1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
9

Create a Python script that takes two parameters to do the following:-

Computers and Technology
1 answer:
tekilochka [14]3 years ago
6 0

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

You might be interested in
________ is the process the compiler uses to divide your source code into meaningful portions; the message means that the compil
Nesterboy [21]

Answer:

Parsing is the process uses to divide your source code into meaningful portions; the message means that the compiler was in the process of analyzing the code when the end of the file was encountered prematurely

Explanation:

In parsing process  the parser in compiler breaks code and data into smaller elements coming from lexical analysis phase.

6 0
3 years ago
What does a blinking yelow light mean on a phillips sonicare toothbrush
babunello [35]

Answer:

it means that you need to charge it or change the batteries depending on what kind you have

3 0
3 years ago
Write a program that allows the user to continuously input the value n until a negative number is entered
Paul [167]

Answer:

Written in C++

Explanation:

#include <iostream>

using namespace std;

int main()

{

int n;

while(true)

{

cin>>n;

if(n>=0)

continue;

break;

}

return 0;

}

3 0
3 years ago
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
melomori [17]

A(n) access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

<h3>What is an access point?</h3>

An access point is known to be a kind of device that makes a wireless local area network, or WLAN, and it is often done in an office or big  building.

Therefore, A(n) access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

Learn more about access point from

brainly.com/question/14306861

#SPJ12

6 0
2 years ago
What does it mean for a wireless network to be operating in "infrastructure mode"? If the network is not in infrastructure mode,
Alex_Xolod [135]

Answer and Explanation:

Within the following operating mode, most of the wireless controller remains linked through the main point (access point) for that broader server. The server runs within ad-hoc modes when this does not run under the following mode. Wireless servers wouldn't have the connectivity to interact within ad-hoc mode.

So, the following statement is correct according to the given scenario of the following mode.

4 0
3 years ago
Other questions:
  • How do you know if you get a phone call that is a scam
    8·2 answers
  • Assuming your computer only has one network card installed; explain how your virtual machine is able to share that card with you
    10·1 answer
  • Can anyone can tell me and explain me the answer of it please .<br>thanks
    9·1 answer
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • Splunk knows where to break the event, where the time stamp is located and how to automatically create field value pairs using t
    7·1 answer
  • Select the correct answer.
    15·2 answers
  • Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should d
    14·1 answer
  • With SQL, how do you select all the columns from a table named "Persons"?
    8·1 answer
  • An instruction for the computer. Many commands put together to
    5·1 answer
  • Question 12 (5 points)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!