1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
2 years ago
13

Brainliest For Tascake Because People Texted Before Tascake Could Hurry Tascake

Computers and Technology
2 answers:
makkiz [27]2 years ago
8 0
I didn’t respond until saw the dude write
Have a lovely day luvs!
horrorfan [7]2 years ago
4 0

Answer:

Quack :^)

Explanation:

:^) :^) :^ ) eee

You might be interested in
An anagram of a string is another string with the same characters in the same frequency, in any order. For example 'ab', 'bca, a
nlexa [21]

Answer:

from collections import Counter

def anagram(dictionary, query):

   newList =[]

   for element in dictionary:          

       for item in query:

           word = 0

           count = 0

           for i in [x for x in item]:

               if i in element:

                   count += 1

                   if count == len(item):

                       newList.append(item)

   ans = list()

   for point in Counter(newList).items():

       ans.append(point)

   print(ans)        

mylist = ['jack', 'run', 'contain', 'reserve','hack','mack', 'cantoneese', 'nurse']

setter = ['ack', 'nur', 'can', 'con', 'reeve', 'serve']

anagram(mylist, setter)

Explanation:

The Counter class is used to create a dictionary that counts the number of anagrams in the created list 'newList' and then the counter is looped through to append the items (tuple of key and value pairs) to the 'ans' list which is printed as output.

4 0
3 years ago
Hymter. Wants to workin The Energy career field with electrical energy
m_a_m_a [10]

Answer: what is the question

Explanation:

3 0
3 years ago
Which of the following describes the phishing method of information security crime?
Marianna [84]
<span>C. pretending to be someone else when asking for information</span>
3 0
3 years ago
Read 2 more answers
Is science fiction always set in the future
Natali5045456 [20]
Yes and No it all depends on how the author wants the poem how to be and become. Majority of the time science fiction is set for the future.
5 0
2 years ago
How to solve this?<br> In c++
andrey2020 [161]

Explanation:

6* 49 because you multiply the number of dots in the first figure by 49

8 0
3 years ago
Other questions:
  • Question 1 of 20 :
    15·2 answers
  • How do humans feel about being abducted?
    12·2 answers
  • Who is the person responsible for creating the original website content?
    14·1 answer
  • Who would use a CLI? (Command Line Interface)
    9·1 answer
  • While the Internet can be a great resource, the information is not always reliable, as anyone can post information. Select one:
    11·1 answer
  • Which of the following statements is TRUE of business intelligence (BI) systems? Business intelligence systems are primarily use
    7·1 answer
  • Guys I need help I cant download anything in the app store I restarted my phone and I know it's not the space on my phone I have
    13·1 answer
  • Which of the following variable names follows the rules for naming variables?
    13·1 answer
  • with the current computer development, explain 5th areas where computer is applied for the social economic dwvelopment in societ
    11·1 answer
  • Why is it important to identify cables and conductors?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!