1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
3 years ago
15

Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi

ng. When safeOpen() is used to open a file, a reference to the opened file object should be returned if no exception is raised, just like for the open() function. If an exception is raised while trying to open the file, safeOpen() should return the value None
Computers and Technology
1 answer:
timurjin [86]3 years ago
3 0
My bad my friend was like that I don’t got it to go home I don’t want him texting him or whatever I don’t gotta is like I gotta do it
You might be interested in
How do we prevent electrical problems as prescribe by the course?​
Alex777 [14]

Answer:

Check your electrical cords.

When you are done with an electrical appliance, do not rip the cord out of the wall.

Electrical cords should not be hidden from plain sight.

Do not run electrical cords underneath furniture, rugs or carpets.

Remember that water and electricity do not mix.

(i hope this helps id really know if i answered ur question right)

:)

Explanation:

3 0
3 years ago
Write a function that asks a user for his/her name and movie
Alex777 [14]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

                     

The code is written in C++

/******************************************************************************

                             Online C++ Compiler.

              Code, Compile, Run and Debug C++ program online.

Write your code in this editor and press "Run" button to compile and execute it.

*******************************************************************************/

#include <iostream>

#include <string>  

using namespace std;

void display()

   {

       string yourName;

       string watchedMovie;

       cout<<"What is your name?  ";

       cin>>yourName;

       cout<<"Which movie have you seen?  ";

       cin>>watchedMovie;

       cout<<"Today, I have learned that  " <<name<<" watched "<<watchedMovie<<" movie";

   }

int main()

{    

   

   display();

   return 0;

}

 

7 0
3 years ago
'|'/2`/ '|'[] |)[-([]|)[- '|'#!$
natita [175]

Answer: mr Man

Explanation:

7 0
3 years ago
60 POINTS!! WILL MARK BRAINLEST!!
polet [3.4K]

design of the network

security for the network

documentation

identifying and fixing issues

8 0
2 years ago
3.29 LAB: Login name Write a program that creates a login name for a user, given the user's first name, last name, and a four-di
romanna [79]

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

   string fname,lname; int num;

   cout<<"Firstname: "; cin>>fname;

   cout<<"Lastname: "; cin>>lname;

   cout<<"4 digits: "; cin>>num;

   string login = lname;

   if(lname.length()>=5){

       login = lname.substr(0, 5);    }

   login+=fname.substr(0,1)+to_string(num%100);

   cout<<login;

   return 0;

}

Explanation:

See attachment for explanation where I used comments to explain each line

Download cpp
4 0
2 years ago
Other questions:
  • Write a MATLAB script using the quiver and contour commands to visualize the field and its divergence. Assume the region of inte
    12·1 answer
  • The ____ is a new feature in versions of microsoft office, starting with office 2007; it consists of tabs, which contain groups
    5·1 answer
  • The major difference between a calculator and a computer, when performing calculations, is that a
    10·1 answer
  • Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to
    5·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • One page of content in a PowerPoint presentation is referred to as a
    12·1 answer
  • Assume that a is an array of two or more integers, and that b and c are integers.
    13·1 answer
  • Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)
    12·1 answer
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
  • Name and define (or list the set that defines) three of the four common data types in programming
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!