answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
2 years ago
15

BlockPy: #35.2) Animal Splits Write a function all_cats that consumes a comma-separated string of animals and prints whether all

of the animals have "cat" in their name. For example, the string "gerbil,catfish,dog,cat" would return False, but just "cat,catfish" would return True. If the function consumes an empty string, then it returns True. Call this function on a string of animals of your choice and print the result.
Computers and Technology
1 answer:
maks197457 [2]2 years ago
6 0

Answer:

def all_cats(data):

 dataArray = data.split(',')

 if(data==""):

   return True

 for i in dataArray:

   if('cat' not in i):

     return False

 

 return True

print(all_cats("gerbil,catfish,dog,cat"))

print(all_cats("cat,catfish"))

print(all_cats(""))

Explanation:

Step 1: define de function and the parameters

def all_cats(data):

Step 2: split the data by ,

dataArray = data.split(',')

Step 3 : validate if is an empty data and return true

if(data==""):

   return True

Step 4: Loop over de array data and validate if have cat in each data if not, then return false

for i in dataArray:

   if('cat' not in i):

     return False

Step 5 if have cat in each one return true

return True

Step 6 Validate with examples

print(all_cats("gerbil,catfish,dog,cat"))

print(all_cats("cat,catfish"))

print(all_cats(""))

You might be interested in
Mitchell has noticed that his co-workers are unable to open attachments in the emails he sends. What is one possible reason for
hammer [34]
Maybe it could be the website or the email it self
 <span />
8 0
2 years ago
Each level of a smartphone app adds more gems for you to match. On level one, there were 13 gems. On level twelve, there were 12
Sidana [21]
<span>Level : 1,2,3,4,5,6,7,8,9,10,11,12
Gems : 13 to 123
We have to increase from 13 to 123 over a span of 11 levels.
That's an increase of 110 over 11 levels.
110 / 11 = 10
So we go up 10 gems each level Level : 1,2,3,4,5,6,7,8,9,10,11,12
Gems : 13 23 33 43 53 63 73 83 93 103 113 123</span>
5 0
2 years ago
Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
enyata [817]

Correct question.

Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?

Answer:

<u>data custodian</u>

<u>Explanation:</u>

Remember, every organization generates data, and large organizations generate even larger data.

Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.

3 0
2 years ago
Rootkits are kernel programs having the ability to hide themselves and cover up traces of activities. It replaces certain operat
yawa3891 [41]

Answer:

Boot loader level rootkit

Explanation:

A rootkit is a malicious program which is used by hackers to gain illegal access to the computer system.A bootloader level rootkit also known as bootkit, infects the master boot record(MBR) of the hard drive.As a result bootloader level rootkit is able to compromise the boot process and can modify the boot sequence of the machine to load themselves instead of the original virtual machine monitor or operating system.

3 0
2 years ago
Restore points are created at regular intervals and just before you install software or hardware by what utility?
AlexFokin [52]

Answer:

a

Explanation:

System restoration and it is a tool to return the status of the system to a selected point previously created by the user or by the machine after installing a software or an important event.

3 0
2 years ago
Other questions:
  • Consider a simple application level protocol built on top of udp that allows a client to retrieve a file from a remote server re
    15·2 answers
  • which of these paste options is commonly available from the paste options button? A&gt; use the destination them. B. keep the em
    14·2 answers
  • Compare the encryption algorithms found in s-tools: idea, mdc, des, and 3des.
    5·1 answer
  • Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[5]. you know th
    5·1 answer
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • 1.2.2: Output variable value. Jump to level 1 Write a statement that outputs variable userAge. End with a newline. 1 2 3 4 5 6 7
    12·1 answer
  • You have verified that all your wireless settings are correct. What is most likely the problem if your laptop has recently been
    7·1 answer
  • When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers
    15·2 answers
  • What is the distance rn between the point of application of n⃗ and the axis of rotation? what is the distance rw between the poi
    15·1 answer
  • Recall that a Set is an abstract data type somewhat similar to a Bag, they can store a finite collection of objects without any
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!