answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
2 years ago
15

The function below takes one parameter: a dictionary (dictionary). Complete the function so that it prints out each value stored

in the dictionary, each on a separate line. Recall that dictionaries store key:value pairs. Also, when you iterate through a dictionary with a for loop, you are interating through the keys. For this question, you'll need to lookup each key in the dictionary to find its value.
Computers and Technology
1 answer:
frosja888 [35]2 years ago
3 0

Answer:

  1. def processDict(dict):
  2.    for x in dict:
  3.        print(dict[x])
  4. dictA = {
  5.    "Name": "Tom",
  6.    "Age": 21,
  7.    "Gender": "Male"
  8. }
  9. processDict(dictA)

Explanation:

Firstly create a function and name it as processDict that takes one input dictionary, dict (Line 1).

Create a for loop to iterate through each of the dictionary key, x, and use that key to look up the corresponding value and print it out (Line 2-3).

We test the function using a sample dictionary (Line 5-11). We shall get the output:

Tom

21

Male

You might be interested in
The Internet is BEST described as a vast _______ connection of computer networks that also link to smaller networks
storchak [24]
Whats ur choices if there web or world try them

4 0
2 years ago
Which of the following meanings can a $ character assume within a regular expression? (can have more than 1 answer)
denis-greek [22]

Answer:

a. A literal dollar sign .

b. Shell variable syntax.

c. End-of-line anchor for pattern matching.

Explanation:

There are three answers to this question among the given options.

When a regular expression is quoted single, the $ character can act in one of two ways. end of line anchor for pattern matching.Elsewhere it acts as a literal dollar sign.

When a double quoted regular expression is there, the $ character is treated as a shell variable syntax.

7 0
2 years ago
Which of the following refers to applications and technologies that are used to gather, provide access to, and analyze data and
AnnZ [28]

Answer:

Business intelligence

Explanation:

Business Intelligence (BI) refers to systems, applications and strategies for gathering, incorporating, analyzing and presenting business information. Business Intelligence's aim is to promote better business decision-making by providing you with the information needed in a single unified view.

The data centers, dashboards, ad hoc analysis, data discovery software and cloud data services are some examples of business intelligence technologies.

5 0
2 years ago
Read 2 more answers
The alternative to encapsulating security protocol (esp) is _________.
Lina20 [59]
The alternative to Encapsulating Security Protocol (ESP) is Authentication Header (AH). Hope this helped!
8 0
2 years ago
Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
gayaneshka [121]

Answer:

#include <iostream>

# include <conio.h>

using namespace std;

float fat_burning_heart_rate(float age);

main()

{

float age,bpm;

cout<<"enter the age of the person"<<endl;

cin>>age;

if (age>=18 && age<=75)

{

bpm=fat_burning_heart_rate(age);

cout<<"fat burning heart rate for the age of"<<age<<"="<<bpm;

}

else

cout<<"Invalid age";

getch();

}

float fat_burning_heart_rate(float age)

{

 

float a;

 

a= (220-age)*0.7;

return a;

}

Explanation:

In this program, the variable named as age has been taken to enter the age of the person, needs to calculate the burning heart rate. All the variables taken in float, as the age and fat burning heart rate should come in decimal value.

The formula has been used as mention in question that,

a= (220-age)*0.7;

8 0
2 years ago
Other questions:
  • Python comes with ________ functions that have been already prewritten for the programmer.
    5·1 answer
  • Rupa would like to quickly insert a table into her document without having to worry about formatting the data in the table. Whic
    5·2 answers
  • Which of the following statements regarding critical paths is true? a. On a specific project, there can be multiple critical pat
    5·1 answer
  • _____________ helps to control and limit the number of consecutive request failures that cross a threshold. Review breaker Micro
    7·1 answer
  • Three variables , x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts t
    9·2 answers
  • Write the recursive function max_depth; it is passed a binary (any binary tree, not necessarily a binary search tree) and a valu
    13·1 answer
  • A colleague sent you an awesome article about using proper ergonomics while sitting at the computer. You don't have time to read
    11·1 answer
  • Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a
    7·1 answer
  • What is the impact of VR on Educational Learning rather than games?​
    13·1 answer
  • . Question 2 Fill in the blank: R Markdown notebooks can be converted into HTML, PDF, and Word documents, slide presentations, a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!