1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
13

Which line of code will eliminate the element “calculator” from an array of supplies?

Computers and Technology
1 answer:
zhuklara [117]3 years ago
4 0

Answer:

D) supplies.remove("calculator")

Explanation:

Our array's name is "supplies". By starting the line with "supplies", we've defined that this is the subject we wish to edit.

By following it up with .remove, we've told Python that we no longer want to use whatever comes next in our array.

Finally, we use parentheses to define what we wish to remove from out array, which the string provided is ("calculator").

You might be interested in
Your team at amazon is overseeing the design of a new high-efficiency data center at hq2. a power grid need to be generated for
elixir [45]

Answer:

void print2(int row) {

for (int i = 0; i < row; i++) {

 char ch = 'a';

 char print = ch;

 for (int j = 0; j <= i; j++) {

  cout << print++;

 }

 cout << endl;

}

}

int count_digits(int num) {

int count = 0;

int temp = num;

while (temp != 0) {

 temp = temp / 10;

 count++;

}

return (num % count);

}

Explanation:

3 0
2 years ago
The article begins with the author mentioning the need to find something from “three years ago”. How long do you see yourself sa
Zigmanuir [339]
I'm going to ask this are you asking us how long we see ourselves saving files or what?
7 0
3 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
Andrews [41]

google does that, and yahoo, and bing. it would be a search engine, or browser.

5 0
3 years ago
Write a program that prompts the user to enter a fraction in the following format (x/y). You may assume that the user will input
qaws [65]

Answer:

fraction = input("enter fraction x/y: ")

if len(fraction) == 3:

   if fraction[1] == "/":

       try:

           num = int(fraction[0])

           den = int(fraction[2])

           if num < den:

               print(f"{num}/{den} is a proper fraction")

           else:

               if num% den == 0

                   print(f"{num}/{den} is an improper fraction and can be reduced to {num/den}")

               else:

                   print(f"{num}/{den} is an improper fraction and can be reduced to {num//den} + {num - (den * (num//den))}/{den}")

       except ValueError:

           print("numerator and denominator must be integer numbers")

Explanation:

The try and except statement of the python program is used to catch value error of the input fraction of values that are not number digits. The program converts the numerator and denominator string values to integers and checks for the larger value of both.

The program prints the fraction as a proper fraction if the numerator is lesser and improper if not.

5 0
3 years ago
Other questions:
  • What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
    9·2 answers
  • Choose the false statement below. The content that displays in the browser is contained in the head section. The content that di
    14·1 answer
  • Draw a logic circuit for the function F = (A + B)(B + C)(A + C), using NOR gates only. ​
    9·1 answer
  • Write a C function which mimics the behavior of the assembly language function below. Note that this time, the assembly language
    10·1 answer
  • You can run a macro by:
    10·1 answer
  • FREE POINTS AND BRAINLIEST!!!<br><br> You guys are welcome. :)
    15·2 answers
  • Plzzz help ya girl out due soon
    13·1 answer
  • Differentiate between a software package and integrated software and why users would choose one over the other.
    11·1 answer
  • Tick (/) the correct answers.
    11·1 answer
  • How much would you guys pay for a used ps4 with a black ops 3 disc?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!