1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
6

#TODO: This function needs to accept an incoming message and process it accordingly. # This function is called every time the sw

itch receives a new message. #if message.pathThrough == True and message.origin not in self.activeLinks: #self.activeLinks.append(message.origin) #if message.pathThrough == False and message.origin in self.activeLinks: #self.activeLinks.remove(message.origin)
Computers and Technology
1 answer:
barxatty [35]3 years ago
3 0

Answer:

This function is a method of a class object that checks a message path and register or update the previous messages list with only new messages.

Explanation:

def message_check(self ) :

If message.pathThrough == True and \ message.origin not in self.activeLinks:

Self.activeLinks.append( message.origin )

Elif message.pathThrouh == False and \ message.origin in self.activeLinks:

Self.activeLinks.remove( message.origin )

You might be interested in
A(n) Answer display color uses the least electricity when compared to any other color.
Elan Coil [88]

Is there answer choices because I’m not understanding what you want me to answer

3 0
3 years ago
Select all the correct answers.
Elden [556K]

Answer: Bulleted or numbered lists, presenting data in tables, and the formatting one.

Explanation: I’m taking the test and i’m pretty sure that’s right, lmk if you got a better answer though!

5 0
3 years ago
Read 2 more answers
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?
o-na [289]

Answer:

I think the answer is 2.

hope it will help you

4 0
3 years ago
Read 2 more answers
Operating systems of mobile devices can support full scale software programs like microsoft word or excel
aliya0001 [1]
Iit is microsoft word
5 0
4 years ago
Other questions:
  • A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
    12·1 answer
  • According to Porter’s five-forces model, the more the forces combine in any instance, the less likely firms will seek competitiv
    8·1 answer
  • Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
    13·1 answer
  • True or False? In C++, the expression (a + b / c) / 2 is implicitly parenthesized as ((a + b) / c) / 2.
    9·1 answer
  • Tower of Hanoi algorithm 4 disks
    12·2 answers
  • 1. What is a digital networking app?
    12·2 answers
  • When creating a storyboard, in which section do you mention how you move from one shot to the next?
    8·1 answer
  • Name 6 examples of how telemedicine is used in healthcare
    7·1 answer
  • What are the different types of computer operating systems?
    6·1 answer
  • Who is the founder of C language?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!