1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
4 years ago
11

Given a dictionary d and a list lst, remove all elements from the dictionary whose key is an element of lst. Any elements from t

he list that are NOT keys of the dictionary should be added to a new set associated with the variable not_found. For example, given the dictionary {1:2, 3:4, 5:6, 7:8} and the list [1, 6, 7], the resulting dictionary would be {3:4, 5:6} and the set not_found would contain 6. Use Python

Computers and Technology
1 answer:
ladessa [460]4 years ago
5 0

Answer:

the code is attached

Explanation:

  1. I defined a function called <em>operation</em>
  2. the function accepts two parameters <em>d </em>as dictionary and<em> lst </em>as a list
  3. I defined an empty set <em>not_found</em>
  4. for all elements in the list lst
  5. if the element is a key in dictionary I delete the key value pair in the dictionary
  6. if not I add the element to the set
  7. the function returns d and not_found

You might be interested in
U GET BRAINLIEST HELP PLZ
Art [367]
BOTH OF THEM ARE C : )
3 0
3 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
wolverine [178]

Answer:

data - Any form of value in a column of a table in a relational database.

DBMS - Short for Database management system, which is a software that can be used to create, manipulate and view databases, e.g. MS SQL Server.

database system - Same as DBMS.

database catalog - Place where the metadata of a Database, its tables, users etc. exists e.g. date created, size, number of columns etc. Also known as Data Dictionary.

program-data independence - Program-data independence refers to the capability of leaving data intact and accessible regardless of modifications to the database that contains the data.

DBA - Short for Database Administrator, person responsible for maintaining the database. Its main responsibility is to keep the data clean and safe i.e. data doesn't contain wrong or invalid data, and is safe from viruses and is backed up.

end user - Anyone who is not directly interacting with a database, but through some software like website and mobile application.

persisten object - An object of a class in a program, that interacts with the underlying database and is responsible for manipulating the database connected to.

transaction-processing system - A transaction process system is part of a software, responsible for making sure critical business transactions, like crediting or debiting money, either goes through cleanly or doesn't at all.

CRUD are the four main types of operations one can do in a database environment. It stands for creating, reading, deleting and updating.

Explanation:

4 0
3 years ago
Every UNIX and Linux system contains full documentation of UNIX commands in the _____ pages.
Rashid [163]
Full documentation in the man pages.
8 0
4 years ago
What's wrong with Brainly now? Now people think it's site for s.ex which it isn't. These weirdos need to go
Dmitry [639]

Answer:

Honestly it is disgusting.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What do you click on to minimize all open windows? the Show Desktop icon the Start menu the system tray the taskbar
    15·2 answers
  • What comes to mind when you see/hear QWERTY?
    14·2 answers
  • If you download a virus onto ur computer which is the best way to get rid of it
    9·2 answers
  • Which firewall monitors traffic from the DMZ to the LAN?
    11·1 answer
  • A customer seeks to buy a new computer for a private use at home.The customer primarily needs the computer to use the Microsoft
    8·1 answer
  • What is used to connect computers to the internet*Audio Ports
    15·2 answers
  • What is the difference between ionizing and non-ionizing radiation?
    7·2 answers
  • SOMEONE HELP 60 POINTS!!!!! When creating business publications, these two factors must be determined before planning the layout
    8·2 answers
  • when you enter a url, you’re creating a(n) ____ link, which is the full and complete address for the target document on the web.
    9·1 answer
  • Why is brainly so addictinggggggggg!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!