1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
3 years ago
7

Write a function called is_present that takes in two parameters: an integer and a list of integers (NOTE that the first paramete

r should be the integer and the second parameter should be the list) and returns True if the integer is present in the list and returns False if the integer is not present in the list. You can pick everything about the parameter name and how you write the body of the function, but it must be called is_present. The code challenge will call your is_present function with many inputs and check that it behaves correctly on all of them. The code to read in the inputs from the user and to print the output is already written in the backend. Your task is to only write the is_present function.
Computers and Technology
1 answer:
Agata [3.3K]3 years ago
7 0

Answer:

The function in python is as follows

def is_present(num,list):

    stat = False

    if num in list:

         stat = True

       

    return bool(stat)

Explanation:

This defines the function

def is_present(num,list):

This initializes a boolean variable to false

    stat = False

If the integer number is present in the list

    if num in list:

This boolean variable is updated to true

         stat = True

This returns true or false        

    return bool(stat)

You might be interested in
Please help me and solution in c language​
salantis [7]
Ummmm the solution is ummm brb
3 0
3 years ago
. Convert your age into binary and then to hexadecimal. Show your work.
Dovator [93]

Explanation:

Age = 23.

To convert a base 10 number to hexadecimal number we have to repeatedly divide the decimal number by 16 until  it becomes zero and store the remainder in the reverse direction of obtaining them.

23/16=1 remainder = 5

1/16=0 remainder = 1

Now writing the remainders in reverse direction that is 15.

My age in hexadecimal number is (15)₁₆.

5 0
4 years ago
Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security
Tcecarenko [31]

Answer:

(i) Prevention is more important than detection and recovery.

(ii) Detection is more important than prevention and recovery.

(iii) Recovery is more important than prevention and detection.

Explanation:

(i) Prevention is more important than detection and recovery.

Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.

(ii) Detection is more important than prevention and recovery.

Detection of an attack can be done through for example a security alarm can detect an attack and inform others.

(iii) Recovery is more important than prevention and detection.

Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.

8 0
3 years ago
Ms. Lawson, a primary school teacher, told her students that a photograph of the president is in the public domain. What does sh
dezoksy [38]

Answer:

He belongs to the nation

7 0
3 years ago
When typing in a cell, hitting Tab will bring which result?
iren2701 [21]

<span>C. 
Move to the next cell down.</span>
7 0
3 years ago
Read 2 more answers
Other questions:
  • Assure that major, minor, sub1 and sub2 each contain four digit numbersIf less than four digits are entered in major OR minor OR
    5·1 answer
  • How to make a sad face on keyboard using alt?
    5·2 answers
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • Which are among the ways you can use bitlocker encryption? (choose all that apply?
    5·1 answer
  • You implement basic version control and go through the phase of creating a local repository. Initiate the commands to set up tha
    7·1 answer
  • When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Res
    7·1 answer
  • Who loves you tube , anyone?
    10·2 answers
  • Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Te
    10·1 answer
  • Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original ma
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!