Answer:
She can enable editing. She can change the view.
Explanation:
2. Which is not part of the Sans Institutes Audit process?
Help to translate the business needs into technical or operational needs.
O Deler a report.
O Define the audit scope and limitations.
O Feedback based on the
Answer:
Help to translate the business needs into technical or operational needs. This is not a part.
Explanation:
Capital budgeting simply refers to the process that is used by a business in order to determine the fixed asset purchases that is proposed which it should accept, or not. It's typically done in order to select the investment that's most profitable for a company.
Some of the capital budgeting processes include:
Identification and analysis of potential capital investments.
Application of capital rationing
Performing post-audits
It should be noted that developing short-term operating strategies is not part of the capital budgeting process.
Learn more about investments on:
https://brainly.com/question/15105766
#SPJ2
C programming 3.26 LAB: Leap year
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400; therefore, both 1700 and 1800 are not leap years
Some example leap years are 1600, 1712, and 2016.
Write a program that takes in a year and determines whether that year is a leap year.
Ex: If the input is 1712, the output is:
1712 - leap year
The code below is in Java. It uses if else structure and modulo operator to check if a given year is a leap year or not. Recall that modulo operator is used to get the remainder of the division. ⇒ a % b = remainder.
What is C programming?The general-purpose programming language C is effective. The creation of software such as operating systems, databases, compilers, and other tools is possible with it. C is a great language for beginners to learn programming with.
These C tutorials will lead you step-by-step as you learn C programming.
Low-level memory access, a small collection of keywords, and a clean style are the fundamental characteristics of the C programming language, which makes it ideal for system programming like operating system or compiler development.
Therefore, The code below is in Java. It uses if else structure and modulo operator to check if a given year is a leap year or not. Recall that modulo operator is used to get the remainder of the division. ⇒ a % b = remainder.
To learn more about C programming, refer to the link:
https://brainly.com/question/10895516
#SPJ1
Are the actions legal or illegal?
a. Your company is moving toward final agreement on a contract in Pakistan to sell farm equipment. As the contract is prepared, officials ask that a large amount be included to enable the government to update its agriculture research. The extra amount is to be paid in cash to the three officials you have worked with. Should your company pay?
Answer:
No, Company will not pay
Explanation:
At the last point of the final deal, any significant sum of money does not fall into the frame.
It was important to address the exact amount needed to update the research on agriculture. They might be asking for inflated amounts.
Write a program that creates a login name for a user, given the user's first name, last name, and a four-digit integer as input. Output the login name, which is made up of the first five letters of the last name, followed by the first letter of the first name, and then the last two digits of the number (use the % operator). If the last name has less than five letters, then use all letters of the last name. Hint: Use the to_string() function to convert numerical data to a string.
Answer:
In C++:
#include <iostream>
#include <string>
#include <sstream>
using namespace std;
int main(){
string lname, fname,stringnum; int num; string login, pwd;
cout<<"Last Name: "; cin>>lname;
cout<<"First Name: "; cin>>fname;
cout<<"Four-digit integer: "; cin>>num;
stringnum = to_string(num).substr(0,4);
stringstream geek(stringnum); geek>>num;
num = num%100;
pwd = to_string(num);
if(lname.length()<5){ login = lname+fname.substr(0,1); }
else{ login = lname.substr(0,5)+fname.substr(0,1); }
cout<<"Login Name: "<<login<<endl;
cout<<"Password: "<<pwd<<endl;
return 0;
}
Explanation:
This declares all necessary variables
string lname, fname,stringnum; int num; string login, pwd;
This prompts the user for last name
cout<<"Last Name: "; cin>>lname;
This prompts the user for first name
cout<<"First Name: "; cin>>fname;
This prompts the user for a four digit integer
cout<<"Four-digit integer: "; cin>>num;
This converts the input number to string and gets only the first four integer
stringnum = to_string(num).substr(0,4);
This converts the string back to an integer
stringstream geek(stringnum); geek>>num;
This gets the last two of the four digit integer
num = num%100;
This gets the password of the user
pwd = to_string(num);
This gets the login name of the user.
This is executed if the length of the first name is less than 5
if(lname.length()<5){ login = lname+fname.substr(0,1); }
This is executed if otherwise
else{ login = lname.substr(0,5)+fname.substr(0,1); }
This prints the login name
cout<<"Login Name: "<<login<<endl;
This prints the password
cout<<"Password: "<<pwd<<endl;
If anyone has the answer for this that would be really helpful!!
Hope this will help you...
Answer:
1.a
2.f
3.b
4.c
5.e
6.g
7.h
8.d
Explanation:
write a program in Python to calculate a year
Answer:
Sure, here is a Python program to calculate a year:
```python
# Import the datetime module
import datetime
# Get the current date and time
current_date = datetime.datetime.now()
# Get the year from the current date and time
year = current_date.year
# Print the year
print("The current year is", year)
```
Output:
```
The current year is 2023
```
Explanation:
1.
Question 1
An online gardening magazine wants to understand why its subscriber numbers have been increasing. What kind of reports can a data analyst provide to help answer that question? Select all that apply.
1 point
Reports that examine how a recent 50%-off sale affected the number of subscription purchases
Reports that describe how many customers shared positive comments about the gardening magazine on social media in the past year
Reports that compare past weather patterns to the number of people asking gardening questions to their social media
Reports that predict the success of sales leads to secure future subscribers
2.
Question 2
Fill in the blank: A doctor’s office has discovered that patients are waiting 20 minutes longer for their appointments than in past years. To help solve this problem, a data analyst could investigate how many nurses are on staff at a given time compared to the number of _____.
1 point
doctors on staff at the same time
negative comments about the wait times on social media
patients with appointments
doctors seeing new patients
3.
Question 3
Fill in the blank: In data analytics, a question is _____.
1 point
a subject to analyze
an obstacle or complication that needs to be worked out
a way to discover information
a topic to investigate
4.
Question 4
When working for a restaurant, a data analyst is asked to examine and report on the daily sales data from year to year to help with making more efficient staffing decisions. What is this an example of?
1 point
An issue
A business task
A breakthrough
A solution
5.
Question 5
What is the process of using facts to guide business strategy?
1 point
Data-driven decision-making
Data visualization
Data ethics
Data programming
6.
Question 6
At what point in the data analysis process should a data analyst consider fairness?
1 point
When conclusions are presented
When data collection begins
When data is being organized for reporting
When decisions are made based on the conclusions
7.
Question 7
Fill in the blank: _____ in data analytics is when the data analysis process does not create or reinforce bias.
1 point
Transparency
Consideration
Predictability
Fairness
8.
Question 8
A gym wants to start offering exercise classes. A data analyst plans to survey 10 people to determine which classes would be most popular. To ensure the data collected is fair, what steps should they take? Select all that apply.
1 point
Ensure participants represent a variety of profiles and backgrounds.
Survey only people who don’t currently go to the gym.
Collect data anonymously.
Increase the number of participants.
The correct options are:
Reports that examine how a recent 50%-off sale affected the number of subscription purchasespatients with appointmentsa way to discover informationA business taskData-driven decision-makingWhen conclusions are presentedFairnessa. Ensure participants represent a variety of profiles and backgrounds.c. Collect data anonymously.d. Increase the number of participants.What is the sentences about?This report looks at how many people bought subscriptions during a recent sale where everything was half price. This will show if the sale made more people subscribe and if it helped increase the number of subscribers.
The report can count how many nice comments people said and show if subscribers are happy and interested. This can help see if telling friends about the company has made more people become subscribers.
Learn more about gardening from
https://brainly.com/question/29001606
#SPJ1
Reports, investigating, fairness, data-driven decision-making, gym classes
Explanation:Question 1:A data analyst can provide the following reports to help understand why the subscriber numbers of an online gardening magazine have been increasing:
Reports that examine how a recent 50%-off sale affected the number of subscription purchasesReports that describe how many customers shared positive comments about the gardening magazine on social media in the past yearReports that compare past weather patterns to the number of people asking gardening questions on their social mediaReports that predict the success of sales leads to secure future subscribersQuestion 2:A data analyst could investigate the number of patients with appointments compared to the number of doctors on staff at a given time to help solve the problem of longer waiting times at a doctor's office.
Question 3:In data analytics, a question is a topic to investigate.
Question 4:When a data analyst is asked to examine and report on the daily sales data from year to year to help with making more efficient staffing decisions for a restaurant, it is an example of a business task.
Question 5:The process of using facts to guide business strategy is called data-driven decision-making.
Question 6:A data analyst should consider fairness when conclusions are being presented during the data analysis process.
Question 7:Transparency in data analytics is when the data analysis process does not create or reinforce bias.
Question 8:To ensure the collected data is fair when surveying 10 people to determine popular classes for a gym, a data analyst should: ensure participants represent a variety of profiles and backgrounds, collect data anonymously, and increase the number of participants.
Learn more about Data analysis here:https://brainly.com/question/33332656
Scenario
A game developer has asked you to help build a card game. Your task is to allow the user to
pick the cards from the deck.
1. Random Numbers
Type the following code to pick a random number between 1 and 4:
import random
randomNum = random.randint(1,4)
print (randomNum)
2. Choosing a suit
Define a function called chooseSuit(number)
This code MUST go in between the import random line and the rest of the program.
Inside the function use an if..elif block that will turn each number into a suit
def chooseASuit (number):
if number
1:
suit
"Hearts" |
The function should return the value of suit at the end.
3. Calling the function
At the end of the program, call the chooseASuit function, passing the randomNum and
storing the answer in a variable called suit
4. Card Value
Define a function that will convert the values 1, 11, 12 and 13 to Ace, Jack, Queen
and King Capture the response in a variable called value.
5. Finally
The program should print "Your card is the 3 of clubs" (or something similar).
Make this happen 10 times.
In order to facilitate the selection of cards from a deck during a card game, the random module in Python can be utilized.
How to incorporate the random module?By incorporating the random module into our code and invoking the randint function, we can produce a random numerical value ranging from 1 to 4, which can be attributed to the individual cards in our deck.
The following code can be utilized to accomplish this task.
import random
randomNum = random.randint(1,4)
print(randomNum)
The randomly generated number can serve as a tool to identify the exact card selected by the user from the deck. The aforementioned procedure is applicable to every card chosen by the player throughout the game.
Read more about programs here:
https://brainly.com/question/23275071
#SPJ1
If you need to use data located in one workbook in the other workbook, you have to create a(n) ____ between the two workbooks.
The two workbooks must be connected via a link.
What is an illustration of a link?Links form a connection between pages on one website and those on other websites. There would be no websites if there were no links. Let's have a look at https://www.freecodecamp.org as an example. You'll be taken to the official freeCodeCamp website after typing it into the address box.
How do I paste a website's link?Open a web browser, such as Chrome, and select and remove the text that appears in the address bar. To paste the URL you just copied into the address box, simultaneously press "Ctrl" and "V." Once you hit enter, the browser will navigate you to the URL address.
To know more about link visit:
https://brainly.com/question/28938650
#SPJ4
Imagine you have a 10-character string stored in the variable myString. You want to pull out the first five characters. Which of the following lines of code would successfully generate a slice of the 10-character string holding only the first five characters?
a. myString[5]
b. myString[:-5]
c. myString[0:6]
d. myString-15:-5]
e. myString[0:10:2]
Answer:
b. myString[:-5]
d. myString[-15:-5]
Explanation:
I believe you have a typo in d. It must be d. myString[-15:-5]
Slicing can be done:
myString[starting_index, stopping_index, step] (step is optional). If you do not specify the starting index, it will start from the 0 as in b. If you write a range that is not in the range, as in d, Python will replace it with either 0 or length of the string (In this case, it is replaced with 0 because the starting index must be smaller than stopping index)
a. myString[5] → This will give you the sixth character
b. myString[:-5] → This will give you the first five characters
c. myString[0:6] → This will give you the first six characters
d. myString-15:-5] → This will give you the first five characters
e. myString[0:10:2] → This will give you the first, third, fifth, seventh, and ninth characters
Quick please, URGENT
1.Explain why the scenario below fails to meet the definition of due diligence in coding.
Situation: As you are developing an app for a small fee, you include access to many other services, such as searching the Internet.
3.A programmer must know platforms and other languages. On what "side" is Groovy?
programmer side
Web-based side
server-side
client-side
4.Give two reasons why there are more contract workers than permanent workers
5.Explain why the scenario below fails to meet the definition of an app with persona.
Situation: Jim built an app for a company in which the user navigates a Web site by clicking on links and reading written material.
6.Explain why the scenario below is not a description of an angel investor.
Situation: Ray has an idea for developing an app and finds individuals who will invest in the app. These individuals sign an agreement that they expect no money or rights in the app.
7.In an app design project, who is responsible for the SDKs?
the programmer
the developer
the senior executive
the senior staff
8.Suppose you are offered a position that focuses on writing policies, hiring staff, and focusing on the company's mission. What position are you offered?
legal executive
technology executive
resources executive
programming executive
Answer: it is the code it is wrong
Explanation:
which of the following is not the correct definition of an operating system
A.
it controls all other execution in a computer
B.
interface between hardware and application programs
C.
its a platform for ensuring that other executions has taken place
D.
maintains consistency of data loss during execution
The correct answer is C. An operating system is not a platform for ensuring that other executions have taken place. An operating system is a software program that manages the hardware and software resources of a computer and provides common services for computer programs. It acts as an interface between the hardware and application programs and controls all other execution in a computer. It also maintains consistency of data during execution.
If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False
How do you give brainiest on a computer?
Wait until your notification bar says "Select a brainliest" and by notification bar I mean that little bell icon on the top
user intent refers to what the user was trying to accomplish by issuing the query
Answer:
: User intent is a major factor in search engine optimisation and conversation optimisation. Most of them talk about customer intent ,however is focused on SEO not CRO
Explanation:
Question
Select the correct answer.
Which protocol does the World Wide Web use for communication?
OHTTP
O HTML
O XMPP
SMTP
Answer:
OHTTP
Explanation:
Hope it helps
please rate me as the brainliest
Please help its due on May 7th and the code has to be in python.
We can use a list to store the sensor objects, and we can sort the list by room number, room description, or sensor number. However, accessing a sensor by its room number would require iterating through the entire list.
How to explain the informationA tuple is similar to a list, but it is immutable, meaning that it cannot be modified once created. We could use a tuple to store each sensor object, but sorting the tuple would require creating a new sorted tuple. Accessing a sensor by its room number would also require iterating through the entire tuple.
A set is an unordered collection of unique items, and it can be modified. We could use a set to store the sensor objects, but sorting the set is not possible. Accessing a sensor by its room number would also require iterating through the entire set.
Learn more about sensor on
https://brainly.com/question/29569820
#SPJ1
Problem 1 a = 4 b = 3 c = 20 while a < c a = a * 2 b = b * 3 Endwhile output a, b, c
Endwhile output is a = 4, b = 12, c = 20.
What is input and output?
Data must be added to or subtracted from code in all programmes. Inputs are the data that are entered into a programme, whether manually by the programmer or digitally. These inputs are used to run the programme and are saved as variables. A programmer may decide to include outputs to inform the user of what is happening inside the programme. Here, the user is presented with the program's data either visually (on the screen) or physically (as printouts or signals, for example). It's possible that a programme needs to talk to a user. This could be done to display the program's results or to ask for more details so that the programme can run. Output is what the user typically sees as text on their screen.
To learn more about input and output
https://brainly.com/question/27646651
#SPJ1
Components of a product or system must be
1) Reliable
2) Flexible
3) Purposeful
4)Interchangeable
Answer:
The correct answer to the following question will be Option D (Interchangeable).
Explanation:
Interchangeability applies towards any portion, part as well as a unit that could be accompanied either by equivalent portion, component, and unit within a specified commodity or piece of technology or equipment.This would be the degree to which another object can be quickly replaced with such an equivalent object without re-calibration being required.The other three solutions are not situation-ally appropriate, so option D seems to be the right choice.
Before the new website launch, development team does not want users to access the site while it is still under construction. How can this requirement be met?
This requirement can be met by drafting a short text that says that the website is under construction. You could also specify the exact date when the site will be restored.
How to meet the requirementIf you are still working on a website and do not want users to access the site, you should leave a message on the site that says that the website is still under construction.
The link to the website should directly lead to this message. In this space, you should also specify the date and time when the site will be restored.
Learn more about websites here:
https://brainly.com/question/31732575
#SPJ1
The hardware that takes the input data and works with it
Answer:
Examples of input devices include keyboards, mice, scanners, digital cameras and joysticks.
Explanation:
In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.
Ex: If the input is 100, the output is:
After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.
To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:
Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))
Here's the Coral Code to calculate the caffeine level:
function calculateCaffeineLevel(initialCaffeineAmount) {
const halfLife = 6; // Half-life of caffeine in hours
const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);
const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);
const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);
return {
'After 6 hours': levelAfter6Hours.toFixed(1),
'After 12 hours': levelAfter12Hours.toFixed(1),
'After 18 hours': levelAfter18Hours.toFixed(1)
};
}
// Example usage:
const initialCaffeineAmount = 100;
const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);
console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');
console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');
console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');
When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:
After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.
for similar questions on Coral Code Language.
https://brainly.com/question/31161819
#SPJ8
Which core business etiquette is missing in Jane
Answer:
As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:
Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.
Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.
Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.
Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.
Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.
It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Discuss about the advantage of GUI operating system (MS-Window) over Text based operating system (DOS).
Answer:
i dont have a plan of this app please help
When should programmers use variables to store numeric data?
Programmers should use variables to store numeric data when they need to reference and use the same data multiple times throughout a program.
What is program?A program is a set of instructions that can be executed by a computer to perform a specified task. It can be written in any of a number of programming languages, such as C, Java, Python or Visual Basic. Programs can range from simple scripts that automate a task, to complex applications with many features. Programs are designed to solve a particular problem or provide a specific benefit to the user.
Variables are a convenient way to store and access data that may be needed in multiple different places.
To learn more about program
https://brainly.com/question/28028491
#SPJ1
Use the drop-down menus to complete the steps to create a report with the Report button. 1. In the Navigation pane, select the table from which to create the report. 2. Click the tab. 3. In the group, click Report. 4. Microsoft Access creates a form using . 5. Open the report in view. 6. Modify the report. 7. Save the report.
Answer:
Click the
✔ Create
tab.
3. In the
✔ Reports
group, click Report.
4. Microsoft Access creates a form using
✔ all of the columns in the table
.
5. Open the report in
✔ Design
view.
6. Modify the report.
Explanation:
just took it
You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!
Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.
Confidential Computer Forensics Investigation Report
Case Number: 2023-4567
Date: June 22, 2023
Subject: Computer Forensics Investigation Findings
I. Introduction:
The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.
II. Computer Information:
The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.
III. Access and Usage:
During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.
IV. Forensic Tools and Findings:
Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.
Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.
File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.
Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.
V. Conclusion:
Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.
The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.
Please note that this report is confidential and intended for internal use within our law firm.
Sincerely,
[Your Name]
Computer Forensics Investigator
[Law Firm Name]
I hope this helps. Cheers! ^^
Which programming language uses objects? C++ ALGOL Pascal BASIC
Answer:
C++
Explanation:
I am a c++ dev
Answer:
its A
C++
Explanation:
Youre amazing
Python help
Instructions
Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in
the dictionary den stored with a key of key1 and swap it with the value stored with a key of key2. For example, the
following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria")
swap_values (positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria')
def swap_values(dcn, key1, key2):
temp = dcn[key1]
dcn[key1] = dcn[key2]
dcn[key2] = temp
return dcn
The method in the interface for a dictionary collection returns an iterator on the key/value pairs in the dictionary is the Keys () method.
Consider the scenario where you want to develop a class that functions like a dictionary and offers methods for locating the key that corresponds to a specific target value.
You require a method that returns the initial key corresponding to the desired value. A process that returns an iterator over those keys that map to identical values is also something you desire.
Here is an example of how this unique dictionary might be used:
# value_dict.py
class ValueDict(dict):
def key_of(self, value):
for k, v in self.items():
if v == value:
return k
raise ValueError(value)
def keys_of(self, value):
for k, v in self.items():
if v == value:
yield k
Learn more about Method on:
brainly.com/question/17216882
#SPJ1