1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
4 years ago
15

Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi

ng. When safeOpen() is used to open a file, a reference to the opened file object should be returned if no exception is raised, just like for the open() function. If an exception is raised while trying to open the file, safeOpen() should return the value None
Computers and Technology
1 answer:
timurjin [86]4 years ago
3 0
My bad my friend was like that I don’t got it to go home I don’t want him texting him or whatever I don’t gotta is like I gotta do it
You might be interested in
. Suppose: x = (1111 1111 1111 1111 1111 1111 1111 1100)2 y = (0011 1011 1001 1010 1000 1010 0000 0000)2 a. Is x bigger than y i
ahrayia [7]

Answer:

a. Using 32bit unsigned binary system, x is bigger than y

b. Using 32 bit signed system, x is not bigger than y.

Explanation:

a.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In an unsigned system all binary digits are used up as the magnitude bits;

First, we need to convert each number to decimal

x = 4294967292 (decimal)

y = 999983616 (decimal)

4294967292 is greater than 999983616

So, x is greater than y (in 32 bit unsigned binary system)

b.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In a signed system, the most significant bit is used as the signed bit, the remaining bits are used in representing the magnitude bits;

The most significant bit is always the first bit.

0 represents positive (+)

While

1 represents negative (-)

First we need to separate the most significant bit from the magnitude bits.

So x = 1 (111 1111 1111 1111 1111 1111 1111 1100)2

And y = 0 (011 1011 1001 1010 1000 1010 0000 0000)2

Then, we need to convert each number to decimal

x = -2147483644

y = +999983616

From the above, y is greater than x

4 0
3 years ago
Write a program to help a local restaurant automate its breakfast billing system. The program should do the following:
Maurinko [17]

Answer:

Please find the code and its output in the attached file:

Explanation:

In this code a structure "menuItemType" is defined that declared float and integer variable and outside the structure its list type variable "menuList" is defined that holds and calculates its value.

In the next step, a class "Rest" is defined, and inside the class a method "getData", "showMenu", and "printCheck" is defined, in which the above methods uses the switch for input and calculate the value and the last "printCheck" calculates the Tax and Amount Due value.

In the main method, a class object is created that prints message and call the above method.

6 0
3 years ago
Is it true or false for this question?
Lana71 [14]
Your correct I think I’m not sure
7 0
3 years ago
Imagine that you are about to make a presentation during an online meeting, where people will need to be able to see you, and yo
djyliett [7]

Answer:

You would check your devices / features in your settings to see if your camera is enabled, connected, or working.

Run a diagnostics scan to see if anything is affecting your camera.

Clear cookies.

Call a technician.

5 0
3 years ago
A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
rjkz [21]
False. Just calculate what those five mins mean. And remember in percents so you have to divide by an extra 100

Five-nines or 99.999% availability means 5 minutes, 15 seconds or less of downtime in a year. Or, if you are really ambitious, shoot for six nines or 99.9999% availability, which allows 32 seconds or less downtime per year.
5 0
3 years ago
Other questions:
  • Jean-Ann works in the finance business. She analyzes insurance applications in order to determine the level of risk involved in
    11·1 answer
  • Damage to which portion of the limbic system results in loss of memory of recent events and difficulty committing anything new t
    13·1 answer
  • Sending an e-mail message to customers or potential customers of a legitimate website asking them to click a link that leads to
    10·1 answer
  • As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on t
    11·1 answer
  • Which task is performed by the artificial intelligence programmer?
    7·1 answer
  • A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has been disabled. An enginee
    13·1 answer
  • A domain name is used to: *
    15·1 answer
  • Write a function endpoints that takes a list of numbers (eg. [5, 10, 15, 20, 25]) and returns a new list of only the first and l
    15·1 answer
  • All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the
    5·1 answer
  • Write a code segment that will store a dinner selection in option1 based on the values of rsvp and selection. The intended behav
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!