1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
2 years ago
6

Task 2

Computers and Technology
1 answer:
adelina 88 [10]2 years ago
3 0

The program is an illustration of file manipulations

<h3>What are file manipulations?</h3>

File manipulations are program statements that are used to write & append to file, and also read from the file

<h3>The actual program in Python</h3>

Assume the file name is top10.txt, the program in Python where comments are used to explain each line is as follows:

#This opens the file

a_file = open("top10.txt")

#This reads the file contents

file_contents = a_file.read()

#This prints the contents

print(file_contents)

Read more about file manipulations at:

brainly.com/question/15683939

You might be interested in
Realiza un algoritmo que calcule la edad de una persona y si es mayor = a 18 que imprima mayor de edad de lo contrario que impri
WINSTONCH [101]

Answer:

Explanation:

El siguiente codigo esta escrito en Java. Le pide al usario que marque la edad. Despues el programa analiza la edad y imprime a la pantalla si el usario es mayor de edad o menor de edad. El programa fue probado y el output se puede ver en la imagen abajo.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Cual es tu edad?");

       int age = in.nextInt();

       if (age > 18) {

           System.out.println("Mayor de Edad");

       } else {

           System.out.println("Menor de Edad");

       }

   }

}

7 0
3 years ago
What are programs that are installed without the user knowing
Goshia [24]
Hacks , aim bot wanna play fort nite some time I’m really good at it lol
6 0
3 years ago
Given all of the limitations of MBR, is it still relevant in current day use?
gavmur [86]

Explanation:

<em><u>MBR does have its limitations. For starters, MBR only works with disks up to 2 TB in size. MBR also only supports up to four primary partitions—if you want more, you have to make one of your primary partitions an “extended partition” and create logical partitions inside it.</u></em>

3 0
3 years ago
Suppose a system administrator at sls happened to read the details of this case. what steps should he or she take to improve the
kvv77 [185]
He should add more security applications to the software and inform the company to not tell any details.
6 0
4 years ago
Explain in details the evolution of computers​
Colt1911 [192]

Answer:

Evolution of computer technology can be divided into five generations. First generation computer consisted of vacuum tubes and they were used from 1943-1958. ... Third generation (1966-1973) computer consisted of integrated circuits (IC) i.e. many transistors in single silicon chip.

<em><u> </u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u> </u></em><em><u>Mark as brilliant</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u> </u></em>

3 0
3 years ago
Other questions:
  • Arpanet was developed by the united states so that there was a communication network that would survive a nuclear war. True or F
    11·1 answer
  • What is the new file system available in windows server 2012?
    9·1 answer
  • What is displayed in the alert dialog box after the following code is executed? var items = 3; for (var i = 1; i &lt;= items; i+
    8·1 answer
  • Look at the data set below. {6, 7, 12, 5, 7, 11, 10, 7, 6} In this data set, what is the mode?
    9·2 answers
  • Which vendor certification would you think is the most relevant in the field of IT security? Why?
    7·1 answer
  • All file types have unique _____________________ that determine which program to use to open a particular file and to access its
    14·1 answer
  • HELP!!! Bad things about Helen Keller. I'm doing a debate and i need to prove that Steve Jobs is better than Helen Keller!!
    14·1 answer
  • What type of photography is represented by a photograph of a dog on a beach ?
    11·1 answer
  • Which spreadsheet toolbar displays options such as Cut and Paste?
    11·2 answers
  • Describe two steps to find if photos can be legally used
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!