1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
poizon [28]
1 year ago
11

write a function named get majority last name that accepts as its parameter a dictionary from strings to strings the keys of the

dictionary represent first names and the values represent last names.
Computers and Technology
1 answer:
wariber [46]1 year ago
5 0

A function named get majority last name that accepts as its parameter a dictionary from strings to strings the keys of the dictionary represent first names and the values represent last names is python.

Python is a general-purpose, high-level programming language. Its design philosophy prioritizes code readability and heavily employs indentation. Python has dynamic typing and garbage collection. It supports a number of programming paradigms, including structured programming, object-oriented programming, procedural programming, and functional programming (especially this). It is frequently referred to as a "batteries included" language because of its large standard library.

In order to replace the ABC programming language, Guido van Rossum developed Python in the late 1980s. Python 0.9.0 was released in 1991.

Python 2.0, which was released in 2000, included brand-new features like list comprehensions, cycle-detecting garbage collection, reference counting, and support for Unicode.

To know more about python click here:

brainly.com/question/13437928

#SPJ4

You might be interested in
The variable 'a' starts with the value 1 The variable 'b' starts with the value 10 The variable 'c' starts with the value 100 Th
Anettt [7]

Answer:

The answer is B = 365

Explanation:

The following variable were initialized:

a = 1

b = 10

c = 100

x = 0

Then we store the value of 'c' times 3 in 'x'

x = 3 * c = 3 * 100 = 300

x = 300

Then we add the value of 'b' times 6 to the value already in 'x'

x = x + 'b' times 6

x = x + (b * 6) = 300 + (10 * 6) = 300 + 60 = 360

x = 360

Then we add the value of 'a' times 5 to the value already in 'x'

x = x + 'a' times 5

x = x + (a * 5) = 360 + (1 * 5) = 360 + 5 = 365

x = 365.

Therefore, the value of 'x' displayed is 365.

4 0
3 years ago
Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences of every word in t
artcher [175]

Answer:

Explanation:

The following Python program uses a combination of dictionary, list, regex, and loops to accomplish what was requested. The function takes a file name as input, reads the file, and saves the individual words in a list. Then it loops through the list, adding each word into a dictionary with the number of times it appears. If the word is already in the dictionary it adds 1 to its count value. The program was tested with a file named great_expectations.txt and the output can be seen below.

import re

def wordCount(fileName):

   file = open(fileName, 'r')

   wordList = file.read().lower()

   wordList = re.split('\s', wordList)

   wordDict = {}

   for word in wordList:

       if word in wordDict:

           wordDict[word] = wordDict.get(word) + 1

       else:

           wordDict[word] = 1

   print(wordDict)

wordCount('great_expectations.txt')

4 0
3 years ago
20<br>Calculate the kinette energy of a body the speed<br>that will be a mass tragm​
jolli1 [7]

Answer:

20

Explanation:

4 0
3 years ago
What is a reason to use a pseudo-class in Dreamweaver?
gulaghasi [49]

Answer: Option C is correct

Explanation:

Option C is correct

3 0
3 years ago
Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries.
Tcecarenko [31]
Through the use of <span>satellite imagery</span>
7 0
3 years ago
Other questions:
  • Select the correct answer.
    8·2 answers
  • _______ are unprocessed facts that a computer feeds on.
    5·1 answer
  • What are the commands used in windows 2012 to mount the nfs share on the linux server?
    8·1 answer
  • Match the careers with the career clusters.
    5·2 answers
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 40964096-byte cache us
    15·1 answer
  • Apps are designed by___.
    11·2 answers
  • Select the correct answer.
    10·1 answer
  • Write Epic username plz
    6·1 answer
  • To find detailed information about the origin of an email message, look at the ________________.
    11·1 answer
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!