1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
14

The function below takes two arguments: a dictionary of strings (keys) to integers (values) a_dict and a list of strings key_lis

t. All of the strings in the list are keys to the dictionary. Complete the function such that it looks up each of the keys in the list and returns a list of their associated values. The order of the values in the list is based on the order of the keys in key_list. For example, with the dictionary {"puffin": 5, "corgi": 2, "three": 3} and the list ["three", "corgi"], your function should return [3, 2]. student.py
Computers and Technology
1 answer:
vitfil [10]3 years ago
8 0

Answer:

  1. def getData(a_dict, key_list):
  2.    result = []
  3.    for key in key_list:
  4.        result.append(a_dict[key])
  5.    
  6.    return result  
  7. result = getData( {"puffin": 5, "corgi": 2, "three": 3} , ["three", "corgi"])
  8. print(result)

Explanation:

Let's define a function <em>getData() </em>with two parameters,<em> a_dict </em>and <em>key_list</em> as required by the question (Line 1).

Since the function is to return a list of associated values of dictionaries, a new list,<em> result</em>,  is declared and initialized with empty values (Line 2).

Next, use for-loop to traverse through every string in the input <em>key_list </em>(Line 4) and use the traversed key to address the value in the<em> a_dict </em>and add it to the <em>result</em> list (Line 5)

At last, return the <em>result </em>list as output (Line 7)

We can test the function using the test case from the question and we shall see the output as follows:

[3, 2]

You might be interested in
One vital component of your professional behavior with regard to computing systems today is the creation of​ _________.
zlopas [31]
<span>One vital component of your professional behavior with regard to computing systems today is the creation of​ strong passwords.
It is very important to have a good password on your computer, especially if you are dealing with sensitive data and information. It would be for the best to create such a password which won't be hacked into easily, in case somebody wants to steal your data.
</span>
3 0
3 years ago
A PHP variable name a. can be a PHP reserved word b. can start with a letter, a digit, or two underscores c. can contain special
maw [93]

Answer:

The correct answers are c. can contain special characters d. is case-sensitive

Explanation:

Variable can be referred to as a container used for storing values such as numeric values, memory addresses, characters, character string so it can be used in any part of the program. Every programming language has rules that you must strictly follow while naming a variable, and some of the rules for naming variable in PHP are A variable name can contain letters, numbers, and characters  after the first character and A variable name is case sensitive.

3 0
3 years ago
The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understandA.
Mars2501 [29]

Answer:

True

Explanation:

A Domain Name Service comprises of computer servers that carries a database of public IP addresses and their related human-readable domain names/hostnames, it receives query as hostnames and helps to translates those human-readable domain names/hostnames into IP addresses that computers and routers understand.

5 0
3 years ago
__________ has remained a dominant communication tool, despite the rise in use of newer, alternative media options for message d
maksim [4K]

Answer: E-mails

Explanation:

 An E-mails is one of the type of digital message and also known as the dominant communication tool which is used for in the form of document in an organization where we can used it in different ways are as follows:

  • Communicating with other employees related to rules and regulations of an organization
  • Making various types of recommendations
  • Used for an inquiry purpose
  • providing various types of current status and new updates

According to the given question, Emails is one of the type of tool that is used as the communication medium and it is one of the flexible message delivery options which is widely used by an organizations.

 

6 0
3 years ago
In a bubble sort for a list of length n &gt;= 2, in each iteration, the first step is to compare_______.
Hunter-Best [27]

Answer:

the consecutive two elements and swap them based on the value which is larger if we go for ascending order

Explanation:

bubble sort compares 2 consecutive elements of the list and swap them. in one iteration one value will be placed correctly depending on the sorting order either ascending or descending

7 0
3 years ago
Other questions:
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the ind
    6·1 answer
  • What can search the Internet and select elements based on important words?
    6·2 answers
  • Design a program that asks the user to enter a store’s sales for each day of the week. The amounts should be stored in an array.
    10·1 answer
  • Read first a user's given name followed by the user's age from standard input. Then use an ofstream object named outdata to writ
    6·1 answer
  • Who like the videos where is clown is from :)
    6·1 answer
  • Qr code is more developed than barcode​
    11·1 answer
  • Please solve in 5 mins very fast​
    11·2 answers
  • How do i know my child's login info for parent infinite campus
    14·1 answer
  • Como interactua el hardware de la computadora con el ser humano
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!