1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
4 years ago
13

Define a new object in variable painter that has properties "name" storing "Vincent van Gogh"; "artworks" storing "The Starry Ni

ght", "Irises" and "The Potato Eaters"; "bornDate" storing "March 30, 1853"; and "diedDate" storing "July 29, 1890".
Computers and Technology
1 answer:
trapecia [35]4 years ago
6 0

Answer:

painter = {'name' : "Vincent van Gogh", 'artworks': ["The Starry Night","Irises","The Potato Eaters"],'bornDate': "March 30, 1853", 'eyeColor': "July 29, 1890", 'diedDate': "July 29, 1890"} #this is a code which holds the questions defined value in a painter variable.

Explanation:

  • The above question wants to declare a variable that is in the form of a key and value pair.
  • The above question states to define name, artworks,eyeColor, and dieddate as a key and the other is defined as a value.
  • when a user wants to access the whole dictionary then he can do with the help of the painter variable.
  • But when he wants to access the value of any particular key, then he can do it with the help of the key name as "painter[keyname]".

You might be interested in
Sharing private information causing a person to be humiliated is considered to be doxing. T or F
sergij07 [2.7K]

Answer:

T

Explanation:

Doxing:

search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.

i would say it matches the definition

8 0
2 years ago
Describe why you may receive third party marketing advertisements when you download a game from the supplier.
Goryan [66]

Answer:

So that the game will make money advertising that game

Explanation:

8 0
3 years ago
Which is a method used to determine database requirement?
Ivahew [28]

Answer:

I think it would be A, good luck!

8 0
3 years ago
Which feature of vitualization helps increase the IT productivity of a business?
laila [671]
A the answer is yes
7 0
3 years ago
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
Other questions:
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • How to count how many uppercase letters in sentence in python?
    8·1 answer
  • A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250
    7·1 answer
  • Computer software that brings together sound, video, graphics, animation, and text and adjusts content on the basis of user resp
    7·1 answer
  • Use the drop-down menus to complete the statements about printing Contacts. When printing a single contact, go to File and then
    15·1 answer
  • Why concurrency control is needed in transaction.
    5·1 answer
  • What is the missing line?
    5·1 answer
  • if you were determining what was expected of you simply by looking at media, what messages would you take away?
    8·2 answers
  • Free points <br><br><br><br><br> also if u wanna check out my spotlfy u can (xkuromist)
    6·2 answers
  • Consider the following code and its output:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!