Write a function called height_range that accepts a list of integers representing heights in inches as an argument and returns the the difference between the tallest height and the shortest height. Assume that all heights are positive values.

Answers

Answer 1

CODE

def height_range(L):

shortest = min(L)

tallest = max(L)

return tallest - shortest

]

Learn more about functions here:

https://brainly.com/question/24846399

#SPJ4


Related Questions

many instances of equipment failure, downtime, software and data corruption, are the result of .

Answers

This is most likely due to power failure

internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel

Answers

For internet-based developmnent many applications require substantial desktop computing power and resources, so the correct answer is option (c).

As a result, we can observe that a standard systems development environment involves the usage of a significant portion of the desktop's processing power and resources, both of which are being utilised by many apps simultaneously.

The conventional systems development process is available to any organisation that needs to create a system. To achieve some outcomes and produce the needed system, system designers and developers must follow and finish a series of steps in these techniques.

The planning, system analysis, system design, development, implementation, integration, testing, and operations and maintenance phases of the systems development life cycle are included.

Learn more about internet-based development:

https://brainly.com/question/15100546

#SPJ4

The complete question is ''Which of the following is true of a traditional systems development environment?​ a. ​ Systems are developed and delivered in an Internet-based framework such as .NET or WebSphere. b. ​ Systems are easily scalable and can run on multiple hardware environments. c. ​ Many applications require substantial desktop computing power and resources. d. ​ Internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel''.

How does the web effect your daily life?

Answers

Answer:

The web affects our daily life because we rely a lot on the internet to do a lot for us. An example would be, How to make a Blueberry Cake. Or, "How do I get to the coffee shop." The Internet helps us a lot in our daily life. The Internet was made to be Useful and Entertaining. And without the Internet, People would still be lost traveling to another state or trying to make a cake.

Help me please I dot know how to do This i don’t understand

Answers

Answer:

define then prepare then try then reflect these are the ways to solve other problems I don't think it's a question

that, given a string s representing the total excess billables and an array b consisting of k strings representing the undiscounted bills for each customer. the return value should be an array of strings r (length m) in the same order as b representing the amount of the discount to each customer.

Answers

Using the knowledge in computational language in python it is possible to write a code that  a string s representing the total excess billables and an array b consisting of k strings.

Writting the code:

def solution(A):

answer = 0

current_sum = 0

#Currently there is one empty subarray with sum 0

prefixSumCount = {0:1}

for list_element in A:

   current_sum = current_sum + list_element

   if current_sum in prefixSumCount:

       answer = answer + prefixSumCount[current_sum]

   

   if current_sum not in prefixSumCount:

       prefixSumCount[current_sum] = 1

   else:

       prefixSumCount[current_sum] = prefixSumCount[current_sum] + 1

if answer > 1000000000:

   return -1

else:

   return answer

See more about python at brainly.com/question/18502436

#SPJ1

write a function fullwords(s) that returns a string no longer than 20 characters. if the string s is longer than 20 characters, just truncate at the space closest to the 20th position (so no word is truncated) and return it. if the string s is shorter 20 characters, just return it unchanged.

Answers

Assuming you mean a function that truncates a string to 20 characters:

function fullwords(s){

if (s.length > 20) {

//find the 20th character

var char20 = s.charAt(19);

//if it's a space, return the string up to that point

if (char20 == " ") {

return s.substring(0, 20);

}

//if it's not a space, find the closest space

else {

var spaceBefore = s.lastIndexOf(" ", 18);

return s.substring(0, spaceBefore);

}

}

//if the string is shorter than 20 characters, return it unchanged

else {

return s;

}

}

To use fullwords(), simply pass in a string as the only argument. The function will then return a string that is no longer than 20 characters. If the string you passed in was shorter than 20 characters, it will be returned unchanged.

Learn more on string here:

https://brainly.com/question/28290531

#SPJ4

when writing a disaster plan for implementation during a mass casualty incident (mci), which percentage of victims often require admission to the hospital for further treatment?

Answers

In writing a disaster plan for implementation during a mass casualty incident (mci), 30 percent of victims often require admission to the hospital for further treatment.

What is the meaning of disaster plan?

The disaster plan is known to be a constantly form of maintained document that is known to be composed of the  ways, procedures as well as the information required to hinder , mitigate, prepare for, as well as respond to, and get over from any emergencies.

Therefore, In writing a disaster plan for implementation during a mass casualty incident (mci), 30 percent of victims often require admission to the hospital for further treatment.

Learn more about disaster plan  from

https://brainly.com/question/2916834

#SPJ1

why is it important for software manufacturers to update their programs to work with the latest operating systems? compuscholar

Answers

It is important for software manufacturers to update their programs to work with the latest operating systems because: D. None of these are true.

What is an operating system?

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

Additionally, an operating system serves as the intermediary (bridge) between software application and hardware, especially by making sure the resources required to function are allocated.

In conclusion, we can logically deduce that it is not compulsory for software manufacturers to update their programs to work with the latest operating systems.

Read more on operating system here: brainly.com/question/22811693

#SPJ1

Complete Question:

Why is it important for software manufacturers to update their programs to work with the latest operating systems?

answer choices

If they don't, the program may not work on newer computers and could lose customers

Because it is cheaper to run programs on newer computers

Because everyone automatically switches to the latest operating systems as soon as they are released

None of these are true

Given a string variable s that has already been declared, write some code that repeatedly reads a value from console input into s until at last a y or y or n or n has been entered.

Answers

Answer:

s = "";

while (!(s=="Y" || s=="y" || s=="N" || s=="n"))

{

   cin >> s;

}

The code for the String variable is described below.

To achieve the desired functionality of repeatedly reading values from console input into the variable s until either 'y' or 'n' has been entered, you can use a loop.

Here's an example of how you can implement this in Python:

s = ""

while s not in ('y', 'n'):

   s = input("Enter a value (y/n): ")

# At this point, the user has entered 'y' or 'n'

print("You entered:", s)

In this code, the 'while' loop will continue executing as long as the value of s is not 'y' or 'n'.

The 'input()' function prompts the user to enter a value, and the input is stored in the variable s. The loop will keep repeating until the condition s not in ('y', 'n') is false.

Once the loop exits, it means the user has entered either 'y' or 'n', and you can proceed with further processing or printing the value if needed. In the example above, it simply prints the value of s using print().

Learn more about String variable click;

https://brainly.com/question/31751660

#SPJ2

by marking up a navigation bar using the element(s), you can add semantic information that helps user agents more accurately render it

Answers

ul, li

By marking up a navigation bar using the ul and li element(s), you can add semantic information that helps user agents more accurately render it.

For example, a user agent could use the ul element to identify a navigation bar as a list of links, and the li element to identify each link in the list.

This would help the user agent render the navigation bar more accurately, and would also make it easier for users to navigate the page.

Learn more here:

https://brainly.com/question/7153205

#SPJ4

after teaching a group of students about measuring systems and drug calculations, the instructor determines that the teaching was successful when the students identify which system as most widely used?

Answers

The instructor determines that teaching is successful when students can identify which metric system is the most widely used system.

The metric system is a measurement system for something that is done in a study and calculation. An example of a metric system is the meter used to measure length, grams to measure weight, milliliters to measure volume.

In this case, we can take an example from the application of the metric system in the world of health. A nurse uses the metric system to calculate doses and uses the liter as the base unit for measuring fluids.

Learn more about Metric System here https://brainly.com/question/1764307

#SPJ4

All-in-one computers are easier to service and upgrade but occupy more space than desktop computers. True or false?.

Answers

All-in-one computers are easier to service and upgrade but occupy more space than desktop computers: false.

What is a desktop computer?

A desktop computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

Also, desktop computer plugs into a standard wall outlet (socket), converts alternating current (AC) to direct current (DC), and provides the electrical power that is required to drive all the system unit components.

Generally, desktop computers are fitted with a power supply unit (PSU) that is located within the system unit, external monitor, keyboard, which makes them to occupy more space than all-in-one computers.

Read more on all-in-one computers here: https://brainly.com/question/4581809

#SPJ1

Mary needs to rename her report. Txt file to final_report. Txt. Which command will allow her to do this?.

Answers

Answer:

ren report.txt final_report.txt

Explanation:

If mary wants to rename her report then she has to use this command, ren report.txt final_report.txt.

What is Report?

In comparison to essays, reports are more rigidly formatted and intended to be read quickly and accurately, albeit they are not always read from beginning to end.

A report is essentially a brief, direct document that is written with a specific target and purpose in mind. In general, it describes and analyzes a situation or problem and frequently offers suggestions for the next action. Because it is a factual paper, it must be concise and organized.

Take advantage of the tables of contents (ToC), page numbers, and styled headings capabilities that modern word processors offer since they update automatically as you move, add, or delete sections from your report.

To know more about the Report follow the link.

https://brainly.com/question/23326350

#SPJ5

Oliver is shopping at his local grocery store. Instead of joining a checkout line manned by a human, he joins a checkout line where he has to
scan the food, but the rest is done by a computer. What Is Oliver experiencing while the computer does the checkout for him instead of a
human cashier? A:social media B: open education resources C:outsourcing D:automation

Answers

D: automation

Not A, B or C :)

you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard drive plugged in. what should you do first? turn on the computer and take screenshots. unplug the external usb hard drive. place the computer in a faraday bag. thoroughly document the state of the equipment.

Answers

The first thing to do is to thoroughly document the state of the equipment before it is hidden which is essential to comply with chain of custody procedures. Failure to do so will render the evidence collected unacceptable.

Security+ can be defined as an entry-level cybersecurity credential offered by the non-profit trade association CompTIA. This is usually the first certification in information security that an IT professional earns. By having Security+, you may get more job opportunities, as you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is an exam that tests the applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam can be defined as a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/14728048

#SPJ4

typically provide students with a general understanding of information technology, including computer platform technologies, data management systems, and basic programming. A Master Degree programs B Cisco degree programs C Associate degree programs D CertaPort degree programs​

Answers

Answer:

the correct answer is ''associate degree programs"

Explanation:

because i took the test and got this answer right. hope this helps :)

which command will reset a next generation firewall to its factory default settings if you know the admin account password?

Answers

If you know the admin account password, a command which will reset a next generation firewall to its factory default settings is: c. request system private-data-reset.

What is a firewall?

A firewall can be defined as a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

This ultimately implies that, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

In Computer technology, "request system private-data-reset" is a command which can be used to reset a next generation firewall to its factory default settings provided that the end user knows the admin account password.

Read more on firewall here: brainly.com/question/16157439

#SPJ1

Complete Question:

Which command will reset a next generation firewall to its factory default settings if you know the admin account password?

Select one:

a. reset system settings

b. reload

c. request system private-data-reset

d. reset startup-config

In linux, in the /dev directory, devices that start with sd can be associated with what type of device?

Answers

Answer:

Hard drives.

USB drives.

Memory sticks.

What are the two most common request methods that a security professional will encounter?

Answers

While GET and POST are by far the most common methods that are used to access information provided by a web server, there are a variety of other methods that may also be supported, and can sometimes be exploited by attackers.

the correct way to enter a cell address (for cell d3) in excel when you want the row to always stay the same, but you want the column to change when you copy to the right or left is? you don't need to include the =.

Answers

The correct way to enter a cell address (for cell D3) in Microsoft Excel when you want the row to always stay the same, but you want the column to change when you copy to the right or left is: D$3.

What is Microsoft Excel?

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., for analyzing and displaying spreadsheet documents by using rows and columns in a tabulated format.

What is a spreadsheet?

In Computer technology, a spreadsheet can be defined as a document which comprises cells that are arranged in a tabulated format with rows and columns. Also, a spreadsheet is typically used in various field to do the following on a data:

SortCalculateFormatArrange

In this scenario, you should use the formula D$3 to enter a cell address (for cell D3) in Microsoft Excel if you want the row to always stay the same while the column changes when you copy to the right or left.

Read more on Excel spreadsheets here: https://brainly.com/question/2996234

#SPJ1

you are given an array on integers number and a positive intgere k, count the number of contiguous subarrays having k duplicate pairs

Answers

Using the knowledge in computational language in python it is possible to write a code that array on integers number and a positive intgere k, count the number of contiguous subarrays having k duplicate pairs

Writting the code:

def duplicatesOnSegment(a):

ans = 0

for i in range(len(a)):

for j in range(i+1, len(a), 1):

x = a[i:j+1]

flag = 0

for k in range(len(x)):

if x.count(x[k]) < 2:

flag = 1

if flag == 0:

ans += 1

print(ans)

arr = [0, 0, 0]

duplicatesOnSegment(arr)

See more about python at brainly.com/question/18502436

#SPJ1

how many ip addresses does a class c network have? 1 point 1 address 65,536 addresses 256 addresses 16,777,216 addresses

Answers

Local hosts belonging to class C have 256 possible addresses.

There are three classes of TCP or IP networks, and each class of TCP or IP networks uses the 32-bit IP address space differently. The classes are as follows:

Class A

The first eight bits of the IP address as part of the network are used for the class A network number.

Class B

16 bits for the network number and the host number is used for the class B network number.

Class C

24 bits for the network number and 8 bits for the host number are used for class C network numbers.

Learn more about networking class here https://brainly.com/question/13182181

#SPJ4

which category of telecommunications system is in a central location, takes all emergency calls, and then routes calls to appropriate dispatchers?

Answers

The category of telecommunications system that is in a central location, takes all emergency calls, and then routes calls to appropriate dispatchers is Public Safety Answering Point (PSAP).

What is a PSAP meaning?

PSAPs (Public Safety Answering Points) is known to be a body that is known to be responsible for the role of accepting 911 calls as well as processing those calls based on  a specific operating policy.

Therefore, based on the above, The category of telecommunications system that is in a central location, takes all emergency calls, and then routes calls to appropriate dispatchers is Public Safety Answering Point (PSAP).

Learn more about telecommunications from

https://brainly.com/question/26152499

#SPJ1

When conducting a database search, if the initial search does not return relevant results, what should you do?.

Answers

Answer:

Retry the search

Explanation:

pls help. this is for my keyboarding and applications class.

Answers

Answer:

Answer is listed below

Explanation:

icons - pictures that represents applications, files, or folders

Quick Launch - place where frequently used programs can be opened

Start menu - list of items that can be opened by clicking on their names

system tray - shows the programs that are always running

taskbar - displays open applications or files

should variables that contain numbers always be declared as integer or floating-point data types? why or why not? name potential examples.

Answers

No, it is not necessary that variables that contain numbers should always be declared as integer or floating-point data types.

It is not necessary that variables that contain numbers should be declared as integer and floating point data types. Because number can be declared with different data types.  As we know that data type is a vital aspect in programming. It describes the type of a value that is contained in a variable. It is the data type based on which memory is allocated to a number or any type of variables.

Numbers can be whole decimal/fractional, signed, unsigned, small, and long. Simply, they exist in a variety of values. According to their values range, the amount of memory is reserved.

Different programming languages offer different data types to store numbers, depending on their types and size. Let’s consider some examples of data types used in programming languages in order to declare variables holding numbers.

In Python int, float, and complex are the data types used to declare number type variables.SQL uses INTEGER, SMALLINT , BIGINT , NUMERIC() , and DECIMAL() data types for numbers. To deal with number type variables, Java has six predefined data types, such as int, long, short, byte, float, and double.JavaScript uses a single data type called 'number' to declare numbers.In C++, two fundamental data types, int and float, are used to represent numeric variables. But C++ is not only limited to these two data types. The data type char can also store numbers. Other data types for declaring numbers as variables are derived from int, float and char, such as short int, long int, signed int, unsigned int, double, long double, signed char, unsigned char etc. etc.

So in concluding remarks, declaring a number type variable is not only limited to using integers and floating-points data types. Rather it entirely depends on the respective programming language, and size and type of the number to be stored in the variable.

You can learn more about data types at

https://brainly.com/question/13438922

#SPJ4

overcomes the efficiency of triangle routing, at the cost of complexity. uses a correspondent agent.

Answers

Direct routing overcomes the efficiency of triangle routing, at the cost of complexity. uses a correspondent agent.

There are many different routing algorithms that can be used to route data packets across a network. One of the most commonly used algorithms is triangle routing, which is very efficient at routing data packets between three nodes. However, triangle routing can become very complex when there are more than three nodes in the network.

Direct routing uses a correspondent agent to route data packets between two nodes, without going through the intermediate node. This can make direct routing much more complex than triangle routing, but it also eliminates the need for the intermediate node to keep track of the data packets.

Direct routing is often used in networks where there are a large number of nodes, or where data packets need to be routed between nodes that are not all part of the same network. However, it is important to note that direct routing can also be used in smaller networks, where it can be more efficient than triangle routing.

Learn more on Direct routing here:

https://brainly.com/question/27935164

#SPJ4

write code that combines the following variables so that the sentence "you are doing a great job, keep it up!" is assigned to the variable message. do not edit the values assigned to by, az, io, or qy.

Answers

A code which combines the given variables so that the sentence "you are doing a great job, keep it up!" is assigned to the variable message is as follows:

by = "You are"az = "doing a great "io = "job"qy = "keep it up!"message = by+" "+az+io+", "+qy

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

This ultimately implies that, a variable refers to a named location that is used to store data in the memory of a computer. Also, it is helpful to think of variables as a container which holds data that can be changed in the future.

In Computer technology, there are two (2) main methods for assigning or passing variables to functions and these include the following:

Pass-by-value.Pass-by-reference.

Read more on variable here: https://brainly.com/question/12978415

#SPJ1

in what IT pathway would you most likely need to be familiar with the system development life cycle?
A) Information Support and Service
B) Network Systems
C) Programming and Software Development
D) Interactive Media

Answers

Answer:

B) Network Systems

Explanation:

In the Phoenix Wright/Ace Attorney games, you follow the story of a lawyer in a land where the accused are guilty until proven innocent. You play by selecting from lists of responses to crazy fictional courtroom scenes, including playing the defense attorney for a killer whale accused of murder. What is the best description for this game series?

A.
virtual reality game
B.
simulation game
C.
platformer game
D.
visual novel

Answers

The best description for this game series would be option D.) “visual novel.”

A visual novel is an interactive story told through talking and the user’s choosing. In this problem, a visual novel is being described in the context of a player in the role of a lawyer.

Answer:

Explanation:

D. visual novel

Other Questions
XZ is the perpendicular bisector of segment WY. Solve for k. Enter a NUMBER only. Although it is much larger in reality, when wesee Saturn from Earth, it looks like it has adiameter of 20 m. Through a telescope, thediameter looks 9,000 um long. Whatmagnification scale was used? Simplify.[tex]\sqrt{20+5}[/tex] On a map with a scale of 1 inch to 12 feet, the area of a restaurant is 60 in. Han says that the actual area of the restaurant is 720 ftO TrueO False from the fact that cultures have divergent moral beliefs on an issue, it does not logically follow that there is no objective moral truth. The use of the rapidograph and translucent mylar in Julie Mehretu's "Untitled" purposelydraws upon associations witha. ink washesb. block printing c. architectural draftingd. splicing what is the total project budget for design in this time-phased budget? activity july august september october november rfp 34,721 analysis 11,049 33,655 34,388 design 33,718 34,474 26,759 36,328 coding 7,713 34,905 40,244 testing 40,916 896 training 20,958 how many cubic feet water will aquarium A hold 16ft and 8ft 6. Which of the following images best serves asforeshadowing in the passage?O A. the servantOB. the strand of hairO C. the dust in Miss Emily's homeO D. the smell coming from Miss Emily's home What you have to do to be a good writers? To win the annual read-a-thon at his school, Ronald has to read more books than any of hisclassmates over winter break. He starts by reading a lot of sports books. Then, he reads 7mystery books. In all, Ronald reads 25 books for the read-a-thon.Which equation can you use to find the number of sports books n Ronald reads?n+ 7 = 25n - 7 = 25Submit7n = 257= 25Solve this equation for n to find the number of sports books Ronald reads.sports books What new idea did Patrick Henry bring to the First Continental Congress? 5| c + 7 | = -45Absolute Volume Please answer the question in the attachment. Mia spent 6 hours studying for an exam, and she received an A on the exam. Normally, she would have spent that time watching TV instead of studying. Mia figures she could have made a B after studying only 3 hours, but she really wanted an A. What is Mia s marginal cost in terms of TV viewing to move from a B to an A on the exam? Distributive property 3(2x+7) como se llama el tren que va desde San Jose a otras ciudades de costa rica Evaluate the expression if m = 4 , n = 1 , p = 2 , q = 6 , r = 5 , and t = 2 . | 10 7 r + 8 m + 2 p | what rights do you think some americans have that others dont Is this a good starting parigraph for My Pledge To Our Vetreians And tell me what i could change/add My pledge to our veteransNick Lampson states, There is nothing nobler than risking your life for your country. I liked this Quote because it shows how much veterans love their country. Our veterans were the ones that ran towards the danger while we ran away. Every year on November 11 we celebrate Veterans Day which is also the day that officially ended World War 1. These are the men and women that helped keep our country safe and free.They have been fighting for us since 1776. That's more than 225 years ago. My pledge to our veterans is to remember and respect all their sacrifices and ways they built this country.