3. Write a function restrict_type that takes any list 1st and type t (recall some of the types we have seen so far in the class are int, float, str, bool, and list ), and that returns a new list consisting only of those elements from 1st that are of type t. For example, if 1st2 = ["pizza", 5, True, -3.14, "hello", False, 0], then restrict_type (1st2, int) should return the list [5, 0], and restrict_type (1st2, bool) should return the list [True, False]. Hint: Recall the built-in function type returns the type name of a given value. 1st and returns the
3. Write a function restrict_type that takes any list 1st and type t (recall some of the types we have seen so far in the class are int, float, str, bool, and list ), and that returns a new list consisting only of those elements from 1st that are of type t. For example, if 1st2 = ["pizza", 5, True, -3.14, "hello", False, 0], then restrict_type (1st2, int) should return the list [5, 0], and restrict_type (1st2, bool) should return the list [True, False]. Hint: Recall the built-in function type returns the type name of a given value. 1st and returns the
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question
Answer number 3 please
![sepurt
3. Write a function restrict_type that takes any list 1st and type t (recall some of the
"mfdjəy poujanu 1nds nn purl finu
types we have seen so far in the class are int, float, str, bool, and list ), and that
returns a new list consisting only of those elements from 1st that are of type t.
For example, if 1st2 =
["pizza", 5, True, -3.14, "hello", False, 0], then
restrict_type(1st2, int) should return the list [5, 0] , and restrict_type (1st2, bool)
should return the list [True, False].
Hint: Recall the built-in function type returns the type name of a given value.
4. Write a function remove_negative that takes any list of nunbers num_lst and returns the
same list, except all the negative nimbers in thc list have been removed.
For example, if 1st =[-4, -5, 1, 6, 2, -7, 5] , then remove_negative (1st) should
return the list [1, 6, 2, 5], and 1st itself should now have the value [1, 6, 2, 5].
Hint: Instead of traversing through num lst. you may find it helpful to traverse through a
copy of num_lst.](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2F5f674f25-25cd-4157-a3b0-b4cefdd441a9%2F130ec667-5a89-43f9-8bd1-41d522508ba4%2F427jt5g_processed.jpeg&w=3840&q=75)
Transcribed Image Text:sepurt
3. Write a function restrict_type that takes any list 1st and type t (recall some of the
"mfdjəy poujanu 1nds nn purl finu
types we have seen so far in the class are int, float, str, bool, and list ), and that
returns a new list consisting only of those elements from 1st that are of type t.
For example, if 1st2 =
["pizza", 5, True, -3.14, "hello", False, 0], then
restrict_type(1st2, int) should return the list [5, 0] , and restrict_type (1st2, bool)
should return the list [True, False].
Hint: Recall the built-in function type returns the type name of a given value.
4. Write a function remove_negative that takes any list of nunbers num_lst and returns the
same list, except all the negative nimbers in thc list have been removed.
For example, if 1st =[-4, -5, 1, 6, 2, -7, 5] , then remove_negative (1st) should
return the list [1, 6, 2, 5], and 1st itself should now have the value [1, 6, 2, 5].
Hint: Instead of traversing through num lst. you may find it helpful to traverse through a
copy of num_lst.
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 2 images

Recommended textbooks for you

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education

Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY