1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
7

Use a for/else loop to traverse through the key names in the dictionary below in order to find Mr. Potatohead’s mailing address.

The key name is his social security number. Once you find his SSN (key-name), you can display its value by using the following function:
print (Dictary.get(123-45-6789))

If the key you are looking for does not exist, your code should break out of the loop and display the following message: “Key not found”

Dictary = {
'code':6734,
'dept': 'sales',
123-45-6789:"Mr.Potato Head \n234 Potato Lane \nPotato Chip, ID 77725"
}
Computers and Technology
1 answer:
Tatiana [17]3 years ago
4 0

Dictary = {

'code':6734,

'dept': 'sales',

123-45-6789:"Mr.Potato Head \n234 Potato Lane \nPotato Chip, ID 77725"

}

for i in Dictary.keys():

   if i == 123-45-6789:

       print(Dictary.get(i))

       break

else:

   print("Key not found")

You can further test this code by deleting Mr.Potato head's info from the dictionary. I hope this helps!

You might be interested in
After a business transaction has been analyzed, which of the following must occur for the analysis to have been done correctly?
ICE Princess25 [194]

Answer:

A. Equity must equal the difference between assets and liabilities.

Explanation:

Assets are things a company or business owns while liabilities are things person or company owes.

Thus, Equity is the difference between the assets and the liabilities.

So, option A which is <u>Equity must equal the difference between assets and liabilities</u> is the answer.

5 0
3 years ago
In the following code, what is the first line that introduces a memory leak into the program?
Fantom [35]

Answer:

The answer is "Line 13".

Explanation:

In the given code first, a header file is included for using basic function, In the next line the main method is defined in this method two-pointer variable is declared that is "numbers1 and numbers2", in which variable numbers1 holds a value that is "NULL".

  • In the next line, both variable uses malloc() function that is used to allocate memory in heap, and in this function, sizeof() function is used that print its size and also increase its value.
  • In the next step, a pointer variable numbers1 assigns a value and another variable numbers2 assigns numbers1 variable value and changes the numbers1 variable.
6 0
4 years ago
Computer-aided design software can _________________ a. See details that could not be visible with drafting or modeling. B. Simu
kvasek [131]

Answer:

Your answer would be option D

Explanation:

Computer aided software can do everything that it states from A to D.

A, is true because it could display physics of items such as building models or cars.

B, This is very common such as WW11 movies and there backgrounds, such as a city that doesn't exist anymore or the world trade center before the incident.

C, With current tech you would make many different landscapes and areas that don't even exist like editing a grassy landscape during fall and putting snow over the land scape making it look like there is snow when there's not.

BRAINLEIST PLEASE! if you have any questions please ask.

6 0
3 years ago
What target audience does your product serve?
Natasha_Volkova [10]

Answer:

A target audience is the demographic of people most likely to be interested in your product or service. For example if you own a plumbing company, the target audience is property owners, both commercial and residential.

7 0
3 years ago
Describe accessibility in Windows 7 ​
satela [25.4K]

Answer:

Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.

7 0
3 years ago
Other questions:
  • 61. Select an activity of the Production Phase: a. a web authoring tool is often used b. the graphics, web pages, and other comp
    10·1 answer
  • Creating objects of the currency class requires a name (string ), a currency symbol (string ) and the number of decimal places (
    9·1 answer
  • What are ways to enter formula in Excel? Check all that apply
    8·2 answers
  • A remediation liaison makes sure all personnel are aware of and comply with an organization's policies.
    9·1 answer
  • An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
    15·1 answer
  • Write<br> algorithm to read 100 numbers<br> then display the largest.
    9·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers.
    8·1 answer
  • Order the steps for changing the settings of an outlook data file
    10·1 answer
  • Additional rows and columns are inserted into a table using the
    6·1 answer
  • Ransomware as a service has allowed the increase of:.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!