Create a module called fibonaccitest

Assignment Help Basic Computer Science
Reference no: EM131252438

Having issues with this assignment. Can't get the correct return for 4 part 1. Please help?!

  1. Create a module called fibonacciTest.
  2. In the module, write a function called getFibSeq that:
    1. Prompts the user for a valid input
    2. Returns a list of the fibonacci sequence up to that number
  3. Write a try-catch block that will catch the two exceptions listed in #4 below
  4. Write the following print statements to verify that the function and try-catch work
    1. with user input: 100print out [1,1,2,3,5,8,13,21,34,55,89]
    2. Exception 1: with user input: -1print out 'Input must be greater than 0'
    3. Exception 2: with user input: 'hello'print out 'Sorry, integer greater than zero only'

Reference no: EM131252438

Questions Cloud

How are the differences in these lives made manifest : How are such radical differences in the conditions of life justified? In other words, how is such dramatic inequality accepted? Are such inequalities ever justified? When? Why or why not? Though not as dramatic as the inequality between slave and ma..
Elliptical-shaped land : You are given an elliptical-shaped land and you are asked to choose n arbitrary points on its boundary. Then you connect each point with every other point using straight lines, forming n(n - 1)/2 connections. What is the maximum number of pieces o..
How you would approach issue of designing an entrance exam : Discuss how you would approach the issue of designing an entrance exam to avoid a much lower pass rate for minority candidates than non-minority candidates.
Were any of the amendments violated : An investigator plays an important role in building a case for trial. With that role comes an important responsibility to ensure he or she has obtained a confession from the actual perpetrator of the crime.
Create a module called fibonaccitest : Create a module called fibonacciTest. In the module, write a function called getFibSeq that: Prompts the user for a valid input Returns a list of the fibonacci sequence up to that number
Are there other pairs of strategies : Can the pair of strategies you found in (b) be part of a perfect Bayesian equilibrium? -  Are there other pairs of strategies that can be part of a perfect Bayesian equilibrium?
Setting for volts-division : A pulse waveform is measured using an oscilloscope. If the input is 4.0 V and signal covers 2 vertical divisions, what is the setting for volts/division?
Permissions associated with them and therefore : A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and therefore aren't secure. Why is this?
Describe how you would address these issues : Discuss how you would incorporate these ideas into managing your organization. What are the benefits and drawbacks of managing in this manner?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How should you prepare for this meeting

Should you defend your strict reporting procedures or revert to the former reporting process for the "sake of consistency in the numbers," as several people have urged?

  Write the code to compute s on the basis of these values

In physics, a common useful equation for finding the position s of a body in linear motion at a given time t, based on its initial position s0, initial velocity v0, and rate of acceleration a, is the following:

  Hardware and software used to support personal

Write a 4-6 page paper describing the hardware and software used to support personal, workgroup, and enterprise computing within your current organization, an organization with which you are familiar, or an organization that you can interview to g..

  Web about toutorial for cooking saudi food

Will develop a web about toutorial for cooking Saudi food , and have a hard time writing a planing project for my topic. Follow these link in order to complete the assignment Her is the requirements for the assignment This assignment has two part..

  Dos attacks and password cracking

Identify three (3) DoS attacks and analyze the way in which each attack takes advantage of the interworking of the transport protocols (e.g.,TCP, IP, and UDP) and exploits the protocol's  vulnerabilities. Describe the protocols used for each attac..

  Research from stanford business school

The recent research from Stanford Business School suggests workplaces are a major cause of psychological and physical ill health and that the workplace could literally be killing us? What 3 solutions could/would a responsible employment relations ..

  Implementation of self-adjusting lists

Write a linked list implementation of self-adjusting lists. Suppose each element has a ?xed probability, pi, of being accessed. Show that the elements with highest access probability are expected to be close to the front.

  The code to implement the singleton pattern is complex

The object-oriented approach to user-centered design focuses on users and their work by identifying actors, use cases, and scenarios followed when using the system..

  What is javaserver pages

What is JavaServer Pages? Why Use JSP? Advantages of JSP?

  What is the black stack

Read this article http://www.e-flux.com/journal/the-black-stack Write 500 words minimum for each prompt below. Keep your copy Ratios below 30%.  What is the "Black Stack"? Discuss

  The various programming paradigms

Explain the characteristics of the various programming paradigms

  What might happen if these substeps were reversed

What might happen if these substeps were reversed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd