subject
Computers and Technology, 21.06.2021 16:30 245cat

Very noob React problem and question. So I can log what I'm trying to log here and I get what I want in the console. I'm trying to simply add the stated 'peopleFinallyShowUp' variable that you see. What I have no is wrong of course but I've tried so many things. I get the error Error: Objects are not valid as a React child (found: object with keys {name, height, mass, hair_color, skin_color, eye_color, birth_year, gender, homeworld, films, species, vehicles, starships, created, edited, url}). If you meant to render a collection of children, use an array instead. I have tried creating the state as an array with passed in props. I only want to pass peopleFinallyShowUp and have it render in my app. It consoles just fine, there's simply something restricting me from putting it here between the tags.
import React, { Component } from 'react';
import logo from './logo. svg';
import './App. css';
class App extends Component {
constructor(){
super()
this. state = {
jedi: []
}
}
componentDidMount(){
fetch('https://swapi. co/api/people/1/?format=json').then (response => {
return response. json()})
.then(data => {
// Work with JSON data here
this. setState({jedi: data });
}).catch(err => {
console. log(err)
// Do something for an error here
});
};
render() {
return (

Welcome to React

{this. state. jedi}

);
}
}
export default App;

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
question
Computers and Technology, 22.06.2019 15:10
Which activity should be part of a long-term plan to positively affect yourhealth? oa. wearing regular clothing when handling toxinsob. not worrying about secondhand smokeoc. avoiding excessive exposure to sunlightod. drinking only well water
Answers: 1
question
Computers and Technology, 22.06.2019 16:00
You have inserted new slides based on a word outline. how do you format these new slides to match the powerpoint presentation formatting? a. select all slides in the presentation and click format on the home tab. b. select the new slides and click reset on the home tab. c. select all slides in the presentation and click reset on the home tab. d. select the new slides and click format on the home tab.
Answers: 3
question
Computers and Technology, 22.06.2019 21:30
Nathan wants to create multiple worksheet containing common formatting styles for his team members. which file extension him to save these worksheets? nathan to create multiple worksheets with common styles. he needs to save them with the extension.
Answers: 1
You know the right answer?
Very noob React problem and question. So I can log what I'm trying to log here and I get what I want...
Questions
question
Chemistry, 14.11.2020 03:40
question
Mathematics, 14.11.2020 03:40
question
Chemistry, 14.11.2020 03:50
question
Chemistry, 14.11.2020 03:50
question
English, 14.11.2020 03:50
Questions on the website: 13722362