y" or tryag == "y":
num = int(input("Input: "))
mylst.append(num)
tryag = input("Another Input (Y/y): ")
mylst.sort()
print("Minimum: "+str(mylst[0]))
print("Maximum: "+str(mylst[-1]))
for i in mylst:
total = total + i
if i%2 == 0:
evens = evens + 1
eventotal = eventotal + i
else:
odds = odds + 1
oddtotal = oddtotal + i
print("Evens: "+str(evens))
print("Odds: "+str(odds))
print("Even Average: "+str(eventotal/evens))
print("Odd Average: "+str(oddtotal/odds))
print("Total Average: "+str(total/(evens+odds)))
Explanation:
The following lines initializes useful variables to 0
evens = 0
odds = 0
oddtotal = 0
eventotal = 0
total = 0
This declares an empty list
mylst = []
tryag = "Y"
This is repeated until user stops the loop by entering strings other than y or Y
while tryag == "Y" or tryag == "y":
This prompts user for input
num = int(input("Input: "))
User input is appended to the list
mylst.append(num)
This prompts user to try again the loop
tryag = input("Another Input (Y/y): ")
This sorts the list from small to large
mylst.sort()
This prints 1. The minimum
print("Minimum: "+str(mylst[0]))
This prints 2. The maximum
print("Maximum: "+str(mylst[-1]))
The following iterates through the list
for i in mylst:
This calculates the total
total = total + i
This checks for even entry
if i%2 == 0:
This counts the number of even entries
evens = evens + 1
This sums the even entries
eventotal = eventotal + i
else:
This counts the number of odd entries
odds = odds + 1
This sums the odd entries
oddtotal = oddtotal + i
This prints 3. Sum of Even entries
print("Evens: "+str(evens))
This prints 4. Sum of Odd entries
print("Odds: "+str(odds))
This prints 5. Average of Even entries
print("Even Average: "+str(eventotal/evens))
This prints 6. Average of Odd entries
print("Odd Average: "+str(oddtotal/odds))
This prints 7. Total Average
print("Total Average: "+str(total/(evens+odds)))
I'm trying to figure out how to put this together can anyone help me solve this?
The if-else statement to describe an integer is given below.
How to illustrate the informationThe if-else statement to describe an integer will be:
#include <stdio.h>
#include <stdbool.h>
int main(void) {
int userNum;
bool isPositive;
bool isEven;
scanf("%d", &userNum);
isPositive = (userNum > 0);
isEven = ((userNum % 2) == 0);
if(isPositive && isEven){
printf("Positive even number");
}
else if(isPositive && !isEven){
printf("Positive number");
}
else{
printf("Not a positive number");
}
printf("\n");
return 0;
}
Learn more about integers on:
https://brainly.com/question/17695139
#SPJ1
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
Which of the following queries can have a fully Meets result?
Answer: we need the awnser key
Explanation:
Assume a 2^20 byte memory:
a) What are the lowest and highest addresses if memory is byte-addressable?
b) What are the lowest and highest addresses if memory is word-addressable, assuming a 16-bit word?
c) What are the lowest and highest addresses if memory is word-addressable, assuming a 32-bit word?
a) Lowest address: 0, Highest address: (2^20) - 1. b) Lowest address: 0, Highest address: ((2^20) / 2) - 1. c) Lowest address: 0, Highest address: ((2^20) / 4) - 1.
a) If memory is byte-addressable, the lowest address would be 0 and the highest address would be (2^20) - 1.
This is because each byte in the memory requires a unique address, and since there are 2^20 bytes in total, the highest address would be one less than the total number of bytes.
b) If memory is word-addressable with a 16-bit word, each word would consist of 2 bytes.
Therefore, the lowest address would be 0 (representing the first word), and the highest address would be ((2^20) / 2) - 1.
This is because the total number of words is equal to the total number of bytes divided by 2.
Subtracting 1 gives us the highest address, as the addresses are zero-based.
c) If memory is word-addressable with a 32-bit word, each word would consist of 4 bytes.
In this case, the lowest address would still be 0 (representing the first word), and the highest address would be ((2^20) / 4) - 1.
Similar to the previous case, the total number of words is equal to the total number of bytes divided by 4.
Subtracting 1 gives us the highest address.
For more questions on address
https://brainly.com/question/30273425
#SPJ8
Assign avg_owls with the average owls per zoo. Print avg_owls as an integer.
Sample output for inputs: 1 2 4
Average owls per zoo: 2
Answer:
I'm going to add a python program for this example, step by step:
We declare 4 variables for our zoo, zoo quantity, and the average.
We make the operation for the average where sum the zoo and divide with the quantity
In the last step, we print the variable avg_owls.
num_owls_zoo1 = 1
num_owls_zoo2 = 2
num_owls_zoo3 = 3
num_owls_zoo4 = 4
zoos = 4
avg_owls = 0.0
avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos
print('Average owls per zoo:', int(avg_owls))
Explanation:
The coding of the print avg_owls as an integer is written above.
What is coding?We connect with computers through coding, often known as computer programming. Coding is similar to writing a set of instructions because it instructs a machine on what to do. You can instruct computers what to do or how to behave much more quickly by learning to write code.
We make the operation for the average, where sum the zoo and divide by the quantity.
In the last step, we print the variable avg_owls.
num_owls_zoo1 = 1
num_owls_zoo2 = 2
num_owls_zoo3 = 3
num_owls_zoo4 = 4
zoos = 4
avg_owls = 0.0
avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos
print('Average owls per zoo:', int(avg_owls))
Therefore, the coding is written above.
To learn more about coding, visit here:
https://brainly.com/question/1603398
#SPJ2
Assume we are testing a variable is_sunny in a while loop. is_sunny = “n”.
Write a while clause that will continue executing a loop until is_sunny is not equal to ‘n’.
Answer:
while(is_sunny=="n")
Explanation:
The loop keeps repeating itself until a certain condition is met.
Here while loop keeps executing until value of is_sunny is not equal to 'n'
When the value of is_sunny is not equal to n then the loop stops.
So lets explain this logic with a chunk of code:
#include <iostream> //to use input output functions
using namespace std; //to identify objects like cin cout
int main() { //start of main function
string is_sunny = "n"; //value of is_sunny is set to n
cout<<"Enter value of is_sunny: "; // prompts user to enter value of is_sunny
cin>>is_sunny; // reads value of is_sunny from user
while(is_sunny=="n") // keeps iterating until value of is_sunny is not equal to n
{ cout<<"keep executing until is_sunny is not equal to n"<<endl;//display this message with each iteration
cout<<"Enter value of is_sunny: "; //keeps prompting to enter is_sunny
cin>>is_sunny; } } //keeps reading value of is_sunny from user
Now if the user keeps entering "n" as value of is_sunny then the loop keeps repeating. When the user enters any string other than n then the loop breaks. The output of the program is attached.
Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.
Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.
You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:
What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.
In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:
Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.What is the Case Facts?First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.
Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.
Learn more about affidavit from
https://brainly.com/question/30833464
#SPJ1
Create a Student table with the following column names, data types, and constraints:
ID - integer with range 0 to 65 thousand, auto increment, primary key
FirstName - variable-length string with max 20 chars, not NULL
LastName - variable-length string with max 30 chars, not NULL
Street - variable-length string with max 50 chars, not NULL
City - variable-length string with max 20 chars, not NULL
State - fixed-length string of 2 chars, not NULL, default "TX"
Zip - integer with range 0 to 16 million, not NULL
Phone - fixed-length string of 10 chars, not NULL
Email - variable-length string with max 30 chars, must be unique
The following column names, data types, and constraints:
CREATE TABLE Student (
ID INTEGER (65000) AUTO _ I NCREMENT PRIMARY KEY,
FirstName VA RCHAR (20) NOT NULL,
LastName VARCH AR(30) NOT NULL,
Street VARCH AR(50) NOT NULL,
City VA RC HAR(20) NOT NULL,
State CHAR (2) NOT NULL DEFAULT 'TX',
Zip INTEGER (16000000) NOT NULL,
Phone CHAR (10) NOT NULL,
Email VAR C HAR(30) UNIQUE NOT NULL
);
What is VA RC H AR ?VARCHAR, which stands for Variable Character, is a data type used in data bases and programming languages to store character strings of variable length. This type of data is often used for storing text-based information, such as names, addresses, descriptions, and other data that does not require numerical calculations to be performed.
VARCHAR data is stored as a string of characters, and can be used to store up to a predetermined maximum length of characters. This maximum length is typically specified when the database or program is set up and is usually determined by the user or programmer.
To learn more about VARCHAR
https://brainly.com/question/29977484
#SPJ1
Advantages of monolithic operating system?
Advntage:
provides CPU scheduling, memory management, file management, and other operating system functions through system calls. The other one is that it is a single large process running entirely in a single address space.
Disadvantage: if anyone service fails it leads to an entire system failure
Drag each tile to the correct box.
Match the certifications to the job they best fit.
CompTIA A+
Cisco Certified Internetwork Expert (CCIE)
Microsoft Certified Solutions Developer (MCSD)
help desk technician
network design architect
software developer
Answer:
software developer- microsoft certified solutions developer
help desk technician- CompTIAA+
network design architect- Cisco certified internetwork expert
Explanation
edmentum
Homework 8 Matlab Write a function called fibonacciMatrix. It should have three inputs, col1, col2, and n. col1 and col2 are vertical arrays of the same length, and n is an integer number greater than 2. It should return an output, fib, a matrix with n columns. The first two columns should be col1 and col2. For every subsequent column:
In this exercise we have to use the knowledge in computational language in python to write the following code:
We have the code can be found in the attached image.
So in an easier way we have that the code is:
function v = myfib(n,v)
if nargin==1
v = myfib(n-1,[0,1]);
elseif n>1
v = myfib(n-1,[v,v(end-1)+v(end)]);
end
end
function v = myfib(n,v)
if nargin==1
v = myfib(n-1,[0,1]);
elseif n>1
v = myfib(n-1,[v,v(end-1)+v(end)]);
elseif n<1
v = 0;
end
function [n] = abcd(x)
if (x == 1 || x==0)
n = x;
return
else
n = abcd(x-1) + abcd(x-2);
end
end
fibonacci = [0 1];
for i = 1:n-2
fibonacci = [fibonacci fibonacci(end)+fibonacci(end-1)];
end
>> myfib(8)
ans =
0 1 1 2 3 5 8 13
>> myfib(10)
ans =
0 1 1 2 3 5 8 13 21 34
See more about python at brainly.com/question/18502436
which creative common license type allows others to use and build upon work non- commercially, provided that they credit the original author and maintain the same licensing.
Answer:
CC BY-NC-SA
Explanation:
BY ==> credit has to be given to original author
NC ==> non-commercial
SA ==>Share alike ; modified work should be reused under the original license