Answer:
from collections import Counter
def anagram(dictionary, query):
newList =[]
for element in dictionary:
for item in query:
word = 0
count = 0
for i in [x for x in item]:
if i in element:
count += 1
if count == len(item):
newList.append(item)
ans = list()
for point in Counter(newList).items():
ans.append(point)
print(ans)
mylist = ['jack', 'run', 'contain', 'reserve','hack','mack', 'cantoneese', 'nurse']
setter = ['ack', 'nur', 'can', 'con', 'reeve', 'serve']
anagram(mylist, setter)
Explanation:
The Counter class is used to create a dictionary that counts the number of anagrams in the created list 'newList' and then the counter is looped through to append the items (tuple of key and value pairs) to the 'ans' list which is printed as output.
What property must be set on a menu item to have the user activate that option by pressing Ctrl C on the keyboard
Answer:
ShortcutKeys
Explanation:
ShortcutKeys is a term used in computing to describe a combination of two or more keys to perform specific actions in a faster way.
Some shortcut keys have been programmed on the operating system of the computer, while a user can also create some through scripting coding.
For example, Ctrl + B is for Bold, while Ctrl + A is for select all.
Hence, to have the user activate the SHORTCUT option by pressing Ctrl C on the keyboard, a SHORTCUTKEYS property must be set on a menu item
Challenge activity 1.11.1: using constant in expression is not working for me. Can any one help me find the right code?
Answer:
could you please tell me which grde are you in?
An inkjet printer’s output appears to have missing elements. What is the first thing a technician should try if the ink cartridge appears to be full?
Answer:
Check the printing properties or print test page.
Explanation:
In a situation whereby an inkjet printer’s output appears to have missing elements. The first thing a technician should try if the ink cartridge appears to be full to "Check the printing properties."
This helps to serve as a maintenance technique or solve the ink cartridge problems.
Depending on the windows or PC's Operating System. To check the printer's properties on Windows 7, a user will have to click on the “Start” button > Control panel > Devices and Printers. Followed by right-clicking the printer icon and open up “Printer Properties” and click “Print Test Page”
HELP ASAP WITHIN 5 MINUTES
Answer:
A,B, and C
Explanation:
Refer to the exhibit. What kind of NAT is configured on the ASA device?
Answer:
A network administrator has configured NAT on an ASA device
Explanation:
which of the following file formats cannot be imported using Get & Transform
Answer:
The answer to this question is given below in the explanation section.
Explanation:
In this question, the given options are:
A.) Access Data table
B.)CVS
C.)HTML
D.)MP3
The correct option to this question is D- MP3.
Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.
As you know that the GET statement is used to get data from the file and do further processing and transformation.
Which of the following is true about file formats?
A. Open file formats may be either free or proprietary.
B. Open file formats are always free.
C. Free file formats may be either open or closed.
D. Proprietary files are always closed.
Answer:
A
Explanation:
The answer is A mate, if you need any help let me know please
A file extension is also known as the file format. The correct option is A, Open file formats may be either free or proprietary.
What is a file format?A file extension, often known as a file format, is the structure of a file in terms of how the data within the file is arranged on a computer. A file name extension frequently indicates a certain file format as part of a file's name (suffix).
Open formats are also known as free file formats if they are not burdened by any copyrights, patents, trademarks, or other limitations (for example, if they are in the public domain), allowing anybody to use them for any purpose at no monetary cost.
Hence, the correct option is A, Open file formats may be either free or proprietary.
Learn more about File Format:
https://brainly.com/question/21435636
#SPJ2
When we code an algorithm, we need to provide the commands in the order we want the
computer to carry them out.
Answer:
true q it says it needs 20 characters so here you go
Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?
To be a digital media coordinator, Claire needs a bachelor’s degree in _______ digital media, or a related field. She also needs to have knowledge of _______ and emerging digital technologies.
1st blank:
psychology
public relations
finance
2nd blank:
computer programming
computer coding
search engine optimization
Answer:
1. Public Relations
2. Search Engine Optimization
Explanation:
Given that a public relations degree holder can work in various capacities such as Advertising, Media, Event, and Sale promotion position. Hence Claire needs a bachelor’s degree in PUBLIC RELATIONS.
Similarly, given that the knowledge of Search Engine Optimization is crucial in Digital media coordination, as it helps to drive and gain web or online traffic both in quality and quantity.
Hence, Claire also needs to know about Search Engine Optimization.
A user invokes an app that writes a file. The app displays a progress bar that shows how much of the file has been written. Just as the progress bar reaches 50%, the battery fails and the device crashes. When the user reboots the device, he or she discovers that less than 20% of the file has actually been written. Explain why the app reported writing 50%. Frame your answer in terms of the design of I/O device drivers.
Answer:
The app reported writing 50% before the battery fails is because while writing, the data is been saved in the secondary memory via a buffer and not directly to the primary memory ( RAM ) and its returned from the secondary memory via the buffer to the primary memory
Explanation:
The app reported writing 50% before the battery fails is because while writing, the data is been saved in the secondary memory via a buffer and not directly to the primary memory ( RAM ) and its returned from the secondary memory via the buffer to the primary memory
What the app displays as a progress bar is from the Buffer, this is because as the developer was designing the app he wanted the data entry to be very fast hence he had to send the file through a buffer with the aid of a workstation he designed. so if the secondary storage is slow in returning the data back to the primary memory as fast as it entered the secondary memory via the Buffer, Then the percentage of the file that would be displayed as written when the system reboots will be less than what the app displayed before the reboot i.e. 20% < 50%
Which tab should be selected to add a hyperlink within a cell? Home tab Review tab Insert tab Formula tab
Answer:
On the Insert tab
Explanation:
You would select the tab that you want the Hyperlink to be inselect the Insert tabThere you will see a panel that says link press the down arrow than you will see a section that says link again there again you will press the down arrow which will show a option of document you want to add if your looking to add a link form a web browser than at the bottom of the list you will see Insert LinkFrom there you will see a box pops up there you can upload a file from your computer or PCOnce the box pops up you will enter the web browser page address in the box that says addressFrom there press okay then your hyperlink will be in the cell you wantIf you don't know where or what a web browser address is than on the top of the web browser where you would insert what you are searching all you have to do is press it and it will automatically highlight the text than copy and paste the text by holding Ctrl + C to copy and holding Ctrl + V to pasteAnswer:
insert tab
Explanation:
edge 2020
Write code that swaps the first and last elements in a list called my_list. Assume that the list has already been created and contains at least one element.
my_lst = ([1,2,3,4,5,6])
h = my_lst[0]
my_lst[0] = my_lst[-1]
my_lst[-1] = h
print(my_lst)
The code that swaps the first and last elements in a list called my_list is as follows:
my_list = ["break", 14, 15, "john", "black"]
my_list[0], my_list[-1] = my_list[-1], my_list[0]
print(my_list)
Code explanation:The code is written in python.
The first code, we declared a variable named my_list. This variable is a list. The list have values of different data type.The second line we have to swap the first value in the list with the last value in the list.Finally, we print our new swapped list .learn more on python list here: https://brainly.com/question/26104476
The TCP/IP Application Layer and the OSI Application Layer are relevant mainly to programmers, not to network technicians.
True/False
Answer:
Yes they are to programmer
Explanation:
Plz give me brainiest
Answer:
true
Explanation:
Use the set A = { a, b, c ,d } to answer the following questions.
What is the cardinality of A?
What is the power set of ℘(A)?
What is the cardinality of the power set?
What is the power set of A = { }
Answer:
What is the cardinality of A? 4
What is the power set of ℘(A)?
P(A) = {Ф, {a}, {b}, {c}, {d}, {a,b}, {a,c}, {a,d}, {b,c}, {b,d}, {c,d}, {a,b,c}, {a,b,d}, {b,c,d}, {a,c,d},{a,b,c,d}}
What is the cardinality of the power set? 16
What is the power set of A = { }? => {{ }} or {Ф
Explanation:
Given set is:
A = {a,b,c,d}
What is the cardinality of A?
The cardinality of set is the number of elements in the set
Since, set A has four members the cardinality is 4.
i.e.
n(A) = 4
What is the power set of ℘(A)?
The power set of a set consists of all the subsets of a set.
So the power set of A will consist of all subsets of A.
The power set is:
P(A) = {Ф, {a}, {b}, {c}, {d}, {a,b}, {a,c}, {a,d}, {b,c}, {b,d}, {c,d}, {a,b,c}, {a,b,d}, {b,c,d}, {a,c,d},{a,b,c,d}}
What is the cardinality of the power set?
The number of subsets of a set is the cardinality of power set.
As A is 4 members,
Cardinality of Power set of A = 2^4 = 16
What is the power set of A = { }
As A is an empty set, its power set will have only one element (Ф) as member
P(A) = {{ }} or {Ф}
Hence,
What is the cardinality of A? 4
What is the power set of ℘(A)? P(A) = {Ф, {a}, {b}, {c}, {d}, {a,b}, {a,c}, {a,d}, {b,c}, {b,d}, {c,d}, {a,b,c}, {a,b,d}, {b,c,d}, {a,c,d},{a,b,c,d}}
What is the cardinality of the power set? 16
What is the power set of A = { }? => {{ }} or {Ф
plsss help me
give two examples of problems that can occur when sytems do not work properly
Answer:
Explanation:
1. There can be a run out of something ex. The water cycle we could run out of water if evaporation stops happening
2. Something wont happen ex. In a shoe factory if no one is boxing the shoes the shoes don’t get boxed.
Hope this helps
1. Do our shared social experiences lead us to think
communication is a cure-all?
Answer:
Yes
Explanation:
Shared social illustrations have always shown that any problem of any kind can be sorted by communication.
Eg : Whenever societies face any problem - eg recession, the competent people related to that area of problem (representing different interests of various groups also) sit & discuss (ie communicate in detail) about it.
These communications have seen to be solution to all problems world has faced.
Yes, our shared social experiences lead us to think communication is a cure-all.
This is because, helps the individual in shaping their mental and emotional health for the rest of their life.
With shared social experiences , there would be communication among people and it serves as a cure-all.
Therefore, shared social experiences lead us to think communication is a cure-all.
Learn more about social experiences at:
https://brainly.com/question/24452126
The use of information technology to monitor and control a physical process is known as a. numeric control b. information numeric control c. process control d. computer-aided design
Answer:
c. process control
Explanation:
The use of information technology to monitor and control a physical process is known as process control.
Generally, process control is mainly used in manufacturing industries such as food and beverages industries, oil and gas refinery industries, power (electricity) generation industries, chemical processing industries, and wastewater management industries where the production of materials from raw materials are continuously without any interruption.
The main purpose of process control is to ensure that the manufacturing process is done with better quality, consistency, safety standards and efficiency.
Given that a computer required service, what is the probability that it was a laptop? Given that the computer required service, the probability that it was a laptop is nothing?
Complete Question:
A campus bookstore sells both types and in the last semester sold 56% laptops and 44% desktops. Reliability rates for the two types of machines are quite different, however. In the first year, 5% of desktops require service, while 15% of laptops have problems requiring service.
Given that a computer required service, what is the probability that it was a laptop?
Answer:
Probability = 0.084
Explanation:
Given
Laptops = 56%
Desktop = 44%
Service Required (Laptop) = 15%
Service Required (Desktop) = 5%
Required
Determine the probability that a selected computer is a laptop and it requires service.
The question tests our knowledge of probabilities using "and" condition.
What the question requires is that, we calculate the probability of selecting a LAPTOP that REQUIRES SERVICE
Note the capitalised words.
This will be calculated as follows:
Probability = P(Laptop) and P(Service Required (Laptop))
[Substitute values for P(Laptop) and P(Service Required (Laptop))]
Probability = 56% * 15%
[Convert to decimal]
Probability = 0.56 * 0.15
Probability = 0.084
. Linux servers are typically stored in a locked server closet to prevent physical access by unauthorized persons. Describe why these physical restrictions are warranted
Answer:
Following are the solution to this question:
Explanation:
Physical Access to Linux Servers:
Unauthorized staff is denied access to windows server due to various reasonable factors which might damage databases and then all database depends.
Linux distributions handle their servers but it is almost important that they will be protected or hackproof to safeguards their organizations' networks.
Guess if an unwanted staff has access to the server, he/she can be using the device by just placing a simple USB or dragging the information of the database to study it even further. Here that the results stay throughout the possession of even an unauthorized person, whom no organization wants to confront.
Its attacker may also damage that server by installing a virus or any virus mostly on the server. User security can allow unauthorized staff to go on a search and retrieve the database to disc inside the database.
Warranted physical limitations:
All such physical constraints are assured because the company cannot manage a minor error in physical security.
Because conflicts with both the physical limitation will damage its database so much but leave all loopholes free to that same protection of attackers and operators.
Its physical safety guarantee should be maintained by routine server room checks and ensure that every step of safety is undertaken and results are achieved.
/*this function represents
*what karel has to do
*/
function start() {
turnLeft();
buildTower();
turnRight();
if(frontIsClear()){
toMove();
}
while(noBallsPresent();
turnLeft();
buildTower();
}
if(frontIsBlocked()){
goBack();
}
}
/*This represents karel is
*putting down the balls for making the tower
*/
function buildTower(){
putBall();
move();
putBall();
move();
putBall();
}
function
move();
turnRight();
move();
move();
turnLeft();
move();
}
i need help finding the issues
anything
Explanation:
I know what to say this time
Answer:
turn right
Explanation:
i think sorry if it is wrong
A ____________ monitor measures the usage of a cloud-based IT resource by a given cloud consumer for billing purposes.
Answer:
pay-per-use monitor
Explanation:
The pay-per-use monitor mechanism can be described as a measurement of cloud-based IT resource usage which are in line with already defined pricing parameters and which can generate usage logs which are used for the calculations of accumulated fees calculations and are also used for billing purposes. This service uses models that are subscription based and also consumption based.
Write a program to output the following quote by Edsger W. Dijkstra:
"Computer Science is no more about computers
than astronomy is about telescopes"
- Edsger W. Dijkstra
Hint: Remember that the escape characters \n and \" can be used to create new lines and quotation marks in your code.
In python 3.8:
print("\"Computer Science is no more about \ncomputers\nthan astronomy is about telescopes\"\n-Edsger W. Dijkstra")
I hope this helps!
The _________ operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segment register.a) TYPEb) SIZEOFc) OFFSETd) LENGTHOFe) PTR
Answer:
C. Offset.
Explanation:
An offset operator can be defined as an integer that typically illustrates or represents the distance in bytes, ranging from the beginning of an object to the given point (segment) of the same object within the same data structure or array. Also, the distance in an offset operator is only valid when all the elements present in the object are having the same size, which is mainly measured in bytes.
Hence, the offset operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segment register.
For instance, assuming the object Z is an array of characters or data structure containing the following elements "efghij" the fifth element containing the character "i" is said to have an offset of four (4) from the beginning (start) of Z.
What was the name of first computer?
Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as input, and outputs the average and max. Ex: When the input is 15 20 0 5, the output is:
In Python 3.8:
nums = list(map(int, input("Enter your numbers space separated: ").split()))
print(f"The largest number is {max(nums)} and the average of all the numbers entered is {sum(nums)/len(nums)}")
Daiki is creating a database for a paint store. Each color of paint would have its own record which will include the color name price and size. The price of the paint will be in its own a) table b) file c) field d) format
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is c)field.
As we know that the feature of an entity is represented by its attribute in the database table. A database table is a set of records of different fields. Each field represents a row in a database table. Each field can contain a set of attributes related to an entity such as a paint color.
So the price of paint will be in its own field. Because there are different colors in the database table. Each color has its own record in form of a field. As you know that each field is a row in the database table. So, each row has the price of a paint color.
Other options are not correct because:
The table contains a list of fields and each field contains its own paint price. The format and file is something different and does not have any relation with the question scenario.
Answer:
C) Field
Explanation:
I took the test
What is the name of the setting that creates a Green Dashed line and allows you to set angular locks when activation
Answer:
Polar Tracking
Explanation:
Polar Tracking a term or function in AUTOCAD that is used to identify a point closest to a predetermined angle and define a distance along that angle. This helps creates a line (which is a green dashed line). Thereby enabling a user to set angular locks when or during activation.
Hence, in this case, the correct answer to the question is POLAR TRACKING
hai ima guurl andd here r the lyricss to mah favorite song
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Yeah
Shotgun, aimed at my heart, you got one
Tear me apart in this song
How do we call this love
I tried, to run away but your eyes
Tell me to stay oh why
Why do we call this love
It seems like we've been losing control
So bad it don't mean I'm not alone
When I say
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Maybe some part of you just hates me
You pick me up and play me
How do we call this love
One time tell me you need me tonight
To make it easy, you lie
And say it's all for love
It seems like we've been losing control
So bad it don't mean I'm not alone
When I say
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Me and my broken heart
Me and my broken
Yeah, yeah, yeah
It's just me
It's just me
It's just me
Me and my broken heart
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Answer:wow that’s a lot of lyrics but intersting
Explanation:
Answer:
that's a cool song
Explanation:
have a great day:)
Given a type Money that is a structured type with two int fields, dollars and cents. Assume that an array named monthlySales with 12 elements, each of type Money has been declared and initialized. Assume that a Money variable yearlySales has also been declared. Write the necessary code that traverses the monthlySales array and adds it all up and stores the resulting total in yearlySales. Be sure make sure that yearlySales ends up with a valid value, i.e. a value of cents that is less than 100.
Answer:
Attached below is the code
Explanation:
using namespace std;
struct Money
{
int dollars;
int cents;
};
int main()
{
struct Money monthlySales[12];
struct Money yearlySales = { 0,0};
for(inti=0; i<12; i++)
{
monthlySales[i].dollars = 0.0;
monthlySales[i].cents = 0.0;
}
for(int i=0; i<12; i++)
{
yearlySales.dollars = yearlySales.dollars + monthlySales[i].dollars;
yearlySales.cents = yearlySales.cents +monthlySales[i].cents;
}
return 0;
}
Write a program using integers userNum and x as input, and output userNum divided by x four times. Ex: If the input is 2000 2, the output is: 1000 500 250 125 Note: In Coral, integer division discards fractions. Ex: 6 / 4 is 1 (the 0.5 is discarded).this must be written in Coral Language
Answer:
integer userNum
integer x
integer i
put "Enter the user number: "
userNum = Get next input
put "Enter the x value: "
x = Get next input
for i = 0; i < 4; i = i + 1
put userNum/x to output
Explanation:
Coral Programming language is an ultra-simple programming language for learning programming. The first three rows of the code block declare the variables 'userNum', 'x', and 'i'. The "Get next input" and the "Put 'output_value' to output" are used by the program to get input from the user and output a value to the screen respectively.