1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
15

When a Python program is reading a file, the data is input as plain ASCII characters in a string. What is the following code doi

ng assuming a file is opened with file object inputFile? r_in = inputFile.readline() t = 0 while r_in != '': r = r_in.rstrip('\n') r_list = r.split('|') n = float(r_list[2]) t += n r_in = inputFile.readline()
Computers and Technology
1 answer:
Aleksandr [31]3 years ago
3 0

Answer:

The given python code mainly add values.

Explanation:

In the given python code, a r_in variable is defined, that reads a file in the next line, a while loop is declared, inside the loop "r_in" variable is used that provides slicing in the code.

  • In this code, in the file, each line is the format in field 1 and field 2.
  • The code puts its fields into the list first and then converts into the last dimension to the numerical type before applying to a sum.

You might be interested in
The point of (18 ,0) lies on​
zysi [14]
This point lies on the x value
4 0
2 years ago
Read 2 more answers
In 1981, Ian Murphy broke into the AT&T online computer system and changed their clocks, allowing people to make calls durin
poizon [28]
A. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer
5 0
2 years ago
Suppose you want to sell your product to of one of the school canteen of El Salvador city thus you conducted study to one of the
Lyrx [107]

The interpretation of the table is that it shows that 45.12 percent of the respondents are in 16 years of age when likened to 12.20 percent who are 19 years old and 18.29 percent that are in 18 years of age.

<h3>What is the table about?</h3>

The table is one that shows the age profile for Filipino children from 0 to 4 years and above to 19 years,

Note that it is also made up of the largest age group making up from 10.1 to 10.7 percent as seen on the Philippine Statistics Authority (PSA).

Therefore, students that are in 16 years of age will have the ability to take in or consume products more than the older students as seen in El Salvador City.

Learn more about product  from

brainly.com/question/10873737

#SPJ1

4 0
2 years ago
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
Cybercrime has a serious economic impact on national and global economies that costs the _____ of its GDP every year.
maks197457 [2]

Answer:

World at least 1 percent

Explanation:

Cybercrime are crimes that focuses on networks of computers whereby a computer is used to commit the crime or a computer is the target of the crime, with the possible effect of a threat to the security and financial wellbeing of a person, an establishment or country

According to the report by Zhanna Malekos Smith and Eugenia Lostri, 'The Hidden Costs of Cybercrime' the monetary cost of cybercrime which is estimated at $945 billion is <u>a little above 1% of the World's GDP</u> which is around $87.55 trillion.

4 0
2 years ago
Other questions:
  • 4. What aspect of the initial database planning process would the formula (0 + Pt × 3 + p)/5 be used in?
    5·1 answer
  • Float in is an example of a(n) _____. annotation, evolution, animation, simulation
    14·1 answer
  • What is an examlple of cyberbullying
    5·1 answer
  • Direct solar power is when:
    6·1 answer
  • Which PowerPoint options can users customize?
    9·1 answer
  • The federal government is the largest employer of cybersecurity professionals true or false
    5·1 answer
  • In your own words, what is pair-programming? What is the role of the driver? What is the role of the navigator? What are some be
    15·1 answer
  • The command to get out of the loop.<br>a.<br>i exit<br>ii. break<br>iii. comment<br>iv. for​
    12·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • Ways to ask for help effectively include
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!