In reinforcement learning and q learning, what is random policy
and what is optimal policy? compare these two explain in details
please

Answers

Answer 1

In reinforcement learning and Q-learning, a random policy refers to a strategy or decision-making approach where actions are chosen randomly without considering the current state or any learned knowledge. It means that the agent selects actions without any preference or knowledge about which actions are better or more likely to lead to a desirable outcome. On the other hand, an optimal policy refers to a strategy that maximizes the expected cumulative reward over time. It is the ideal policy that an agent aims to learn and follow to achieve the best possible outcomes.

A random policy is often used as an initial exploration strategy in reinforcement learning when the agent has limited or no prior knowledge about the environment. By choosing actions randomly, the agent can gather information about the environment and learn from the observed rewards and consequences. However, a random policy is not efficient in terms of achieving desirable outcomes or maximizing rewards. It lacks the ability to make informed decisions based on past experiences or learned knowledge, and therefore may lead to suboptimal or inefficient actions.

On the other hand, an optimal policy is the desired outcome of reinforcement learning. It represents the best possible strategy for the agent to follow in order to maximize its long-term cumulative reward. An optimal policy takes into account the agent's learned knowledge about the environment, the state-action values (Q-values), and the expected future rewards associated with each action. The agent uses this information to select actions that are most likely to lead to high rewards and desirable outcomes.

The main difference between a random policy and an optimal policy lies in their decision-making processes. A random policy does not consider any learned knowledge or preferences, while an optimal policy leverages the learned information to make informed decisions. An optimal policy is derived from a thorough exploration of the environment, learning the values associated with different state-action pairs and using this knowledge to select actions that maximize expected cumulative rewards. In contrast, a random policy is a simplistic and naive approach that lacks the ability to make informed decisions based on past experiences or learned knowledge.

To learn more about Optimal policy - brainly.com/question/31756369

#SPJ11

Answer 2

In reinforcement learning and Q-learning, a random policy refers to a strategy or decision-making approach where actions are chosen randomly without considering the current state or any learned knowledge. It means that the agent selects actions without any preference or knowledge about which actions are better or more likely to lead to a desirable outcome. On the other hand, an optimal policy refers to a strategy that maximizes the expected cumulative reward over time. It is the ideal policy that an agent aims to learn and follow to achieve the best possible outcomes.

A random policy is often used as an initial exploration strategy in reinforcement learning when the agent has limited or no prior knowledge about the environment. By choosing actions randomly, the agent can gather information about the environment and learn from the observed rewards and consequences. However, a random policy is not efficient in terms of achieving desirable outcomes or maximizing rewards. It lacks the ability to make informed decisions based on past experiences or learned knowledge, and therefore may lead to suboptimal or inefficient actions.

On the other hand, an optimal policy is the desired outcome of reinforcement learning. It represents the best possible strategy for the agent to follow in order to maximize its long-term cumulative reward. An optimal policy takes into account the agent's learned knowledge about the environment, the state-action values (Q-values), and the expected future rewards associated with each action. The agent uses this information to select actions that are most likely to lead to high rewards and desirable outcomes.

The main difference between a random policy and an optimal policy lies in their decision-making processes. A random policy does not consider any learned knowledge or preferences, while an optimal policy leverages the learned information to make informed decisions. An optimal policy is derived from a thorough exploration of the environment, learning the values associated with different state-action pairs and using this knowledge to select actions that maximize expected cumulative rewards. In contrast, a random policy is a simplistic and naive approach that lacks the ability to make informed decisions based on past experiences or learned knowledge.

To learn more about Optimal policy - brainly.com/question/31756369

#SPJ11


Related Questions

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

While a program is running, when an exception is raised but not handled, the message you see is called a:

Answers


When an exception is raised but not handled during the execution of a program, the message that is displayed is called an unhandled exception or an error message.


In programming, an exception is an event that occurs during the execution of a program and disrupts its normal flow. When an exception is raised but not handled by appropriate error-handling code, it is referred to as an unhandled exception. In such cases, the program cannot continue its execution as expected, and an error message is displayed to provide information about the exception.

The error message typically includes details about the type of exception that occurred, along with a stack trace that shows the sequence of function calls leading up to the exception. This message helps developers identify and debug issues in the program by providing insights into the source of the error. Handling exceptions properly is crucial for robust and reliable software, as it allows for graceful error recovery and prevents unexpected program termination.

Learn more about program here : brainly.com/question/14368396

#SPJ11

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

Answers

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with the ability to rapidly scale their infrastructure up or down to meet demand.

Cloud computing provides the following benefits for organizations: Digital Flexibility: It refers to the ability to access your data from anywhere, at any time, using any device with an internet connection. This is because cloud computing operates on the internet. Technological Savings: One of the most significant advantages of cloud computing is that it saves businesses money by lowering their IT infrastructure costs.Increased Collaboration: Collaboration has become simpler with cloud computing.

It enables individuals in different locations to work together on the same document or project, exchanging ideas in real-time and increasing productivity. Rapid Scalability: Rapid scalability means that businesses can increase or decrease their computing resources as needed. As a result, they only pay for what they use.

To know more about technological visit:-

https://brainly.com/question/31134793

#SPJ11

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
A. Boot the computer from the Windows installation disc and run Startup Repair.
B.Boot the computer from the Windows installation disc and perform a clean installation of Windows.
C.Boot the computer from the Windows installation disc and run Reset this PC.
D.Boot the computer from the Windows installation disc and run System Restore.

Answers

Answer:

C.Boot the computer from the Windows installation disc and run Reset this PC

Hold down the shift key continuously until the Advanced Recovery Options menu appears. To troubleshoot, click. Click Reset this PC after that. Choose whether to perform a clean install and remove everything, or to keep your files. Thus, option C is correct.

What Windows installation disc and run Reset this PC?

From the menu, choose Settings > Update & Security > Recovery. The title of the page should say “Reset this PC.” Next, click Get Started. Choose between removing everything or keeping my files.

In Windows 10, launch the Settings window by clicking the Start menu, then selecting the gear icon in the lower left corner. Another choice from the list of apps is the Settings app. Click Update & Security > Recovery in Settings, then decide Get started under reboot this PC.

Therefore, Boot the computer from the Windows installation disc and run Reset this PC.

Learn more about Windows installation here:

https://brainly.com/question/24282472

#SPJ5

g i r l s o n l y j o i n
id= ons jcuv jke

Answers

at least 20 characters long

For multiprogramming systems, most UNIX operating systems use either ____ management techniques.
a. indirect paging and hot swapping c. virtual memory and swapping
b. simple memory and paging d. swapping or demand paging memory

Answers

For multiprogramming systems, most UNIX operating systems use either c. virtual memory and swapping management techniques.

In virtual memory technique, it creates an illusion of large memory space to the user by combining main memory and secondary memory (such as a hard disk) which can be used to store parts of processes that are not currently in use in memory. When a program tries to access data that is not present in main memory, a page fault occurs and the operating system swaps the necessary page from the secondary memory to main memory, thus allowing the process to continue its execution.

The swapping memory technique is also used in UNIX systems for multiprogramming systems. This technique is the process of moving a whole process from main memory to secondary memory and then later bringing it back into main memory. Swapping is necessary when the system requires more memory than it has. So the answer is  c. virtual memory and swapping.

Learn more about UNIX operating: https://brainly.com/question/4837956

#SPJ11

Create a flowchart to find the total of 10 negative numbers start from -1.

Answers

Here is a simple flowchart to find the total of 10 negative numbers starting from -1:

```

Start

Set total = 0

Set counter = 1

While counter <= 10

|

├─ Yes ─┬─→ Add counter to total

│ ↓

│ Increment counter by 1

├─ No ──┬─→ Display total

End

```

In this flowchart, we start by initializing the total to 0 and the counter to 1. Then, we enter a loop that continues as long as the counter is less than or equal to 10. Inside the loop, we add the current value of the counter to the total, and then we increment the counter by 1. Once the loop finishes, we display the total.

\(\huge{\mathfrak{\colorbox{black}{\textcolor{lime}{I\:hope\:this\:helps\:!\:\:}}}}\)

♥️ \(\large{\textcolor{red}{\underline{\mathcal{SUMIT\:\:ROY\:\:(:\:\:}}}}\)

A company has a central file server that is located 500 m away from the main office where employees work at their computers. Employees send and retrieve files to and from the file server on a daily basis, often at the same time. Identify the type of data transmission that would be most suitable for the given context. Explain why this would be the most suitable method of transmission.​

Answers

For the given scenario, the most suitable type of data transmission would be fiber optic cabling.

What is the explanation for the above response?

For the given scenario, the most suitable type of data transmission would be fiber optic cabling. This is because fiber optic cables have the ability to transmit large amounts of data over long distances without experiencing significant signal degradation or loss.

This makes it ideal for transmitting data between the main office and the file server which are 500 meters apart. Additionally, fiber optic cables are not susceptible to electromagnetic interference, making them more reliable compared to other types of cables such as copper cables.

The high bandwidth and reliability of fiber optic cables make them the best choice for transmitting large volumes of data at high speeds over long distances, which is exactly what is needed in this scenario.

Learn more about data transmission at:

https://brainly.com/question/14700082

#SPJ1

Ensuring that a website’s content is relevant both "Choosers" and "Users" is primarily relevant for:

Answers

Ensuring that a website's content is relevant for both "Choosers" and "Users" is primarily relevant for increasing website traffic and engagement.

"Choosers" are the people who first find your website, such as through search engines or social media. "Users" are the people who actually interact with your website, such as by reading your content, watching your videos, or using your data tools.

When your content is relevant to both "Choosers" and "Users," it is more likely to be found and used. This can lead to increased website traffic, engagement, and conversions.

There are a number of ways to ensure that your content is relevant to both "Choosers" and "Users." Here are a few tips:

Do keyword research to identify the terms that your target audience is using to search for information.

Write clear and concise content that is easy to understand.

Use images, videos, and other visuals to break up your text and make your content more engaging.

Promote your content on social media and other channels.

By following these tips, you can ensure that your website's content is relevant to both "Choosers" and "Users," which can lead to increased website traffic and engagement.

Here are some additional details about the importance of relevant content:

Relevant content can help you to attract new visitors to your website.

Relevant content can help you to keep visitors on your website longer.

Relevant content can help you to increase the number of pages that visitors view on your website.

Relevant content can help you to increase the number of conversions on your website.

If you want to improve your website's performance, you should make sure that your content is relevant to both "Choosers" and "Users."

To know more about data click here

brainly.com/question/11941925

#SPJ11

Please compose an email back to your client mr. smith, letting him know we are unable to secure the requested reservation at eleven madison park tonight for a party of 2 at 6pm.

Answers

The compose an email back to your client Mr. smith is written above,

Mr Smith,

Manager Venus PLC.

Dear sir,

Issue with requested reservation

I wish to inform you concerning the requested reservation for the eleven Madison park tonight for a party of 2 at 6pm.

The place has been taken by another person as at that time and our request was said to be made too late but there are other options that have been given for  that time but in a letter date.

We are sorry for the inconveniences this may have cause you and we hope to meet you to discuss the way forward.

Thanks for your continuous patronage,

Mr. Rolls.

Manager Madison park

Learn more about Email from

https://brainly.com/question/24688558

#SPJ1

Using Firewall Linux has tool called iptables which is essentially firewall It has nice front end program called ufw. In this task; the objective is to use ufw to set up some firewall policies and observe the behaviors of your system after the policies become effective_ Fou need to set up at least two T Ms_ one called Machine 4.and other called Machine B You run the firewall on your Machine 4- Basically; we use ufw as personal firewall: Optionally, if you have more VMs; you can set up the firewall at your router; so it can protect network; instead of just one single computer_ After you set up the two VMs; you should perform the following tasks: Prerent from doing telnet to Machine B_ Prerent B from doing telnet to Machine A Prerent 4 from visiting an external Web site Fou can choose any web site that you like to block; but keep in mind; some web servers hare multiple IP addresses You can find the manual of ufw by typing man ufw search it online. It is pretty straightforward to use- Please remember that the firewall is not enabled by default; so you should run command to specifically enable it: We also list some commonly used commands Appendix 4 Before start the task; go to default policy file /etc/default/ufw. If DEFAULT INPUT POLICY is DROP_ please change it to ACCEPT_ Otherwise; all the incoming traffic will be dropped by default: Solution:'

Answers

In this task, the objective is to use the ufw (Uncomplicated Firewall) tool in Linux to set up firewall policies and observe the system's behavior after the policies take effect.

Two virtual machines (VMs) are involved: Machine A and Machine B, with the firewall running on Machine A. The goal is to prevent telnet connections from Machine A to Machine B, prevent telnet connections from Machine B to Machine A, and block Machine A from accessing a specific external website. The ufw tool is used as a personal firewall, and it can be set up on the router to protect the entire network if there are more VMs available. To accomplish the task, you need to set up the two VMs (Machine A and Machine B) and configure the ufw firewall on Machine A. The specific policies can be set using ufw commands to block telnet connections and restrict access to the external website. The ufw tool provides a straightforward interface for managing the firewall rules. Before starting, it is important to check the default policy file (/etc/default/ufw) and ensure that the DEFAULT INPUT POLICY is set to ACCEPT; otherwise, all incoming traffic will be dropped by default. By following the given instructions and configuring the ufw firewall on Machine A, you can prevent telnet connections between the two machines and block Machine A from accessing the specified external website. The ufw tool provides flexibility in defining firewall rules and can be customized according to specific requirements.

Learn more about ufw (Uncomplicated Firewall) tool  here:

https://brainly.com/question/29998233

#SPJ11

Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures

Please help ASAP

Answers

Answer:

clip art

Explanation:

i hope this helps you

patulong po need na po ngayon 20 pts po ibibigay ko thanks​

patulong po need na po ngayon 20 pts po ibibigay ko thanks

Answers

4 this is really all you need to hear it’s very not compliant EE I hope this helpped and the bro above is not a hot tutor at all!

the type of hard disk that typically connects to a usb or thunderbolt port on the system unit.
T/F

Answers

The statement is True. The type of hard disk that typically connects to a USB or Thunderbolt port on the system unit is called an external hard disk.

The type of hard disk that typically connects to a USB or Thunderbolt port on the system unit is an external hard drive. These hard drives are portable and can be easily connected to a computer through the USB or Thunderbolt port, allowing users to easily transfer files and increase their storage capacity.

External hard disks are used for additional storage, backup, and portability of data. They connect to the computer through USB or Thunderbolt ports, allowing for easy plug-and-play functionality.

Learn more about external hard disk: https://brainly.com/question/31116227

#SPJ11

PLSSSS HURRY THIS IS A FINAL!!!!
Which of the below is float? Select 2 options.

25

3e-2

"25"

2.5

'2.5'

Answers

Answer:

2.5

Explanation:

A float has numbers on both sides of the decimal, it is similar to a decimal, except with less space in memory.

Answer: 2.5

Explanation: because there is a number on both sides of the decimal

which of these is not a valid relationship type

Answers

where is the items or options

There’s is no options to pick from

Which of these examples shows inappropriate physical behavior
A.argumentative
B.Refusal to follow instruction
C.ergonic
D.physical

Answers

Answer:

B. Refusal to follow instruction

Explanation:

Refusal to follow instructions which are ethical, legal, and reasonable, given by the supervisor or manager, by the open display of physical action and, not acting or communicating as directed is known as insubordination

When an employee mocks or displays similar behavior openly which are forms of insubordination, the employee will be subject to disciplinary action

LDAP servers are designed to replace traditional relational databases. True or False?

Answers

False. LDAP servers are not designed to replace traditional relational databases. While they both store data, they serve different purposes.

LDAP servers are designed for directory services, which organize and provide access to information about network resources, while relational databases are designed for managing large amounts of structured data. Additionally, LDAP servers use a hierarchical data structure while relational databases use a table-based structure. It is important to note that both LDAP servers and relational databases can be used in conjunction with each other for different purposes.


LDAP, which stands for Lightweight Directory Access Protocol, is a protocol for accessing and maintaining distributed directory information services over an IP network. LDAP servers are designed to provide a more efficient way to handle directory services such as user authentication and authorization, whereas traditional relational databases are designed for storing, retrieving, and managing large amounts of structured data.

To know more about traditional relational databases visit:-

https://brainly.com/question/31567187

#SPJ11

what does the first number in a zip code represent?

Answers

The first digit in a ZIP code represents a defined group of U.S. states. The second and third digits represent a region in that group, such as a large city. To send mail, only the first five digits of the ZIP code are required.

so.. the answer is “ The first digit in a ZIP code represents a defined group of U.S. states. “

hope this helps!!

If yes, justify your answer, otherwise suggest one value for d. Then compute the public and the private keys.

Answers

Yes, the computation of public and private keys is necessary in order to establish a secure communication system using asymmetric encryption.

Is the computation of public and private keys necessary in the given scenario?

To justify the answer, we need to ensure that the conditions for selecting the values of p and q are met.

These conditions include choosing two large prime numbers, p and q, and verifying that they are suitable for encryption.

If the conditions are not met, a suitable value for d needs to be suggested.

Once the conditions are met, the public key can be computed by selecting a value for e that is coprime with φ(n) (Euler's totient function) and less than φ(n). The public key is represented as (e, n).

To compute the private key, the modular multiplicative inverse of e modulo φ(n) needs to be calculated. The private key is represented as (d, n).

By computing the public and private keys, a secure encryption and decryption system can be established.

Learn more about public and private keys

brainly.com/question/30735080

#SPJ11

2. In many jurisdictions a small deposit is added to containers to encourage people to recycle them. In one particular jurisdiction, containers holding one litre or less have a $0.10 deposit, and containers holding more than one litre have a $0.25 deposit. Write a Python script that reads the number of containers of each size from the user. The script should compute and display the refund that will be received for returning those containers. Format the output so that it includes a dollar sign and displays exactly two decimal places.

Answers

Answer:

Here is the Python program:

small_container = int(input("Enter the number of small containers you recycled?"))

large_container = int(input("Enter the number of large containers you recycled?"))

refund = (small_container * 0.10) + (large_container * 0.25)

print("The total refund for returning the containers is $" + "{0:.2f}".format(float(refund)))

Explanation:

The program first prompts the user to enter the number of small containers. The input value is stored in an integer type variable small_container. The input is basically an integer value.

The program then prompts the user to enter the number of large containers. The input value is stored in an integer type variable large_container. The input is basically an integer value.

refund = (small_container * 0.10) + (large_container * 0.25)  This statement computers the refund that will be recieved for returning the small and larger containers. The small containers holding one litre or less have a $0.10 deposit so the number of small containers is multiplied by 0.10. The large containers holding more than one litre have a $0.25 deposit so the number of large containers is multiplied by 0.25. Now both of these calculated deposits of containers of each side are added to return the refund that will be received for returning these containers. This whole computation is stored in refund variable.

print("The total refund for returning the containers is $" + "{0:.2f}".format(float(refund))) This print statement displays the refund in the format given in the question. The output includes a $ sign and displays exactly two decimal places by using {0:.2f} where .2f means 2 decimal places after the decimal point. Then the output is represented in floating point number using. format(float) is used to specify the output type as float to display a floating point refund value up to 2 decimal places.

2. In many jurisdictions a small deposit is added to containers to encourage people to recycle them.

The required code which calculates the amount of refund made by returning the containers written in python 3 goes thus :

small_size = eval(input('Enter number of 1L or less containers to be returned: '))

#prompts user to enter the number of small sized containers to be returned

big_size = eval(input('Enter number of containers greater than 1L to be returned: '))

#prompts user to enter the number of big size containers to be returned

small_refund = (small_size * 0.10)

#calculates the total refund on small sized containers

big_refund = (big_size * 0.25)

# calculates the total refund on big size containers

total_refund = float((small_refund + big_refund))

#calculates the Cummulative total refund

print('Your total refund is $' + '{0:.2f}'.format(total_refund))

#displays the total refund rounded to 2 decimal places.

Learn more :https://brainly.com/question/14353514

2. In many jurisdictions a small deposit is added to containers to encourage people to recycle them.

(1 point) you are the head of a division of a big silicon valley company and have assigned one of your engineers, jim, the job of devising an algorithm to sort through an english text of n words and convert it into an esperanto document. jim comes up with an algorithm which takes 2n2 2n bit operations to handle an input text with n words. suppose the computers in your business can handle one bit operation every nanosecond (1 nanosecond

Answers

Answer:

Explanation:

a) 2n^2+2^n operations are required for a text with n words

Thus, number of operations for a text with n=10 words is 2\cdot 10^2+2^{10}=1224 operation

Each operation takes one nanosecond, so we need 1224 nanoseconds for Jim's algorithm

b) If n=50, number of operations required is 2\cdot 50^2+2^{50}\approx 1.12589990681\times 10^{15}

To amount of times required is 1.12589990681\times 10^{15} nanoseconds which is

1125899.90685 seconds (we divided by 10^{9}

As 1$day$=24$hours$=24\times 60$minutes$=24\times 60\times 60$seconds$

The time in seconds, our algortihm runs is \frac{1125899.90685}{24\cdot 60\cdot 60}=13.0312 days

Number of days is {\color{Red} 13.0312}

c) In this case, computing order of number of years is more important than number of years itself

We note that n=100 so that 2(100)^2+2^{100}\approx 1.267650600210\times 10^{30} operation (=time in nanosecond)

Which is 1.267650600210\times 10^{21} seconds

So that the time required is 1.4671881947\times 10^{16} days

Each year comprises of 365 days so the number of years it takes is

\frac{1.4671881947\times 10^{16}}{365}=4.0197\times 10^{13} years

That is, 40.197\times 10^{12}=$Slightly more than $40$ trillion years$

Correct option is E

what are the typical job responsibilities of a programmer?

Answers

A programmer is responsible for writing, testing, and maintaining software and computer programs. The following are some of the typical job responsibilities of a programmer:

Writing code: This involves writing code using programming languages such as Python, Java, C++, and others to create software programs and applications that meet specific business or end-user requirements.

Debugging: Programmers are responsible for identifying and fixing errors, or bugs, in their code. This requires a strong understanding of the code and the ability to think logically about how to solve problems.

Testing: Programmers test their code to ensure that it is working as expected and that it meets the specifications. They also perform integration and regression testing to make sure that new changes do not cause unexpected issues.

Maintenance: Programmers are responsible for maintaining existing software programs and applications. This may involve fixing bugs, adding new features, or updating code to meet changing business requirements.

Collaboration: Programmers often work with teams of developers, designers, and project managers to deliver software projects. This requires strong communication and collaboration skills.

Documenting code: Programmers are responsible for documenting their code, so that it is easier for others to understand and maintain. They may also create technical documentation for end-users.

Keeping up to date with technology: Programmers need to keep up to date with new software development tools and technologies in order to remain relevant and to be able to continue to deliver high-quality software.

In conclusion, the role of a programmer is a key one in the software development process. They are responsible for writing, testing, and maintaining software programs, and for ensuring that the software meets specific business and end-user requirements. Effective communication and collaboration skills, along with the ability to think logically and solve problems, are essential for success in this role.

To know more about programmer: https://brainly.com/question/13956629

#SPJ4

8.6 Code Practice: Question 2
Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.

After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.

Answers

Answer:

import random

def buildArray():

   amount = int(input("How many values to add to the array: "))

   array = []

   for i in range(amount):

       array.append(random.randint(10, 99))  

   return array

array = buildArray()

print(array)

def sumArray(array):

   return sum(array)

sum_array = sumArray(array)

print("The total is: ", sum_array)

Explanation:

this gave me 80%

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

import random

def buildArray():

  amount = int(input("How many values to add to the array: "))

  array = []

  for i in range(amount):

      array.append(random.randint(10, 99))  

  return array

array = buildArray()

print(array)

def sumArray(array):

  return sum(array)

sum_array = sumArray(array)

print("The total is: ", sum_array)

See more about python at brainly.com/question/26104476

8.6 Code Practice: Question 2Copy and paste your code from the previous code practice. If you did not
8.6 Code Practice: Question 2Copy and paste your code from the previous code practice. If you did not

on a peer-to-peer network, authentication is the responsibility of the domain
true
false

Answers

False. In a peer-to-peer network, each device is responsible for its own authentication and security. Unlike in a client-server model, there is no centralized domain controller responsible for authentication.

In a peer-to-peer network, all devices are equal and share resources, such as printers or files, without relying on a central server. This means that each device must authenticate itself to access resources shared by other devices on the network. For example, if a computer wants to access a shared folder on another computer, it must provide valid login credentials to that computer to prove its identity and gain access.

Because there is no central authority in a peer-to-peer network, each device must also be responsible for its own security. This includes setting up firewalls, installing antivirus software, and regularly updating software to protect against vulnerabilities.

Overall, a peer-to-peer network can be less secure than a client-server model since there is no centralized control and each device is responsible for its own authentication and security.

Learn more about network here:

https://brainly.com/question/30672019

#SPJ11

how do i put pinned app to thr main screen​

Answers

Answer:

Go to the screen you want to pin.

Swipe up to the middle of your screen. ...

At the top of the image, tap the app's icon.

Tap the Pin .

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching

Answers

The frame forwarding method that receives the entire frame and performs a CRC (Cyclic Redundancy Check) check to detect errors is C: the store-and-forward switching method.

What is the store-and-forward switching?

In store-and-forward switching, the switch receives the entire frame, checks it for errors using the CRC check, and then forwards it out the appropriate port. If errors are detected, the frame is discarded. This method ensures that only error-free frames are forwarded, which helps to prevent network congestion and reduces the likelihood of data corruption.

Therefore, Cut-through switching and fast-forward switching are both methods of forwarding frames without performing a full error check, which can lead to errors being propagated through the network. Fragment-free switching is a modified version of cut-through switching that only reads the first 64 bytes of a frame before forwarding, which can help to reduce the chances of forwarding a frame with errors.

Read more about switching here:

https://brainly.com/question/30214142

#SPJ1

in 3-5 sentences,desribe how technology helps business professionals to be more efficient

Answers

Explanation:

it saves time by providing affordable communication, easy to use by helping business people to advertise their goods and services online, they can easily communicate with their business partners anywhere in the world easily.

Technology can play an important part in creating spare and effective processes. Communication technology helps business professionals give better client service for products-grounded companies. You can fluently attend to your client's complaints with virtual assistants and break their issues.

Hope this helps :)

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1


Stephen is slowing down as he approaches a red light. He is looking in his mirror to switch lanes and misjudges how close Keisha's car is, rear-ending her car. When
they get out and assess the damage, Keisha's bumper will need to be replaced. What type(s) of insurance could Stephen use to cover this accident? Explain.
Krisha had some discomfort in her neck at the time of the accident but thought it was minor and would go away. A week or so after the accident, Keisha finally goes
What t) of insurance could Keisha use to cover this accident?

Answers

The type of insurance that Stephen could use to cover this accident is known as liability coverage

What t) of insurance could Keisha use to cover this accident?

The insurance that Keisha could use to cover this accident is personal injury protection.

In the case above, The type of insurance that Stephen could use to cover this accident is known as liability coverage as damage was one to his property.

Learn more about Property Damage from

https://brainly.com/question/27587802

#SPJ1

Other Questions
a sales representative calls on four hospitals in westchester county. it is immaterial what order he calls on them. how many ways can he organize his calls? Color blindness is a sex-linked recessive disorder. If a boy is color blind but both of his parents have normal vision, determine the genotype of his father. (please hurry this is timed. all sus links will be reported.) A pentagon is made from a square and isosceles triangle A firm's income statement included the following data. The firm's average tax rate was 20%. (Round each step to the nearest dollar.) a. What was the firm's net income? b. What must have been the firm's revenues? c. What was EBIT? TIME REMAINING 54:08 If a cup of coffee is at 90C and a person with a body temperature of 36C touches it, how will heat flow between them? from the hand to the cup from the cup to the hand from the cup to the surrounding air from the hand to surrounding air what is the primary reason that globalization leads to greater global pollution? question 11 options: environmental protection is expensive, and reduces a company's competitiveness in the global market. increased carbon monoxide output results from both industrialization and infrastructure development. environmental regulations are enforced by nations rather than an international organization. companies that outsource and offshore their production have to use more energy to transport their finished goods. HELP ASAP......find the slope of the line that passes through the two points (-44.42,5.1) and (4.42,4) How did education change during the1920s?A. Only women could teach in the high school'setting.B. There was a movement to end public education inAmerica.C. There was a growing need to have multiple grade levelsand classrooms.D. High schools would eliminate vocational courses. i'm new to ap human geography and i need help. this assignment is due tomorrow. Why did American American wanted to fight for the union side A Sailor's eligibility for advancement to a higher paygrade is determined by what individual? if A=(-2, -4) and B=(-8, 4), then what is the length of segment AB Help!!!!!! What is the absolute value of Point A labelled on the number line? Drag and drop the answer into the box to match the correct statement. imagine you are preparing to take a history exam. based on what you know about sleep, it is probably in your best interest to follow which plan of action? Mackie Services operates a website that links experienced statisticians with businesses that need data analyzed. Statisticians post their rates, qualifications, and references on the website, and Mackie receives 25% of the fee paid to the statisticians in exchange for identifying potential customers. Hoffman Associates contacts Mackie and arranges to pay a consultant $1,500 in exchange for analyzing some data. Mackie's income statement would include the following with respect to this transaction:_________a. Revenue of $1,875 and cost of services of $1,500b. Revenue of $1,500c. Revenue of $1,500, and cost of services of $1,125d. Revenue of $375 What was Betty White's net worth when she passed away? Comment on the fact that the summer monsoon is both a blessing and a curse for the people of India 1) Which characteristics most likely provide an advantage for a career as an art teacher?Question 1 options:dislikes children, dislikes mess, intolerant of noise, and creates computer graphicsorganized, neat, quiet, and likes to paint houses in spare timeenjoys children, is flexible, competent in a variety of art forms, and is energeticenjoys art museums, reads often, hard worker, is a part-time photographer Which method of measurement would be accurate but lack precision?A. Measuring a volume of water by estimating the size of thecontainerB. Measuring a volume of water using a graduated cylinder that canbe read to nearest mLC. Measuring air temperature with a thermometer that has just beentaken out of hot waterD. Measuring air temperature with a thermometer that can be read tothe nearest degree and is calibrated to the correct temperature explain how this is an example of polygon similarity postulate, (ai answers not allowed, do not be selfish and ruin people's grades with chatGPT generated answers, weirdos)