1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
15

The import command can be used to bring into your python program, additional code contained in other python code files. true fal

se
Computers and Technology
1 answer:
Ymorist [56]3 years ago
8 0
True, but it won't be in the same namespace. See below:

>>> import time
>>> print time.time()
1510180694.04
>>> quit()

By doing a straight import I have to reference the namespace time and the function time. (Yeh, I should have picked a different example, but I couldn't think of any)

>>> from time import time
>>> time()
1510180718.76834
>>> quit()

By doing the from, I import the time function into the __main__ namespace so I don't need to reference a name space when I call it.



You might be interested in
Drag the tiles to the correct boxes to complete the pairs.
Zepler [3.9K]

Answer:

the answer is to fail

Explanation:

4 0
3 years ago
The Backstage view is where you can see information and options pertaining to the user account and settings. How is the Backstag
Georgia [21]

Answer:b) Mail settings can be changed under the options menu

Explanation: I fr just guessed so y’all can have an answer and I ended up getting it rights

6 0
3 years ago
Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate
Irina-Kira [14]

Answer:

SSL has operate in Application Layer to encrypt the information from user and  pass it to the TCP. To enhance TCP security developer can integrate the code of SSL with application layer.

Explanation:

SSL certificate is used to enhance the security of user data and encrypt the information of passwords, data transfer and other information to make it secure. This certificate is  installed at application layer to make all the information secure and send it to the Transmission Control Protocol (TCP) to send it further. The TCP can be enhanced more by adding SSL code to the application Layer of the Network.

4 0
3 years ago
If an administrator wanted to change the IP configuration settings on the first Ethernet interface to 10.1.1.1 and the netmask t
KatRina [158]
I’m assuming we’re talking about this through Windows CL

in such case the command ‘netsh’
4 0
4 years ago
QUICK ANSWER- what is the function of GUI
makvit [3.9K]

Answer:

GUI stands for graphical user interface. The function of the GUI is almost like when your right click on your computer and click inspect and it pulls up your computers coding, and codes. That is what GUI basically is it shows a visual presentation of all available functions of a software. operating system like ( Windows 7, Windows XP) or program.

Explanation:

Hope this helped : )

8 0
4 years ago
Read 2 more answers
Other questions:
  • Why do astronomers prefer to use the reflecting telescope rather than the refracting telescope to view distant objects in space?
    15·2 answers
  • Bitlocker uses the computer's __________ chip to store encryption keys and does not rely on individual user credentials. securit
    10·1 answer
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • A computer has the following parameters Operation Frequency Cycles Arithmetic/Logical instructions 65% 1 Register load operation
    11·1 answer
  • Which of the following is a device that plugs in a usb port on the computer or mobile device and contains multiple usb ports?
    9·1 answer
  • A key requirement for the process of testing hypotheses in the scientific method is Group of answer choices experimenter bias. c
    9·1 answer
  • The IT Department already has been testing Windows Server 2012 R2, and some time ago purchased licenses to convert all of its Wi
    14·1 answer
  • The write-ahead logging (WAL) protocol simply means that Select one: a. the log record for an operation should be written before
    7·1 answer
  • How to do this question , please answer quickly , I’ll give branliest
    14·1 answer
  • Files and folders in UNIX can be removed using the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!