How to give a file name as an argument in function in python.

Answers

Answer 1

Answer:name it the secret

Explanation:


Related Questions

A monitor is an output device. Which of the following is not a type of monitor? *

Light Emitting Diodes
Cathode Ray Tube
Laser Crystal Diodes

Answers

Answer:

cathode ray tube is the correct answer

Anyone knows the answer for 6. 1. 4 Happy Birthday! codehs

Answers

The birthday program is an illustration of a sequential program

What are sequential programs?

Sequential programs are programs that do not make use of loops and conditional statements

The main program

The program written in Python, where comments are used to explain each line is as follows:

#This prints Happy birthday

print("Happy birthday")

Read more about Python programs at:

https://brainly.com/question/26980955

when was the first computer built..

Answers

Answer:

1822 but it was a medical computer. not the same as computers today

Explanation:

The first computer was invented in 1822 but was built in 1991. It was invented by Charles Babbage.

Hope this helps!

True/False: Before a computer can execute a program written in a high level language, such as C , it must be translated into object code. True False

Answers

Answer:

True

Explanation:

What needs to be done before depositing a check using a mobile app?

Answers

Answer:

The check needs to be signed in the back by you or whoever is depositing it.

Answer:

Choose the account you want to deposit the check to. Enter the check amount. Take a photo of the front and back of the check using your mobile device's camera. Review the deposit details, then hit submit, if they're correct, to process your deposit.

Explanation:

the bookstore sold 8 books for $66 at that rate how much was one book

Answers

8x=66

8x/8 = 66/8

x=8.25$

Project: Design and Development Research Project
a team at work

A team (Imagery supplied by RicardoImagen/iStock via Getty)
Your Task
Your teacher may ask you to work in groups. Check with your teacher to see if this is required.
Choose a topic from the unit.
Identify a problem or issue to research.
Write a question (or questions) to be answered by your research.
Find at least four sources; these can be a journal article, a website from a reputable organization, an encyclopedia, a newspaper, or a documentary. When in doubt, ask your teacher.
Unacceptable sources include Wikipedia, an individual’s blog, and social media, except as examples not counted as sources.
Create a document using Word (or a similar word-processing application) as described below.
Your Word Document Requirements
Part 1: Name
Your name
Names of your partner(s) (Include the names of people in your group if this is a group project.)
Part 2: Title
Part 3: Questions to Answer
Part 4: Introduction
A paragraph that introduces your topic and the question(s) to be answered
Part 5: Exposition
An explanation of how you answered the question(s); give credit to your sources, whether using direct quotes or not
Part 6: Conclusion
A paragraph summarizing your analysis
Part 7: Bibliography
Part 8: Partner Participation (only included for those working in groups)
Describe the role and responsibilities of each member of the group.
What to Submit
You will submit the Word document described above. You can use this rubric to evaluate your project before you submit it.

Answers

The correct steps which are used to make a research are as follows:

Choose a topicFind out what problem needs to be fixed about the topicWrite your research questionsMake use of reputable sourcesWrite out your conclusions

What is a Research?

This refers to the systematic study of a particular thing or phenomena to find out why it occurs and why it occurs the way it does and the frequency of occurrence.

With this in mind, we can see that making a research requires meticulous steps and some sources for research should not be considered because they are not reputable and this can include; individual blogs, social media, etc.

Read more about research here:
https://brainly.com/question/968894

Answer:

sorry i know this is late, but hopefully it will help someone else!

have a lovely day <3

an existing technology that would allow users to transfer images from the camera to the computer without connecting them

Answers

Answer:

wireless technology i guess??

How do i copy a canvas course from old class to new course.

Answers

Answer:

Open Settings. In Course Navigation, click the Settings link.Copy Course Content. Click the Copy this Course link.Create Course Details. ...Select Migration Content. ...Adjust Events and Due Dates. ...Create Course.

Explanation:

Follow The Steps

That's it

Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This environment will probably only be required for 2 months. Which types of instances would you use for this purpose

Answers

The type of instances would you use for this purpose is known as On-Demand.

What is an on demand instance?

On-Demand Instances is known to be one that allows a person to pay for compute capacity usually by the hour or second with no long-term payment.

This is one that gives one a level of freedom from the costs and complexities of planning, purchasing, and keeping hardware.

Learn more about cloud from

https://brainly.com/question/25130975

HELPPP! MARK YOU THE BRAINLIEST!
Write one smart goal It has to be realistic ?
Background information The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound Defining these parameters as they pertain to your goal helps ensure that your objectives are attainable within a certain time frame.

Answers

Answer:

My goal is to have good grades because I failing now and I want to try and try to get my grade up

Explanation:

What are two advantages and disadvantages of using computer software?

Answers

Answer:

Advantages:

Multitasking

Multitasking is one among the main advantage of computer. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. Computer can perform millions or trillions of work in one second.

Speed –

Speed –Now computer isn’t just a calculating device. Now a day’s computer has vital role in human life. One of the most advantages of computer is its incredible speed, which helps human to finish their task in few seconds.

Disadvantages:

Virus and hacking attacks –

Virus and hacking attacks –Virus may be a worm and hacking is just an unauthorized access over computer for a few illicit purpose. Virus can go to other system from email attachment, viewing an infected website advertisement, through removable device like USB etc.

Online Cyber Crimes –

Online Cyber Crimes –Online cyber-crime means computer and network may have utilized in order to commit crime. Cyberstalking and fraud are the points which comes under online cyber-crimes.

Advantage: It does EXACTLY what the programmer told it to do.

Disadvantage: It does EXACTLY what the programmer told it to do.

Software is instructions for a computer to follow. A computer will do so virtually always without fail other than the rare hardware or power issues, even in cases where it shouldn’t, and even in cases where any human would instinctively know that the instructions do not apply. I compare programming to writing instructions for a robotic idiot. It must be perfect, it must address every minute detail, and it must handle every case that will ever arise correctly. Humans write software. Perfection is rare for humans.

During a slide show, Luis wants a picture to appear on one of his slides after the slide appears on the screen. Which type of animation should he use

Answers

The type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.

What is an Entrance Animation?

An entrance animation is an effect that controls how an object appears on a slide, starting at the start point of the object.

For example, using the entrance animation, Luis can make the object move slowly into the slide using a float-in effect.

Thus, the type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.

Learn more about entrance animation on:

https://brainly.com/question/20082198

What is the term for when software is installed on a computer without authorization and encrypts files and demands payments in bitcoin before the password to encrypt the files will be provided?.

Answers

Ransomware

Explanation: Cause I’m like that

Define a function below, posodd_number_filter, which takes a single numerical argument. Complete the function to return accepted if the input is positive and odd. Otherwise, return rejected.

Answers

The program is an illustration of functions.

What are functions?

Functions are set of program statements that are executed when called or evoked.

The main program

The function written in Python, where comments are used to explain each line of the program is as follows:

#This defines the function

def posodd_number_filter(num):

   #This checks if the function is odd and positive

   if num >0 and num%2 ==1:

       #If yes, this returns Accepted

       return "Accepted"

   #If no, this returns Rejected

   return "Rejected"

Read more about functions at:

https://brainly.com/question/14284563

Which call of the function correctly follows the instructions laid out in the api?.

Answers

Answer:

MoveElement("button1", "down", 25); This function finds the minimum number in a list.

Explanation:

Hope this helps

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system

Answers

“Interrupt” is what I think the answer is

1. What projects would Excel best be used for?

Please be sure to say the name of the project(s) and how you would go about creating it.

Answers

Answer:

Charting, inventory tracking, accounting  and calculating

Explanation:

im assuming you are writing the response instead of a multiple choice.

hope this helps :D

How can you quickly locate emails with large attachments.

Answers

To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.

Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.

How do I find emails by attachment size?

This can also be done for messages that has a size equal to or bigger than 25.

One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.

Learn more about attachments from

https://brainly.com/question/978078

What is the name of the proicess of submitting and checking credentials to valideate or prove user identiy

Answers

Answer:

Authentication

I need to code a simple racing game in c++. Help, please. ​

Answers

Can you attach what you have so far

!!GIVING 100 POINTS AND BRAINIEST T IF YOU HELP IMMEDIATELY!!
Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highest to lowest price?

Graph
Filter
Search
Sort

Answers

Sort allows Cameron to sort the data lowest to highest price or highest to lowest.

search = find a specific data input.

filter = remove and find specific data inputs.

graph = to display every database data on a graph and compare.

Answer:

sort

Explanation:

She needs to sort out the items The order is from highest to lowest.So the sort feature is best help for her

4 brainly

What do Web designers do? *


What's the difference between web design and web development? *


How many types of web design are there? *


Is Web Design graphic design


What are the 3 types of websites? *

Answers

Web designers like create websites for businesses

help! giving a lot of points I need this asap!

Answers

Answer:

89.3

you add them all & then divide

Explanation:

Can someone please help me answer this question.
1. Select the correct answer. What is a digital portfolio?
A. a summary of your portfolio.
B. a presentation of your portfolio
C. a representation of your work
D. a preview of your most important work

2. Hadoop is a popular framework used for storing and processing big data. Which programming language was used while building this framework?
Hadoop is a popular_____ based framework used for storing and processing big data.​

Answers

Answer:

1. C. or D.

2. Hadoop is a popular Java-based framework used for storing and processing big data.​

Explanation:

For number 1 I think it's C because:

A digital portfolio is an online collection of work that represents your abilities and skills as a professional in your field. I could be D aswell!

Hope you do well!

what is auser mannual​

Answers

Answer:

Contains information for user to make use of all information

Explanation:

A user guide, also commonly known as a user manual, is intended to assist users in using a particular product, service or application. It's usually written by a technician, product developer, or a company's customer service staff. User guide are often included with the purchase of household

Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing, and classifying data.

Answers

Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.

What is Data protection policy?

These are policies adopted by organizations that help to ensure data is adequately protected.

When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.

Read more about Data protection policy here https://brainly.com/question/26493645

What security trade-offs or options should an administrator consider when confronted with a potentially extraneous service, such as FTP or SMTP, running on a web server? *

Answers

FTP or File Transfer Protocol was never designed to be hack-safe. Files exchanged using FTP are not encrypted. Hence, this service is susceptible to various kinds of security risks such as spoofing, sniffing, etc.

What tradeoff must the Administrator consider when using FTP?

Although the FTP is insecure, it is a very fast way of transferring files.

When the connection is lost during file transfer, it is possible to resume such a transfer.

It also allows for queuing, scheduling, uploading, and downloading of files.

The full meaning of SMTP is Simple Email Transfer Protocol.

Learn more about FTP and SMTP at:

https://brainly.com/question/17506968

https://brainly.com/question/14396938

How to create drop down list in excel with multiple selections.

Answers

Answer:

elect the cell or cells you want the drop-down list to appear in.

Click on the Data tab on Excel's ribbon.

Click on the Data Validation button in the Data Tools group.

In the Data Validation dialog, in the Allow: list select List.

Click in the Source: box.

Explanation:

How to turn off notifications for a class in canvas.

Answers

Answer:

by clicking the View Course Notifications button and then on the resulting screen, clicking the green check next to Enable Notifications.

Explanation:

Follow This Step and Read

Other Questions
Which of the following sentences uses commas correctly? Penelope the treasure, is buried beneath that stand of trees, isn't it? Penelope, the treasure is buried beneath that stand of trees, isn't it? Penelope, the treasure is buried, beneath that stand of trees isn't it? Penelope the treasure, is buried, beneath that stand of trees isn't it? Last week, Kip went to the fair. It costs $4.95 to enter the fair and $0.50 per ticket. In the equation below, x represents the number of tickets Kip bought, and y represents the total amount Kip spent.y = $0.50x + $4.95If Kip spent $12.45 at the fair, how many tickets did he buy?Group of answer choices8152535 How many lines of symmetry does this picture have? what is clinical depression The volume of the right cone below is 30 pi units. Find the value of x.Answer: X =HELP QUICK A line passes through the points (3,14) and (7,18) Write a linear function rule in terms of x and y for this line, Help! I might not be going to my school anymore if I don't pass my math classes :( Which property of matter is best measured using the tool shown?A. ReactivityB. VolumeC. MassD. Ductility please help. thanks :))) Help me help me , I will give brainliest The radius of a circle is 10 meters. What is the length of a 135 arc? i need MORE HELP. wow, im bad at dis... 1010^-11[tex]10 \times 10 to \: the \: power \: of \: - 11[/tex]1010^-11 Which phrase from the Declaration of Independence originally referred only to white men but today is interpreted to mean all people? What is the surface area of the figure? 428 ft 560 ft 632 ft 888 ft. Which level of government is responsible for setting the general rules for voter registration. A case is 11.5 in Long 8.75 in wide and 3.5 inches high what is the volume of the box Can someone help with this challenging graph Which resource would be best to use to write a report about what it is like to train a guide dog? a dog encyclopediaa diary of a person who raises and trains guide dogsa biography about a person who uses a guide doga magazine article about how dogs are selected for guide-dog programs Why is it important for a novice entrepreneur to build positive relationships with customers. What is the answer to 11 > b + 4 > -6