What is the missing line of code?
22
>>> books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}
>>>
dict_keys([294, 931, 731])
O books allo
O books.values()
O books
O books.keys()

Answers

Answer 1

Answer:

books.keys()

Explanation:

I ran the code and the awncers though python and books.keys() is the one that came up with the awncer

Answer 2

books.keys() is the missing line of code with respect to the books with the help of Python language.  Thus, option D is correct.

What is a code?

In a certain programming language, a collection of commands or a collection of rules are referred to as computer code. It's also the name given to the source code just after the translator has prepared it for computer execution.

Code is a developing company that focuses on producing aesthetically pleasing, code-correct internet, application forms, and phone application.

The correct code will be according to the Python language will be in addition to books.keys():

books.keys()

books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}

books.keys()

dict_keys([294, 931, 731])

Therefore, option D (books.keys()) is the correct option.

Learn more about code, here:

https://brainly.com/question/17204194

#SPJ2


Related Questions

In Super Mario Bros., you become Mario and your friend is Mario’s younger brother Luigi. Your job is to race through Mushroom Kingdom to save Princess Toadstool and avoid the enemy, Bowser. You can jump from and to different objects, picking up coins and other items to help you on your journey through the levels. What game genre (or combination of genres) best describes this game?

A.
strategy simulation
B.
action adventure
C.
RPG
D.
sports action

Answers

B action adventure ——————

Not every design choice in your game interface requires having a thought process behind it.
True
False

Answers

Answer:

true

Explanation:

cause every design have it's own thought process and we also have our choice

Answer:

true

i agree with the person that answerd

What are some of the restrictions to muscle wire?

Answers

Answer:

Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.Although thin and lightweight, one of the most amazing things about Muscle Wire is that they can lift many times their weight and are able to do 100 times more work per cycle than the human muscle. This material is easy to use, small in size, operates silently, has a high strength-to-weight ratio, and is easily activated using AC or DC power. This technology is ideal where mechanics require minimization, such as electronic textiles projects, robotics or nano-applications.Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.

a data visualization tool that updates in real time and gives multiple outputs is called

Answers

Answer:

A data dashboard

Explanation:

A data visualization tool that updates in real time and gives multiple outputs is called data dashboard.

Why is data dashboard required?

A data dashboard is a tool that many businesses use to monitor, examine, and present data—typically to acquire understanding of the general health of an organisation, division, or particular procedure.

Businesses utilise an interactive analytical tool called a data dashboard to analyse and monitor the effectiveness of their plans using high-quality KPIs.

These tools give businesses access to real-time data so they can extract useful insights and guarantee ongoing growth.

Making it simpler for data analysts, decision-makers, and everyday users to understand their data, acquire deeper insights, and make better data-driven decisions is the main goal of a data analytics dashboard.

Data dashboard is a term used to describe a real-time updating, multi-output data display tool.

For more details regarding a data dashboard, visit:

https://brainly.com/question/29854747

#SPJ6

The voltage/potential difference in a circuit is 12 volts, calculate the current that is flowing through the circuit if the resistance is 48 Ohms.

Answers

Current (I) = 0.25 ampere (A)

Power (P) = 3 watt (W)

Current (I) = 0.25 ampere (A) Power (P) = 3 watt (W) Steps: I = V R = 12 volt 48 ohm =  0.25 ampere (A) P = V2 R = (12 volt)2 48 ohm =  3 watt (W)

IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False

Answers

Answer: true

Explanation: true

Tynker has a particular layout, with the blocks on the left, editor in the middle, and output on the right. Which word best describes this screen layout?
block-based
interface
editor
player

Answers

Interface best describes the layout of the screen.  This is done by designers

in which they help to design the appearance and style of various software

and devices.

These characteristics help to ensure the users find them friendly and easy to

navigate through when performing various operations .

In this scenario, we were told that the layout has blocks on the left, editor in

the middle, and output on the right which are designs for easy navigation on

Tynker.

Read more about Interface here https://brainly.com/question/5080206

Answer:

interface

Explanation:

what is control structure write it's types​ .

Answers

Answer

Defination-:

A control statement is a statement and a statement whose execution its control.

Types-:

Selection StatementIteration StatementUnconditional branching Statement

Select all that apply
photoshop question

Form is gives the object this look?

a. Flat

b. Textured

c. Dark

D. 3d

Answers

It should be D and B

what type is the combination of an integer and a string

Answers

Answer:

Concatenation.

Explanation:

Where are 'if' and 'else' statements shown when printing a document in a word processor?

Answer the question and then your task is to:

Write an algorithm or sequence of instructions that include the IF statement for the document being printed.

Answers

Explanation:

cpt price

What is the correct method to reset the contents of the CMOS NVRAM on HP Desktop / Workstation computers after the AC power has been disconnected

Answers

It should be noted that in order to reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.

It should be noted that the non-volatile RAM simply means a complementary metal-oxide-semiconductor chip that can be found inside computers which is vital for storing information.

To reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.

Learn more about computers on:

https://brainly.com/question/24540334

HELP PLZ 50 POINTS
What code would add a new array item named "home" to the array below?

var titles = ["score", "points"];

titles.put("home");
titles.push("home");
titles.set("home");
array.push("home");

Answers

Answer:

titles.push("home");

Explanation:

        It depends on if you want to change the original array or not, but since you are just adding on I think this is the correct option.

        "... 5 ways to add an item to the end of an array. Push, splice, and length will mutate the original array. Whereas concat and spread will not and will instead return a new array. Which is the best depends on your use case" (www.samanthaming.com)

[] Attached is from the same source

-> I think this is correct

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

In the program to evaluate passwords, you gradually built a message to display to the user. What did you add to the end of each message string to start each message on a new line?

message = message + "Your password needs an uppercase letter. _____ "

\endline

\e

\n

\newline

Answers

You need to add \n to start a new line

The option that one need to add to the end of each message string to start each message on a new line is \n.

What is a message string?

This is known to be a kind of running aspect of text messages that relates to one topic or any question.

Based on the program written above, the option that one need to add to the end of each message string to start each message on a new line is \n as it is the one that will give the best result.

Learn more about program  from

https://brainly.com/question/1538272

#SPJ2

Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially.

Required:
Which character can he type after each command to have them run one after the next without requiring further input from him?

Answers

Answer:

um

Explanation:

what subject is this again?

How many letters is in whatyoudoingareyougood

Answers

Answer:

43847823773 letters

Explanation:

haha to easy

Answer:

22 letters, 6 words.

:) hope this helps! <3

HELP ME PLEASE

explain 2 threats to data that can arise when a pc is not connected to the Internet​

Answers

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

I'm confused as to if subclasses can call the supers without any implementation and what the right answer is

Answers

Answer:

E

Explanation:

Since Example1 and Example2 inherit from Example0, all classes have the method doNothing() at their disposal, so you can call it from e0, e1 and e2.

However, the arguments of this method are Example1 and Example2, so you cannot pass Example0 as a first argument, and you cannot pass Example0 or 1 as a second argument. That only leaves answer E.

You can call the inheritance relation an "is a kind of" relation. So Example1 is a kind of Example0, and Example2 is a kind of Example1, but also Example2 is a kind of Example0.

Now you can understand why e2 can be passed as an argument for Example1, because e2 is a kind of Example1.

What is my mistake on this code? (Python)

Answers

Answer:

Explanation:

bakugo;sup shoto i didnt know you go on here too

the coding has no problems just go and get deki kaminary

Draw truth table for the following logic circuit:

(Please I really need help with this)

Answers

Keep Scrolling! :D

[tex] \rule{999pt}{66646pt}[/tex]

what hash format are modern windows login passwords stored in?

Answers

User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.

What are the windows?

Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.

A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.

Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.  

Learn more about the windows, refer to:

https://brainly.com/question/13502522

#SPJ5

Why would you add learning inside the app? A. To add contextual help for each page in the app B. To contact Salesforce support C. To link to your company’s onboarding resources D. To add resources about working in Salesforce Classic E. A and C

Answers

There are different reasons why there was the addition of learning to the app. The reasons why you would you add learning inside the app is that:

To add contextual help for each page in the app.

To link to your company’s onboarding resources.

Salesforce Learning Paths is known to result in bringing out the power of learning straight into the app.

It can help companies to update their teams as they function or work in Salesforce.

Through the use of the Learning Paths, firms whether big or small and other industry can update or equip their employees with timely, personalized learning in the flow of work.

This can therefore help employees of all experience levels by boasting their skills and in turn increase their productivity.

Learn more about Salesforce from

https://brainly.com/question/7452075

You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would make to the slide to make it more effective.

Answers

To make my slide more effective, I would add two or three pale colors that would decorate it while not distracting viewers from the topic. I would also add visuals that would engage viewers and give them a better understanding of the material. Additionally, I would include more examples and details to give viewers a clearer picture of what I would be attempting to convey to them. The final thing I would do to the slide would be to organize it in a way that would present information well. In conclusion, in order to improve the effectiveness of a slide, I would make changes to its design and layout that would make it easier for viewers of the slide to understand.

Answer:

I would add colors to the backround of the slide to decorate it and make sure it is not distracting, Use different fonts but dont make it too fancy.

Explanation:

Your Welcome

Which of the following rules need to be followed when using variables?
Choose all that apply.

Answers

Answer:

- All variable names must begin with a letter of the alphabet or an. underscore( _ ).

-After the first initial letter, variable names can also contain letters and numbers.

-Uppercase characters are distinct from lowercase characters.

-You cannot use a C++ keyword as a variable name.

Answer:

Variable names must begin with a letter or an underscore( _ )

After the first initial letter, variable names can also contain letters and numbers. ...

Uppercase characters are distinct from lowercase characters. ...

You cannot use a keyword as a variable name.

Explanation:

Why there should be laws against using phones and

driving?

Answers

Answer:

There should be laws against using phones & driving because you can get into an accident & you are not paying attention to the road & it's surroundings.

Explanation:

It is for your safety & other peoples safety around you.

what are quantum computers and it uses​

Answers

Answer: Quantum computers are machines that use the properties of quantum physics to store data and perform computations

Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Question 11 options:

Malicious

Algorithm

Static

Web Browser

Answers

Answer:

Static

Explanation:

I just took the test man!

Write steps of the following operations.
a. applying borders and spacing
b. create a folder​

Answers

Answer:

b

Explanation:

first right click on an empty space

click on new from the pop up menu

finally click on new folder

Q44. Cell A20 displays an orange background when its value is 5. Changing the value to 6 changes the background color to green. What type of formatting is applied to cell A20

Answers

The type of formatting that is applied to cell A20 is called conditional formatting.

Conditional formatting in Excel Sheet enables an easier method of highlighting noteworthy cells or ranges of cells, displaying data by employing data bars, color scales, and icon sets that match particular variations in data.

A conditional format modifies the look of cells based on the conditions you set. The cell range will be formatted provided that the conditions are true; if otherwise, it will be false and the cell range will not form.

Learn more about conditional formatting here:

https://brainly.com/question/25051360

1. Explain 'Computer Ethics" ?



plz following me ​

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.  or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.

Explanation:

Other Questions
which value of the variable m satisfies the equation 20 = -2(4m - 5) Need help find the value of x please help I am so lost rn(please put step by step if you can)thanks! Write the square root -10 in simplest radical form Check the box under each molecule in the table below that is an isomer of this molecule: What is the value of y? Select all the equations that have {7} as its solution set. 652x=6x+9 9x=14x 3+4x=5x4 x2+1=8x5 A squares diagonal is 22. What is the length of each side? Read the passage. The Ornithopter Many people know Leonardo da Vinci today as an artist, and it is true that he was indeed a great painter and sculptor, but he was also an inventor and one of the first individuals in recorded history to draft detailed plans for a flying machine. In order to make a living, Leonardo often depended upon wealthy individuals who would commission work from him. That means they would hire him and pay him to create specific work they wanted. In 1482, when he was 30 years old, Leonardo heard of an opportunity to work for Ludovico Sforza, the Duke of Milan. The duke, however, did not want a painter; he wanted a military engineer to help him defend the city against its enemies. This was an excellent opportunity that would pay Leonardo well, but Leonardo was a peaceful man. He considered war to be "a beastly madness. " He preferred to make things of beauty. Leonardo made the decision that he could tolerate making weapons if the resources the duke could provide would also allow him to create things he loved. He sent a letter to the duke detailing his skills in designing and building weapons. "I will assemble catapults, mangonels, trebuchets and other instruments of wonderful efficiencyI will make an infinite number of items for attack and defense," he wrote. Leonardos letter convinced the duke of his talents, and he got the job. He set about designing the weapons that the duke desired. But Leonardo was infinitely creative, always thinking of new things, new ideas"he could not be limited to weapons alone. One idea that he had not mentioned in his application was the ornithopter. It was not a weapon of war, and it was not something that the duke had asked for, but Leonardo went ahead and designed it anyway. Leonardo was fascinated by the idea of flight. The word "ornithopter" comes from two words meaning "bird" and "wings. " And on first inspection, his plans resembled a birds wings attached to a human beings arms. He concluded that a human beings arms were neither strong enough nor li. A shipping container will be used to transport several 60-kilogram crates across the country by rail. The greatest weight that can be loaded into the container is 26000 kilograms. Other shipments weighing 13200 kilograms have already been loaded into the container. What is the greatest number of 60-kilogram crates that can be loaded into the shipping container? Which equations are true equations?Select all correct answers.24/2^2=50628568+32=2238252=4273936=6104+4 the sum of 2 integers is 61 and their difference is 29. PLZ HELP IT DUE TODAY AND IF YOU MAKE A SCRIPT I WILL GIVE 1OO BRAINLY POINTS AND WILL MARK BRAINLIEST.*TITLE**BASIC DESC OF CHARACTERS* *SCENE 1 *TIME, PLACE, BASIC SETTING, ETC.**NARRATOR SPEAKING ( If you have one )**CHARACTER 1 SPEAKING**CHARACTER 2 SPEAKING*ETC. (Keep making the characters interact until the scene ends. BTW You can have as many characters as you want as long as you give atleast a small description of them during the play or movie.)*ETC.**ETC.**SCENE ENDS*(Do as many scenes as you need to until you can wrap up the movie/play)*ETC.**ETC.**MOVIE/PLAY ENDS*(Let's say the movie/play ends. You should make the credits by telling or showing the characters' actors and stuff.) *THE END* One positive integer is 5 times another positive integer and their product is 320. What are the positive integers? Zola just secured her first job after college, and she's heard that it's important to start investing for her retirement. She can afford to put 5% of her monthly salary toward retirement. What type of account should she choose for this goal? * 1 point IRA CD MMA HSA Rewrite (7/9) ^-1 without an exponent a natural number multiplied by itself. is it possible for the result to have 66 as the last 2 digits.yes or no that is all i need If 3.31 moles of argon gas occupies a volume of 100 L what volume does 13.15 moles of argon occupy under the same temperature and pressure Triangles ABC and DFG are similar. The lengths of the two corresponding sides are 1. 4m , and 56 cm. What is the ratio of the perimeters of these triangles ?. Point p is shown on the number line belowThe distance between point q and point p is 6 1/2 units. Which number could represent point Q? ( Show work to get brainliest )