What is the output of the following Python program?
User Generated
nnebaw9999
Computer Science
Description
The answer is given, but I don't know why. If someone can give me an explanation on this, that would be greatly appreciated.
Unformatted Attachment Preview
CS177 Spring 2015
Midterm 2 - Page 2 of 19
1. What is the output of the following Python program?
def myFunc ( matrix ) :
x = matrix [ 0 ] [ 0 ]
for i in range ( len ( matrix ) ) :
for j in range ( len ( matrix [ 0 ] ) ) :
i f i == j and x < matrix [ i ] [ j ] :
x = matrix [ i ] [ j ]
print ( x )
matrix = [ [ 5 , 0 ,
[7 , 0 ,
[3 , 4 ,
[1 , 2 ,
myFunc ( matrix )
A. 0
B. 1
C. 11
D. 17
E. 20
10 , 2 0 ] ,
17 , 3 ] ,
9 , 15] ,
6, 11]]
April 02, 8pm-9pm
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Northern Virginia Community College Firewall Configuration Project
This week we continue learning how Windows boxes become exploited and how to harden them.Learn About Firewalls·Watch a Li ...
Northern Virginia Community College Firewall Configuration Project
This week we continue learning how Windows boxes become exploited and how to harden them.Learn About Firewalls·Watch a LinkedIn Learning video about firewalls:Firewall Administration Essential Training with Sean Colins·Watch another LinkedIn Learning video about device security:Securing Smart Devices from the course: CompTIA Security+ (SY0-501) Cert Prep: 3 Architecture and Design with Mike Chapple·Watch yet another (yes, another) LinkedIn Learning video about TCP and UDP connections:TCP and UDP from the course: CompTIA Network+ (N10-007) Cert Prep: 4 Making TCP/IP Work·Research the terms: Firewall DMZ, Cisco ASA, Stateful Packet Inspection, Proxy Server
Help to secure the box.·Search the internet for different firewall models and choose one that is appropriate for your project.·Open up Packet Tracer and drop in your firewall. If you picked a model that is not available in the program, drop in something similar and give it the name of the model you have chosen.·Configure the firewall as necessary.oHint – If you are offering any services outside of the internal network, you will want to configure the firewall to have a DMZ.·Check your routing and ensure that things are still working! If services cannot pass through the firewall check to ensure that you have proper incoming and outgoing rules set.·Update your configuration management report to show the changes to the network as needed.oBe prepared to explain whether you think this is effective system administration or not.For your task, submit the results from step 2.·Submit the results from step 2 as your deliverable.
5 pages
It 510 Module Two Case Study 1
The idea of auto insurance claim processing has been being practiced since long but it has increased by its frequency in t ...
It 510 Module Two Case Study 1
The idea of auto insurance claim processing has been being practiced since long but it has increased by its frequency in the last two decades due to a ...
31 pages
Final Project Draft
Cyber warfare is the use of technology to attack the computer and the information networks of a given nation, and it can c ...
Final Project Draft
Cyber warfare is the use of technology to attack the computer and the information networks of a given nation, and it can cause equal harm such as ...
ITS 441 Colorado State University Cloud Security and Tools Paper
Please read the scenario below and then respond to the question asked, through using references to support your rational ...
ITS 441 Colorado State University Cloud Security and Tools Paper
Please read the scenario below and then respond to the question asked, through using references to support your rationale. Data security is a major issue in any cloud computing platform.
What are some of the measures that can be taken to ensure that data in a
cloud environment is secure? Include techniques for data-at-rest vs.
data-in-transit encryption.Keep in mind this is academic writing and should be written in the
third person, and should not include unsubstantiated opinions, but
rather facts and theories. Your well-written paper must adhere to the
following parameters:Be 3-4 pages in length, not including the title and reference pages.Cite three scholarly references. Remember, you must support
your thinking and/or opinions and prior knowledge with references; all
facts must be supported and in-text references used throughout the
assignment must be included in an APA-formatted reference list.Ensure that your assignment is formatted according to APA
Similar Content
TCC GPUs Applications in Artificial intelligence Research Paper
I have attached the required file.........................................................
UALR Virtualization Creation of Virtual Versions Server Discussion
Requirements:Discuss any two (2) topics each from Chapter 8 and Chapter 9List each topic as an APA Level 1 Heading (75 wor...
University of Cumberlands Week 2 Enterprise Risk Management Discussion
I need 1 Document for the discussion and should be STRICTLY PLAGIARISM FREE.DISCUSSION TOPIC:Discussion Length (word count...
Summation of Integers – using functions in C++
COSC 111 Assignment 6 (Fall 2014)(1).pdf ...
How Oracle 12c advances the security discussion - Project presentation with 12 slides and single page summery
Project consists of a presentation with 12 slides, one page single-spaced summary, and a five source annotated reference l...
ECS32A University of California Davis Binary String Project
Must need to use recursion string. Set up a loop to re-run the input program if the user input doesn't have '1' or doesn't...
New Data 1
Security of vital data gathered by the government is a gross violation of policies that guide the process of handling info...
Topics Related To Technology Links
https://books.google.com/books?hl=en&lr=&id=L0NuCQAAQBAJ&oi=fnd&pg=PA3&dq=Shaw,+M.,+Blan ......
20200208210851risk Assessment
Risk assessment refers to a systematic examination of a job, a process or a task to identify risk factors that can cause h...
Related Tags
Book Guides
Unf*ck Yourself
by Gary John Bishop
Enders Game
by E. M. Forster
The Scarlet Letter
by Nathaniel Hawthorne
Brave New World
by Aldous Huxley
Of Mice and Men
by John Steinbeck
Milkweed
by Jerry Spinelli
The Point of it All - A Lifetime of Great Loves and Endeavors
by Charles Krauthammer
Orphan Train
by Christina Baker Kline
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Northern Virginia Community College Firewall Configuration Project
This week we continue learning how Windows boxes become exploited and how to harden them.Learn About Firewalls·Watch a Li ...
Northern Virginia Community College Firewall Configuration Project
This week we continue learning how Windows boxes become exploited and how to harden them.Learn About Firewalls·Watch a LinkedIn Learning video about firewalls:Firewall Administration Essential Training with Sean Colins·Watch another LinkedIn Learning video about device security:Securing Smart Devices from the course: CompTIA Security+ (SY0-501) Cert Prep: 3 Architecture and Design with Mike Chapple·Watch yet another (yes, another) LinkedIn Learning video about TCP and UDP connections:TCP and UDP from the course: CompTIA Network+ (N10-007) Cert Prep: 4 Making TCP/IP Work·Research the terms: Firewall DMZ, Cisco ASA, Stateful Packet Inspection, Proxy Server
Help to secure the box.·Search the internet for different firewall models and choose one that is appropriate for your project.·Open up Packet Tracer and drop in your firewall. If you picked a model that is not available in the program, drop in something similar and give it the name of the model you have chosen.·Configure the firewall as necessary.oHint – If you are offering any services outside of the internal network, you will want to configure the firewall to have a DMZ.·Check your routing and ensure that things are still working! If services cannot pass through the firewall check to ensure that you have proper incoming and outgoing rules set.·Update your configuration management report to show the changes to the network as needed.oBe prepared to explain whether you think this is effective system administration or not.For your task, submit the results from step 2.·Submit the results from step 2 as your deliverable.
5 pages
It 510 Module Two Case Study 1
The idea of auto insurance claim processing has been being practiced since long but it has increased by its frequency in t ...
It 510 Module Two Case Study 1
The idea of auto insurance claim processing has been being practiced since long but it has increased by its frequency in the last two decades due to a ...
31 pages
Final Project Draft
Cyber warfare is the use of technology to attack the computer and the information networks of a given nation, and it can c ...
Final Project Draft
Cyber warfare is the use of technology to attack the computer and the information networks of a given nation, and it can cause equal harm such as ...
ITS 441 Colorado State University Cloud Security and Tools Paper
Please read the scenario below and then respond to the question asked, through using references to support your rational ...
ITS 441 Colorado State University Cloud Security and Tools Paper
Please read the scenario below and then respond to the question asked, through using references to support your rationale. Data security is a major issue in any cloud computing platform.
What are some of the measures that can be taken to ensure that data in a
cloud environment is secure? Include techniques for data-at-rest vs.
data-in-transit encryption.Keep in mind this is academic writing and should be written in the
third person, and should not include unsubstantiated opinions, but
rather facts and theories. Your well-written paper must adhere to the
following parameters:Be 3-4 pages in length, not including the title and reference pages.Cite three scholarly references. Remember, you must support
your thinking and/or opinions and prior knowledge with references; all
facts must be supported and in-text references used throughout the
assignment must be included in an APA-formatted reference list.Ensure that your assignment is formatted according to APA
Earn money selling
your Study Documents