What is the missing line?

>>> myDeque = deque('math')
_____
>>> myDeque
deque(['m', 'a', 't'])


>>> myDeque.clear()

>>> myDeque.clear()

>>> myDeque.popleft()

>>> myDeque.pop()

Answers

Answer 1

Answer: i think it is >>> myDeque.clear()

Answer 2

The missing line >>> myDeque = deque('math') >>> myDeque.clear() >>> myDeque deque(['m', 'a', 't']). The correct option is B.

What are coding variables?

A variable is a type of data storage in a computer program. Consider a variable to be a container, and its name to be the label on the container, indicating what is within.

Variables are used in coding and programming to assist programmers in understanding, remembering, and applying program information. A variable is anything that may be altered.

Variables are used in computer programming to store information that may change and can be utilised later in the program. In a game, for example, a variable could be the player's current score; if the player gained a point, we would add 1 to the variable.

Therefore, the correct option is B. >>> myDeque.clear().

To learn more about coding variables, refer to the link:

https://brainly.com/question/27935882

#SPJ5


Related Questions

Helpppppppppppppppppppp

Answers

THE ANSWER IS B MOST DEFINITELY

Fill in the blank with the correct response:
_____ is information about an object that is stored and used.

Answers

the answer to your question is data.

name tow ways to render a program as a single file

Answers

Answer:

*two

Explanation: and im not sure but have a great day and good luck on whatever you are doing!

Steven wrote an algorithm for his coding class that explains how he puts on his shoes. Which is the correct sequence of steps that Steven used?

Place foot in shoe, untie laces, tie laces
Tie laces, place foot in shoe, untie laces
Untie laces, place foot in shoe, tie laces
Untie laces, tie laces, place foot in shoe

Answers

untie laces ,place foot in shoe, tie laces maybe?

What is the name of the protocol used with IPv6 to learn the Layer 2 addresses that exist on the same local network

Answers

Answer:

Network Discovery Protocol (NDP)

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are;

I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.

II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

Hence, Internet protocol version 6 (IPv6) was developed and introduced to replace the previous version (IPv4); Internet protocol version 4. The best statement which describes a benefit of IPv6 over IPv4 is that, Internet protocol version 6 (IPv6) eliminates the use of hierarchy in addressing, making addresses easier to use because the size of the routing table is smaller (reduced) and as such making routing with IPv6 to be more efficient.

Hence, Network Discovery Protocol (NDP) is the name of the protocol used with IPv6 to learn the Layer 2 addresses that exist on the same local network.

Complete the steps for saving a presentation as a poi file,
Click on the File tab.
Next, click on
In the drop do
OR
Click on the F
Copy & Print
Next, click on
Last, click
Send
Save As

Answers

Answer:

Click on the F

Copy & Print

Next, click on

Last, click

Send

Save As

Explanation:

This is because save means it will save your file as the same you have made but drop do means to cut or don't save the file that's why it should be the second one means:Click on the F

Copy & Print

Next, click on

Last, click

Send

Save As

assignment 1: silly sentences edhesive

Answers

Answer:

print("Let's play Silly Sentences!")

print(" ")

name=input("Enter a name: ")

adj1=input("Enter an adjective: ")

adj2=input("Enter an adjective: ")

adv=input("Enter an adverb: ")

fd1=input("Enter a food: ")

fd2=input("Enter another food: ")

noun=input("Enter a noun: ")

place=input("Enter a place: ")

verb=input("Enter a verb: ")

print(" ")

print(name + " was planning a dream vacation to " + place + ".")

print(name + " was especially looking forward to trying the local \ncuisine, including " + adj1 + " " + fd1 + " and " + fd2 + ".")

print(" ")

print(name + " will have to practice the language " + adv + " to \nmake it easier to " + verb + " with people.")

print(" ")

print(name + " has a long list of sights to see, including the\n" + noun + " museum and the " + adj2 + " park.")

Explanation:

Got it right. Might be a longer version, but it worked for me.

6. What will be the order of letters printed to the console when this program is run?
console.log
a
i
letters 09;
letters (); →
vo ir A WNH
4
function letters ()
console.log
console.log
T
O
11
A. abc
B. abcbcbc
0000
C. abcbc
D
a b ca

Answers

Answer: There’s a thing called repl .it. Or u can use GitHub and stackOverFlow

Explanation:

Answer:

a bc bc

will be displayed

Explanation:

Please help! I tried this by myself. But I am not sure if this is right.

Answers

Answer:

Yes this is correct

Explanation:

btw trust yourself, believe in yourself because you can do it. I believe in you ;)

Answer:

This is correct

you are considering cloud services, and you concerned about the interaction of your security policies and those of the hosting provider. What can alleviate your concern

Answers

Answer:

Cloud access security brokers

Explanation:

Cloud access security brokers (CASBs) can alleviate your concern. This is a software that is between cloud service users and cloud applications. Monitoring every activity and ensuring security protocols.

It does the work of merging the security policies of users and that of the providers. Across cloud platforms, the CASB can help to identify unsanctioned use.

Given the code, what would you expect to happen as a result?
int[] lotteryNumbers = {7, 17, 27, 37, 47, 48};
lotteryNumbers[0] = 3;

a) an index out of bounds error

b) the arrays LAST element is set to 3

c) the arrays FIRST element is set to 3

d) array element 3 is set to 0

Answers

Answer:

Option C) the array's first element is set to 3 is the correct answer.

Explanation:

Given code is:

int[] lotteryNumbers = {7, 17, 27, 37, 47, 48};

lotteryNumbers[0] = 3;

The first line of code will make an array with the elements given on the right side of the equals to.

The elements of arrays are accessed through indexes and the indexes start from zero.

So,

lotteryNumbers[0] means the first element of array.

And

lotteryNumbers[0] = 3;

This means that the first element of array will be set to 3.

Hence,

Option C) the array's first element is set to 3 is the correct answer.

Help me please! (*13* points!)
Please answer the following essay question:
Why would it be useful to use data bars and Sparklines in an Excel table?
Answer in paragraph form using 5-7 complete sentences.

Answers

Answer:

Sparklines and data bars are often used in Excel tables. Their impact comes from viewing many of them together and being able to quickly compare them one above the other, rather than viewing them singly. They make it easy to see the outliers, the rows that are not performing like the others. Although they are small, each sparkline often represents multiple data points, often over time. Data bars can represent multiple data points, but typically illustrate only one. Each sparkline typically presents a single series.

Explanation:

What is the purpose of a Post Mortem Review?

To check the code for spelling
To prove the algorithm is correct
To understand how the code can be improved
To check the code for formatting

Answers

Answer:

A post-mortem meeting is held at the end of a project. The goal is to look at the project from start to finish to determine what went right and what can be improved. By the end of the meeting, you should have identified best practices and opportunities for improvement going forward.

Explanation: NONE

Answer:

A post-mortem meeting is held at the end of a project.

Explanation:

Calling all engineers and tech geniuses. Brianliest for correct answer.

My cousin has this toy walkie talkie but it doesn’t work without a battery. I want to put a battery in but I don’t know what to put in because there is no label saying so.

Please help!

Which battery should I put in and where do I get it from???

Answers

Answer:

so id assume you need a battery like in the photo. to attach it you should be able to look at the top of the battery and just click the battery component onto the battery. sorry if im using the incorrect terms.

An analyst determines the value of investments

True

False

Answers

The correct answer is True

Answer:

It is true

Explanation:

Paths describe the location of folders and files on your computer. If you have saved your work to c:\documents, then your work has been saved to your
A. computer’s hard drive.
B. flash drive
C. student drive
D. OneDrive

Answers

The answer is D and it can also be C

Answer:

la ventana de micros word

Question 11
1 pts
You need to find the square root of a value. Which of the following functions would you
use?
int
fabs
pow
O sqrt

Answers

Answer:

sqrt

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task. It can be classified into the following categories;

If you need to find the square root of a value. The function you would use is sqrt.

In Computer programming, the sqrt () function is a mathematical tool which allows a user to find the square root value of any numerical value (numbers)

For example the code for finding the square root of a value using Python programming language is;

num = 36

\\This is the value of the original number\\

sqrt = num ** (0.5)

print ("The square root of the number "36" is 6")

Answer:

sqrt

Explanation:

i'm in python

identify the tools on the boxes. write the answer

Answers

Answer:

im going off of what i know =( 2 screw driver 3 zip ties 5 needle nose plyers 8 can air

Explanation:

Janice’s grandmother stayed at home and took care of her family while her grandfather worked. Today Janice lives on her own and has a full time job. What factor that affects the labor market is represented in this situation? a. Population shift b. Social change c. World event d. Government action

Answers

Answer:

Social change

Explanation:

The factor that affects the labor market as represented in this situation is Social change.

What is social change?

Social change is known to be the way that which people often use in interaction with others. It is also known as the way that relationships changes cultural and social institutions in course of time.

Conclusively, social changes do have long‐term effects such as industrial revolution and it is the factor that influence the labor market as shown in this situation above.

Learn more about Social change from

https://brainly.com/question/13391889

What is the output for the following program?

numA = 10
while numA < 21:
numA = numA + 5
print(numA)

Answers

Answer:

Output:

15

20

25

Explanation:

In first iteration value of num is 10. Condition is checked 10 is less than 21 so value of num is incremented by 5 and value 15 is printed than again condition is checked 15<21 so value of num is incremented again and 20 is printed. Again condition is checked 20<21. So 25 is printed. Then 4th time when condition is checked vakue of num is 25 and while loop condition becomes false because 25 is not less than 21 and program is terminated here.

Answer: 15,20,25

Explanation: got it right on edgen

Which group allows you to add notes to your presentation?

Animations
Presentation views
Show
Zoom

Answers

The group that allows you to add notes to your presentation is the Presentation views.

What is the presentation View for adding notes?

The Slide Sorter view is known to be a tool that help one to have a great view of their presentation.

This tool is known to help one to  rearrange and hide their slides and also to increase or decrease the size of the slides by making adjustment to it.

Learn more about presentation from

https://brainly.com/question/24653274

6 → What is the difference between SHA-256 and SHA-512?

Answers

Explanation:

SHA-2: A group of two related hash functions, identified as SHA-256 and SHA-512.

The word size varies; SHA-256 uses 32-byte characters, whereas 64-byte words are used by SHA-512.

what are the condition of machines or equipment if the parts of the equipment are easy to assemble and disassemble​

Answers

Answer:

 

Explanation:

i dont now

A website for a certain political party or candidate is likely to have unbiased
information. Choose the answer.

True

False

Answers

False I believe probably false

Answer:the answer is false i had the same question in my test and i put false i got it right

Explanation:

50 POINTS!!!!!!!!!!!

Give at least two examples of how the transport layer is used.

Answers

Answer:

The transport layer is responsible for delivering data to the appropriate application process on the host computers. Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.

Explanation:

Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.

Answer:

1. The transport layer is responsible for delivering data to the appropriate application process on the host computers. and 2. Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.

-CC

How do I find where I have used Premium Feature in CANVA
I am a free user

Answers

Answer: Ok go to the website (Canva) and you will see they have plan like there is one that is free, and there is one that is name pro but you have to pay $12.95 and the last one is Enterprise which cost $30.00

Hope this help :)

Explanation:

Which statement assigns the value 140 to the variable streetNumber in Python?

streetNumber = 140
streetNumber! = 140
street number = 140
StreetNumber == 140

Answers

Answer:

Explanation:

Option 1 (streetNumber = 140) is right one.

Because we use = symbol for assigning a value. It is also called as assignment operator. We didn't selected the option 3 which is street number = 140 because variable name donot contain any space.

Choose the type of error described.
______ occurs when the result is wrong because of the programmer's mistake, such as multiplying two numbers when they should have been added
______ occurs when you use the wrong punctuation, such as print 'hello' without parentheses
______ occurs when the program starts running, but encounters an error such as trying to divide by zero

A. runtime
B. logical
C. syntax

Answers

Answer:

first scenario: B

second scenario: C

third scenario: A

hope this helps! :-)

Answer:

1.logical occurs when result is wrong

2.syntax occurs when the wrong punctuation is use

3.runtime occurs when program starts running

Explanation:

Learning task 1: introduction A.Direction:below are jumbled letters. Write the correct spelling opposite of the scramble letters. 1.GNISSRED 2.MMONEL UIJEC 3.ISENNOAYMA 4.MULEISIFRE 5.TERIRESHSECROW

Answers

Answer:

Following are the solution to this question:

Explanation:

For point 1: DRESSING

For point 2:  LEMON JUICE

For point 3: MAYONNAISE

For point 4: EMULSIFIER

For point 5: WORCESTERSHIRE

Analyze the difference between security settings and privacy settings.

Answers

Answer:

Explanation:

Security settings controls people getting through and into your devices. It is more of a protection while privacy is just more of who and what can be viewed.

Other Questions
Read the underlined sentence in the paragraphon page 2. What can be inferred from thissentence?The narrator does not want his uncle to call himinside.The narrator is worried that his uncle is in danger.The narrator does not want his uncle to meetMangan.The narrator is worried that his uncle is angry withhim Ancient towns were filled with life-size bronze and marble figures. Cities in the Roman Empire could have over a thousand such statues. Statues honored rulers and gods. Beautiful statues also made people proud of their city. But by 400 CE, the number of statues began to fall. By 700 CE, hardly any new statues were being built in the Roman world. The Last Statues of Antiquity project wanted to know why cities built statues for so long, and then slowly stopped building them. Historians collected and analyzed evidence for new statues being built from 250 to 650 CE. They wanted to find evidence for why so few statues were being made.Why did historians choose to study this topic?They were interested in finding out which artists stopped building statues.They wanted to understand why there was a decline in caring about cities.They wanted to discover how so many statues were lost.They wanted to learn why there was a decline in creating statues in ancient R What was the outcome of the priests actions?A. The couple was finally able to marry in a church.B. Coincoin gained her freedom after others intervened.C. The laws were changed to allow interracial relationships.D. Coincoin was forced into slavery for the first time in her life. On October 2, 2020, Grouper Company sold $5,720 of its elite camping gear (with a cost of $3,720) to Lynch Outfitters. As part of the sales agreement, Grouper includes a provision that if Lynch is dissatisfied with the product, Grouper will grant an allowance on the sales price or agree to take the product back (although returns are rare, given the long-term relationship between Grouper and Lynch). Grouper expects total allowances to Lynch to be $770. On October 16, 2020, Grouper grants an allowance of $390 to Lynch because the color for some of the items delivered was a bit different than what appeared in the catalog. Please help!!! I will greatly appreciate it. Imagine you are the wealthy owner of a successful business in Venezuela. How might you have viewed Chvezs actions? What is the opposite of negative seven? The political cartoon The Freedman's Bureau! would best serve as historical evidence to support which of the following conclusions? a. reconstruction was largely a failure because of politicians' unwillingness to fund important projects.b. white supremacy remained a powerful social force during Reconstruction.c. The end of slavery led to a decrease in racial tensions throughout the United States. d. The Freedmen's Bureau allowed many former slaves to lead lazy, unproductive lives. 3: Consider molecules of hydrogen (tiny ones) and oxygen (bigger ones) in a gas mixture. If they have the same average kinetic energy (they will at the same temperature), which molecules have the greatest average speed Solve for x (6x+5) (6x+16) (7x-3) You have two pieces of rope. One piece is of rope is 98 feet and the other is 56 feet. You need to cut the rope into equal lengths with non left over. What is the greatest possible lenth you can cut the rope so all peices will be the same Jeff sells a pack of 36 pencils for $3.25. Betsy sells a pack of 12 pencils for $1.50. Which is the better buy? please help me my teacher won't help and I dont get this problem At 400K both compounds are gases. At this temperature, which compound, CH4(g) or CCl4(g) , behaves more like an ideal gas Propose a solution to the following scenario using each of the five ethical theories presented in this module. Explain how your solution aligns with the major ideas within each theory. Scenario: There is a pandemic of a contagious disease. In the United States, there is only enough of the vaccine to cover 70% of the population. How do you determine who gets the vaccine The plasma membrane is composed of both lipids and proteins. The relative concentration of each in the plasma membrane is partly regulated by the The color of ink is a ___ As America entered the war, who else dropped out? En dnde puedes disfrutar de un i lago, hacer un picnic, y jugar con los nios? How many moles are in 563.9 grams of arsenic?