1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
8

How to remove duplicates from list in python?

Computers and Technology
2 answers:
kondaur [170]3 years ago
5 0
<span> the new way of </span>removing duplicates<span> from an iterable while keeping it in the original order </span>
SVEN [57.7K]3 years ago
5 0

Sets automatically remove duplicates. You can convert it into a set, convert it back into a list, and run sorted() on the list, or your own sorting algorithm.

You might be interested in
You're creating a presentation to promote a new product. If you wanted to add a square to your slide to serve as a backdrop behi
MAVERICK [17]
<h2>Answer:</h2>

<u>The correct answer is  </u><u>B. Insert Shapes</u>

<h2>Explanation:</h2>

Slides and presentations are always created in Microsoft Power Point and we know that it is the key application under the package of Microsoft Office. It gives us the option of inserting various shapes in our slides that could be used in a lot of ways depending upon the requirements. To insert shape in the slides of Microsoft Power Point we just click on the Home tab, under Insert, click Shape, point to any shape type, and then click the shape that we want.

5 0
4 years ago
Read 2 more answers
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
Name the bar that displays the information about the current document like the number of pages and words
Wittaler [7]

Answer:

Word Status Bar or Status Bar

Explanation:

3 0
3 years ago
What are the negative impacts of cloud computing? Answer this question using examples, in at least 6-8 full sentences.
DerKrebs [107]

Answer:

Vulnerability to attacks: Storing data in the cloud may pose serious challenges of information theft since in the cloud every data of a company is online. Security breach is something that even the best organizations have suffered from and it’s a potential risk in the cloud as well. Although advanced security measures are deployed on the cloud, still storing confidential data in the cloud can be a risky affair.

Network connectivity dependency: Cloud Computing is entirely dependent on the Internet. This direct tie-up with the Internet means that a company needs to have reliable and consistent Internet service as well as a fast connection and bandwidth to reap the benefits of Cloud Computing.

Downtime: Downtime is considered as one of the biggest potential downsides of using Cloud Computing. The cloud providers may sometimes face technical outages that can happen due to various reasons, such as loss of power, low Internet connectivity, data centers going out of service for maintenance, etc. This can lead to a temporary downtime in the cloud service.

Explanation:

3 0
3 years ago
What is an Operating System ??
NikAS [45]




Hi Pupil Here's Your Answer :::




➡➡➡➡➡➡➡➡➡➡➡➡➡




An operating system is a system software, that after being initially loaded into the computer by a good program, manages all the other programs in a computer.

The application programs make use of the operating system by making request for services through a different Application Program Interface (API). In addition, users can interact directly with operating systems through a user interface such as command language or Graphical User Interface(GUI).


Functions Performed by the OS :


♤ The operating system acts as an interface between the computer hardware and the user.

♤ It manages computer's memory.

♤ It handles interrupts.

♤ It schedules the jobs.

♤ It manages Input/Output devices.


All major computer platforms (hardware and software) required and sometimes include an Operating System. Linux, Windows, Mac, VMS, OS/400 X, and z/OS are examples of operating systems.




⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅




Hope this helps ........ ☺☺
3 0
3 years ago
Other questions:
  • Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a pro
    15·1 answer
  • Explique si en la pc que se usa para hacer las tareas escolares se puede ver un video juego de los llamados “pesados”
    13·1 answer
  • Clarisse is setting the white spaces at the edge of her Word document to be 1 inch. She is setting the _____.
    7·1 answer
  • Solid state storage stores data in erasable, rewritable circuitry, rather than on spinning disks, tape, or optical media.
    9·1 answer
  • Which one of the following is a benefit of using a contact group?
    11·1 answer
  • How do you check how much space is left in current drive?
    9·1 answer
  • 1.A tachometer measures:
    15·1 answer
  • Because of increasing advances in technology, there are careers available that weren’t even invented 10 years ago. One such care
    13·1 answer
  • For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
    15·1 answer
  • While conducting routine maintenance, you discover a network server that needs to
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!