Add a data attribute tricks of type list to each Dog instance and initialize it in __init__ to the empty list. The user does not have to supply a list of tricks when constructing a Dog instance. Make sure that you test this successfully. >>> sugar.tricks []

Answers

Answer 1

Answer:

Following are the method to this question:

def __init__(self, _name, _breed):#defining Constructor

       """ Constructor """

       self.name = _name#assigning value in name variable

       self.breed = _breed#assigning value in breed variable

       self.tricks = []#defining tricks an empty list

Explanation:

In the above code, a parameterized constructor is defined, that hold two-variable "name and breed" in its parameter, and another object self is created for storing the value.

Inside the constructor two-variable, and one empty list variable "tricks" is defined that hold value in the name and breed variable, and the next step an empty list is defined, that store its value.


Related Questions

If you are caught in a situation with an active shooter, which order should you plan a safe escape? A. Hide, Fight, Run B. Fight, Run, Hide C. Run, Hide, Fight D. Run, Fight, Hide

Answers

Answer:

The answer is C

Explanation:

the answer is run, hide, fight.

the first thing to do is try and run and get away.

the second thing you should do if you can't run is hide. Then if you can't run away nor hide you have to fight.

Pretty sure it’s C LOL hope dis helps

When you are fit, you can exercise and do physical work without getting too tired. A. True B. False\

Answers

Answer:

A.

Explanation:

But all of us get tired

Answer: I did the test it's A

Explanation:

Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management strategy? An indirect benefit? Provide examples.

Answers

Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.

It gives an illustration of the relationship of the National preparedness mission elements of risk.

Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.

However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.

Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.

When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.

THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.

"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.

Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.

In the Unified Process (UP) methodology, most of the Implementation activities occurs during the _____ phase.

a) Inception

b) Elaboration

c) Construction

d) None of the Above

Answers

Answer:

C) construction

Explanation:

The unified process is one of the software development process frameworks. It is an incremental and iterative software building process. The process is carried out in four phases which include; inception, elaboration, construction and transition.

The construction phase is the largest part and is where most of the implementation activities happen. Here the system features are implemented iteratively to enable the executable release of the software.

Insert in the Current Values section at the top of the worksheet summary functions that use the range I9:I54. In cell I2, calculate the total of all the Current Values. In cell I3, calculate the average current value. in cell I4, calculate the lowest current value. In cell I5, calculate the highest current value

Answers

Answer:

Cell I2: =SUM(I9:I54)

Cell I3: =AVERAGE(I9:I54)

Cell I4: =MIN(I9:I54)

Cell I5: =MAX(I9:I54)

Explanation:

I wasnt able to find the worksheet referenced, however it is not needed to answer correctly.

The question states there are several values in the cell range I9:I54, and we need to perform different operations:

In cell I2, calculate the total of all the Current Values

To obtain the TOTAL calculation, we use the SUM function for all the range of values

=SUM(I9:I54)

In cell I3, calculate the average current value

Average is calculated with the function named the same

=AVERAGE(I9:I54)

In cell I4, calculate the lowest current value

The lowest value of all the range is found with the MIN function

=MIN(I9:I54)

In cell I5, calculate the highest current value

The highest value of all the range is found with the MAX function

=MAX(I9:I54)

What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?

a. Heap sort
b. Quick sort
c. Bubble sort

d. Merge sort

Answers

Answer:

d. Merge sort

Explanation:

Merge sort is example of an efficient sorting alogrithm. The Divide and conquer rule is used in this technique. This method breakdown the list into multiple sublists and each sublist contains a single element. This technique merged in the form of sorted lists. This technique uses external memory of the system while sorting.

Merge sort is used to sort the 10,000 items using only 1,000 slots available in the RAM.

The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi pounds, where vi and wi are integers. The thief wants to take as valuable a load as possible, but he can carry at most W pounds in his knapsack, for some integer W . Which items should he take?

Answers

Step by step Explanation:

Based on what we could deduce from the above statement, the items he should take are:

must either take one single item or must leave the other behind,and only a whole amount of an item must be taken,in which an item cannot be taken more than once into his knapsack.

Hence, the thief needs to carefully determine items with an optimal value which still falls within his specified weight (W).

Its an HTML5 anyone kwons
After the computer executes the following code, what value will be stored in the variable result?

let x = 2, y = 6, z = 5;
let result = (x < 3 && y == 6);

Answers

Answer:

1 will be stored in result

Explanation:

Given

The lines of code

Required

Determine the value stored in result

The value stored in result is determine by the condition (x<3 && y ==6)

In the first line, the value of x is 2 and the value of y is 6

So: x<3 is true because x = 2 and 2 is less than 3

y == 6 is also true because y = 6 and 6 is equal to 6

So, the condition (x<3 && y ==6) is true and true will be saved in variable result

Because result is a Boolean variable which can only take true or false value

1 represents true

0 represents false

So, 1 will be stored in result

Write a program that uses key events to make a circle larger and smaller.

Your circle should start at a radius of 100 and a position of 250, 250. Each time the user hits the left arrow, the circle should decrease by 10. If the user hits the right arrow, it should increase by 10.

Hint: Use the get_radius() and set_radius() method to change the size of your circle. Find more details and examples on these functions in the DOCs tab.

Challenge: Can you prevent the circle from getting smaller than a radius of 10 and larger than a radius of 400?


in python code

Answers

Answer:

circ = Circle(100)

circ.set_position(250, 250)

circ.set_color(Color.yellow)

add(circ)

def grow_circle(event):

   if event.key == "ArrowLeft":

       circ.set_radius(circ.get_radius() - 10)

   if event.key == "ArrowRight":

       circ.set_radius(circ.get_radius() + 10)

   

add_key_down_handler(grow_circle)

Explanation:

By making it that when the left/right arrow is clicked the radius of the circle is first taking into account before anything else, then each time the arrow is clicked the current radius either gets 10 added or removed from it.    

In a team if someone gets stuck with the selected tasks for the iteration, what is the immediate next step?

Answers

Answer:

The team member has to immediately inform the lead or onsite coordinator without wasting time and take up another task

Explanation:

In a situation where someone in a team is unable to move further to another tasks the next step is for the team member to immediately inform the onsite coordinator in order for them to take up another task reason been that the onsite coordinator sole responsibility is to ensure the completion of tasks without any flaw and Secondly if the team members did not inform the onsite coordinator immediately it will eventually lead to waste of time due to the time spent on the tasks thereby affecting the next tasks.

Therefore the immediate next step is for the team member to immediately inform the lead or onsite coordinator without wasting time and take up another task.

John's father specifically asked him to get a magnetic disk from the store in his neighborhood. What should John buy?
A. a floppy disk
B. a DVD
C. a CD-ROM
D. a Blu-ray disk

Answers

Answer:

A floppy disk

Explanation:

A floppy disk uses a thin sheet of magnetic material to store data. It would make the most sense as the other choices use an entirely different system.

What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets is 45? a. 220.100.100.42 to 220.100.100.51 b. 220.100.100.52 to 220.100.100.55 c. 220.100.100.45 to 220.100.100.46 d. 220.100.100.40 to 220.100.100

Answers

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '[tex]2^{n}[/tex]-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

What is the output by the code below system.out.print(8-4+2);

Answers

Answer:

6

Explanation:

In a mobile phone network, how many times as strong would

Answers

Answer:

how many times as strong would what?

put your question in the replies to this answer and I'll gladly answer it

Explanation:

May I have brainliest please? :)

Plz help!! ASAP!! And thank you!!

Answers

Answer:

first one, become vulnerable to online harassment

It may be the first one because the other person said so

Write an application that stores the following nine integers in an array: 10, 15, 19, 23, 26, 29, 31, 34, 38. Display the integers from first to last, and then display the integers from last to first.

Answers

Following are the code to this question:

Program Explanation:

Defining an array "arr1" of an integer value is declared, which stores 9 elements. In the next step, an integer variable "i" is declared, which uses two for loops to print the value in the given order.In the first for loop, it starts from 0 and ends when its value is less than 9, and prints the array value.In the second for loop, it starts from 9 and ends when the index value is equal to 0, and prints the array value in reverse order.

Program:

#include <iostream>// header file

using namespace std;

int main()//main method

{

int arr1[]= {10, 15, 19, 23, 26, 29, 31, 34, 38};//defining array of integer values

int i;//defining integer variable

cout<<" Array from first to last: ";//print message

for(i=0;i<9;i++)//use for loop to print array

{

cout<<arr1[i]<<" ";//print array value

}

cout<<"\n Array from last to first : ";//print message

for(i=9-1;i>=0;i--)//defining for loop to print array in reverse order

{

cout<<arr1[i]<<" ";//print array

}

return 0;

}

Output:

Array from first to last: 10 15 19 23 26 29 31 34 38  

Array from last to first : 38 34 31 29 26 23 19 15 10  

Learn more:

brainly.com/question/12906023

The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value

Answers

Answer:

Pattern.

Explanation:

The pattern attribute can be used only with input boxes that store text.

Generally, the pattern attribute cannot be used with other types of data in computer programming.

Basically, it comprises of data types which mainly includes an attribute of the text, e-mail, telephone, uniform resource locator (URL), search input types and password which must all be matched with the input value in order to pass an authentication or authorization.

for the following graph, what is the goal state?

Answers

Answer:

E

Explanation:

Answer:

the answer is b

Explanation:

I got it right on the test

__________________ is the capacity for the system to change in size and scale to meet new demands.

Answers

Answer:

The answer is Capacity planning

Which ways can you locate a function if you cannot remember the specific name? Check all that apply. searching in the Tell Me bar looking it up in the Formula tab looking it up in the Data tab using the Insert Function and typing a description using the Insert Function and selecting a category

Answers

Answer:

A, B, D, E

Explanation:

Just did it in Edge.

Answer:

A, B, D, E

Explanation:

With __________________________, the IT resource is relocated to a host with more capacity. For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk-based SAN storage device with 8 GB per second I/O capacity.

Answers

Answer:

Dynamic Relocation.

Explanation:

The dynamic relocation is one of the methods used to implement a dynamic scalability architecture amongst others such as dynamic horizontal scaling and dynamic vertical scaling.

With dynamic relocation, the IT resource is relocated to a host with more capacity. For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk-based SAN storage device with 8 GB per second I/O capacity.

Suppose a package pkg1 contains a class named MyClass and another package pkg2 contains a different class named MyClass. What happens when you impot both classes?

Answers

Answer:

Following are the solution to this question:

Explanation:

In this question, two packages "pkg1 and pkg2" is defined, that hold a class that is "MyClass", in which the class name is the same. If we import the package so, it can't import both classes in the very same file. If we really need to apply to both, then must completely specify one class name, and in the class name is different so, we simply use both classes by creating the instance.  

Write a program which takes a String input, and then prints the number of times the string "sh" appears in the String (s and h can be any case).

Hint - remember there are String methods which return a copy of the String it is called on with all letter characters changed to the same case.

Sample run

Input String:
She sells seashells on the seashore
Contains "sh" 3 times.

Answers

import java.util.Scanner;

public class JavaApplication61 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Input String:");

       String text = scan.nextLine();

       text = text.toLowerCase();

       char c = ' ', prevC = ' ';

       int count = 0;

       for (int i = 0; i < text.length(); i++){

           c = text.charAt(i);

           if (c == 'h' && prevC == 's' && i >= 1){

               count += 1;

           }

             

            prevC = c;

       }

       System.out.println("Contains \"sh\" "+count+" times.");

       

       

   }

   

}

This works for me. Best of luck.

import java.util.Scanner;

public class{

public static void main(String[ ] args){

Scanner reader = new Scanner(System.in);

System.out.println(“Input String:”);

String input = reader.nextLine();

input = input.toLowerCase();

int count = 0;

for (int i = 0; i < input.length()-1; i++){

if (input.substring(i, i+2).equals(“sh”)){

count++;

}

}

System.out.println(“Contains \”sh\” ” + count + “times.”);

}

}

Which program will have the output shown below?
10
11
12
13
>>> for count in range(14):
print(count)
>>> for count in range(10,13):
print(count)
>>> for count in range(10, 14):
print(count)
>>> for count in range(13)
print(count)

Answers

Answer:

for count in range(10, 14):

   print(count)

hope i helped :D

Answer:

for count in range(10, 14):

  print(count)

Who designed the Apple I computer in 1976

Answers

Answer:

Steve Wozniak

Explanation:

Answer:

Steve Wozniak i believe

Justify the existence of programming languages to precisely communicate instructions?

Answers

Answer:

Machines don't understand human language and so must be communicated to using programming languages

Explanation:

Machines help make our lives easier. A machine as simple as a Zip can help to make keep one from an embarrassing situation.

Computers have evolved from simple calculators to what they are today. In the case of a zip, the user thinks up the instructions and executes it. Because a computer is more autonomous and automated than a simple zip because it is given a set of instructions and left to execute them. Because machines are not humans and do not understand any human language, the man had to invent machine language which in it's most basic form is 0 and 1. 0 for 'Off' or 'No' and 1 for 'On' or 'Yes'.

This basic form of language, just like the human language too, has evolved into several more complex and varied forms of languages. They remain relevant and continue to evolve to enable man to communicate with the machine as easily as possible because

Without the programming languages, we would be unable to efficiently describe our commands to the computer. The existence of many languages stems from the fact that languages are deemed more efficient when one is able to communicate more with fewer words. An advanced program is one that enables the programmer to do more with fewer and fewer lines of code.

Cheers!

Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2

Answers

Answer:

F7

Explanation:

Mostly in MS Office products, although a lot of other products will mimic the same well known key sequences as a way of enticing you to their platform.

Answer:The answer to your question is F7

Explanation:

Jenny has entered data about models of laptops from company A and company B in a worksheet. She enters model numbers of laptops from company A along with their details in different columns of the worksheet. Similarly, she enters details of all the laptop models from company B, Which option will help Jenny view the data for company A and company B in two separate sections after printing? The option will help her view the data for company A and company B in two separate sections after printing.

Answers

Answer:

The Split option under the view tab.

Explanation:

Click the View tab on the Ribbon, then select the Split command. The workbook will be split into different panes. You can scroll through each pane separately using the scroll bars, allowing you to compare different sections of the workbook.

Answer:

Split

Explanation:

Match the definition to the word.
1. establish as law
ordain
2. having the nature of a miracle
retinue
3. a great many
miraculous
4. keep alive and well with food
liege
5. an iron block on which metals are hammered
arms
6. the lord who has the right to homage
multitude
7. a group of attendants
successor
8. weapons; fighting
wrangling
9. a person who follows another person
anvil
10. a noisy quarrel
nourish

Answers

Explanation:

1. establish as law - ordain;

2. having the nature of a miracle - miraculous;

3. a great many - multitude;

4. keep alive and well with food - nourish;

5. an iron block on which metals are hammered - anvil;

6. the lord who has the right to homage - liege;

7. a group of attendants - retinue;

8. weapons - arms;

9. a person who follows another person - successor;

10. a noisy quarrel - wrangling;

EMERGENCY- I am giving 55 points for this, please help. WITH working out
What would be the size of a sound file, which is 30 seconds in length and has a bitrate of 96kbps? You must show your working out.

Answers

Answer:

360 kilobytes

Explanation:

(Time × Bitrate) / 8

30 × 96 = 2880 / 8

360 kilobytes

8: kilobits in a kilobyte

Time is always in seconds to obey the kb*ps* rule

Bitrate is always on bits so thats kilobits not kilobytes purpose of conversion

Other Questions
what is the article Death Penalty." Gale In Context Online Collection, Gale, 2020 about? helpppp please will give brainliest Which political party was Abraham Lincoln part of? Which statement best explains how President Wilsons background affected peace negotiations? He was a former university president with little political experience. He was an idealist who was often unwilling to compromise. He was a realist who was often willing to compromise. He was a former university president unfamiliar with negotiations. Evaluate: 20 5.2-^3 could somebody please give me constructive feedback on my essay and how to make it better? its a day overdue but Im really anxious because Im horrible at structuring and writing :) [linked pdf] Now write your own four-line poem. Try to use some interesting words. The lines should rhyme. You may use one of the following titles, or you may write your own title.1. "I Wish I Were"2. "Sparkling Water"3. "My Crazy Cat"4. "Monkey Business"5. "Sing a Song"Try writing more than one poem. Then, choose the best one and type it in the paragraph box below. Make sure that you give your poem a title. Write the title above the center of the first line. Begin the first word of each line with a capital letter. How are work and force related Which phrase describes Charlotte Perkins Gilmans most likely purpose for writing "The Yellow Wallpaper"? a. to show that most women are willing to sacrifice their own happiness to make others happy b. to show how important rest and isolation are for women recovering from a destructive mental illness c. to show how conflicts related to parenting can affect the relationship between a husband and wife d. to show how societys expectations of women can limit their creativity and intellectual growth Somebody help this is all I need for today Which group appointed the committee in charge of drafting the Declaration of Independence and eventually adopted it? A. Second Continental Congress B. First Continental Congress C. Executive Branch of the Colonies D. United States Supreme Court b) Explain ONE specific cause for the emergence ofa Market Revolution.c) Explain ONE specific consequence of theemergence of a Market Revolution. What is 55 divided by 32 I NEED HELP!! pleaseee please help you can use my notes (srry there bad)In two paragraphs, summarize the contributions of Muslim scholars in the areas of art, literature, and philosophy.The Contributions of Muslim ScholarsDuring the Middle Ages, Muslim scholars:-studied works from Greece and Rome, and translated them into Arabic-helped to preserve ideas and works from the classical world-created and shared new ideasDefining PhilosophyPhilosophy is the study of knowledgeHuman Behavior-Study principles that guide how people should live-Discuss ethics to determine which behaviors are moral or goodHuman Spirit-Think about what it means to be a human being-Discuss what makes a person the same through timeReason and Logic-Use reasoning to state an explanation-Use logic to discuss the criteria to believe that something is trueSufismSufism is an Islamic belief and practice based on the idea that people can experience Allah's wisdom and love.-Sufis believe that meditation and other actions can help people encounter Allah-Sufi ideas influenced art, religion, and philosophy-Sufi missionaries helped spread Islam around the worldTold stories about traveling merchants, romances, adventuresMuslim artists do not create images of Allah, Muhammad, or living things. Calligraphy is a common art form in the Islamic culture, it decorated many objects.They made tessellations that are mathematical patterns that repeat shapes and colors. These designs were places on objects, carpets, fabric, and tiles.Islamic literature blended ideas and stories from different cultures. The Thousand and One Nights contained stories from many different regions. What is the value of k in the function f(x)=112-kx if f(-3)=121? hiii please help me 20ptss what type of service does time safari, inc. provide? Marie can find the volume of a cube by using the formula V = 53, where s represents the side length of the cube. If Marie'scube has a side length of 2 centimeters, what is the volume of her cube? Show your work. Write your answer as a fraction. 1How did Ghana control the gold-salt trade and how did it make them powerful