Answer:
- def convertStr(num):
- Number = ("One", "Two", "Three", "Four", "Five", "Six", "Seven", "Eight", "Nine")
- numStr = str(num)
- output = ""
-
- for x in numStr:
- index = int(x) - 1
- output += Number[index] + " "
-
- return output
-
- value = 1234
- print(convertStr(value))
Explanation:
Firstly, create a function convertStr that take one input number (Line 1).
This function convert the input number to string (Line 3) and then use for-loop to traverse through the individual digit (Line 6). In the loop, get the target index to extract the corresponding digit letter from the Number tuple(Line 7). The target index is always equal to the current digit number - 1. Next, join the extracted digit letter from the tuple to an output string (Line 8) and return it at the end of the function (Line 10).
We test the function using 1234 as argument (Line 12 - 13) and we shall get One Two Three Four
I agree with the programmers who think object-oriented programming is a superior approach to procedural programming.
<h3>Why is OOP better than procedural programming?</h3>
In terms of Security, Object-oriented programming is said to have more of a secure based than procedural programming, due to the level of abstraction or that is due to data hiding property.
Note that It hinders the access of data to any member functions of the same class and one cannot see a thing like that such as data hiding in the procedural programming framework.
Learn more about object-oriented programming from
brainly.com/question/12342989
#SPJ1
Answer:
The Notebook, Beauty and the Beast, Step Brother, The Breakfast Club and The Little Mermaid
Explanation:
The zoom dialog box helps to enter text and expressions in tight places, such as a property sheet or Query Design view. You can resize the zoom box and change the font. And the zoom box remembers the size and font each time you use it.
Use the
Answer:
The answer is Letter D. Dumpster diving.
Explanation:
This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.
It is important to inform that the dumpster diving it is not limited to searching through the trash for obvious treasures like acess codes or passwords written down on sticky notes.