1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
2 years ago
9

Add a data attribute tricks of type list to each Dog instance and initialize it in __init__ to the empty list. The user does not

have to supply a list of tricks when constructing a Dog instance. Make sure that you test this successfully. >>> sugar.tricks []
Computers and Technology
1 answer:
Olenka [21]2 years ago
7 0

Answer:

Following are the method to this question:

def __init__(self, _name, _breed):#defining Constructor

       """ Constructor """

       self.name = _name#assigning value in name variable

       self.breed = _breed#assigning value in breed variable

       self.tricks = []#defining tricks an empty list

Explanation:

In the above code, a parameterized constructor is defined, that hold two-variable "name and breed" in its parameter, and another object self is created for storing the value.

Inside the constructor two-variable, and one empty list variable "tricks" is defined that hold value in the name and breed variable, and the next step an empty list is defined, that store its value.

You might be interested in
Can you please make a simple python program? I will give you 20 points and branliest if it is good! It must include:
alekssr [168]

Answer:

# Solve the quadratic equation ax**2 + bx + c = 0

# import complex math module

import cmath

a = 1

b = 5

c = 6

# calculate the discriminant

d = (b**2) - (4*a*c)

# find two solutions

sol1 = (-b-cmath.sqrt(d))/(2*a)

sol2 = (-b+cmath.sqrt(d))/(2*a)

print('The solution are {0} and {1}'.format(sol1,sol2))

Hope This Helps!!!

3 0
2 years ago
Read 2 more answers
TRUE OR FALSE!!! <br> Your location can be tracked via your digital footprint.
laiz [17]
Sadly this statement is true
3 0
3 years ago
Your dive computer indicates you need to make a mandatory decompression stop. You buddy's dive computer does not. You should: A.
Sati [7]

Answer: Option C : Make a decompression stop that splits the difference between what your buddy's computer requires and what yours does.

Explanation:

Dive computers are battery-powered computers within a watertight and pressure resistant case. These computers track the dive profile by measuring time and pressure.

hence, making a decompression stop that splits the difference between what your buddy's computer requires and what yours does is the best option.

7 0
3 years ago
(((PLEASE HELP QUICK))) When writing research questions you should begin with ____.
tankabanditka [31]

Answer:

The answer is A or C. I hope this helps narrow down your answers.

8 0
3 years ago
Read 2 more answers
Users on your network report that they have received an email stating that the company has just launched a new website. The emai
e-lub [12.9K]

Answer:

Phishing

Explanation:

A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.

In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.

7 0
2 years ago
Other questions:
  • A size of a jumbo candy bar with rectangular shape is l x w x h. Due to rising costs of cocoa, the volume of the candy bar is to
    9·1 answer
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • What cell address indicates the intersection of the first row and the first column in a worksheet?
    15·2 answers
  • Contemporary Information Systems are interfacing with customers andsuppliers using:A. Electronic commerceB. CRMC. SCMD. all of t
    9·1 answer
  • Which type of NAC agent will be used during the posture assessment before allowing access to the VPN users?
    9·1 answer
  • Q1: Which of the following is an input peripheral device?
    12·2 answers
  • How has technology impacted our lives and the world we live in? In your own words.
    9·1 answer
  • Many large companies use the word(s), _____, to refer to the huge network of computers that meets their diverse computing needs.
    12·1 answer
  • What happens when you restrict someone on messenger?.
    12·1 answer
  • A parent process calling _____ system call will be suspended until children processes terminate.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!