1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
3 years ago
7

Create one Python module: arithmetic which has two functions: add(x, y) and get_length(x). The description of two functions are

below: def add(x, y): # add two numbers def get_length(x): # return the length of a given stringCreate one Python module: arithmetic which has two functions: add(x, y) and get_length(x). The description of two functions are below: def add(x, y): # add two numbers def get_length(x): # return the length of a given string
Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
3 0

Answer:

def add(x,y):

   print(x+y)

def get_length(x):

   return len(x)

add(17,19)

print(get_length("harry potter"))

#or you can also take some user input

x=int(input("please enter an integer: "))

y=int(input("please enter an integer: "))

add(x,y)

x1=input("please enter any string: ")

print(get_length(x1))

Explanation:

in python3 programming language

You might be interested in
What is the purpose of the backoff on Ethernet networks?
stellarik [79]

Answer: Please see below as the answer is self-explanatory.

Explanation:

In the original Ethernet standard, IEEE 802.3, the method used to deliver packets within a Ethernet network, is called CSMA/CD, and the acronym includes all the Ethernet features in brief.

Let's explain the different parts of the acronym.

CSMA= Carrier Sense Multiple Access.

This means that when any computer in the network (with no privileges for nobody) has a packet to transmit, it first "listen"if the network is idle. If it is the found condition, deliver the packet, and wait for an acknowledgement.

If past a given time, the ACK is not received, assumes that the packet was lost, due to a collision with another packet coming from another computer (this can happen because the packets don't travel instantaneously from one host to another, so one machine could have started to transmit before the another one could sense this fact).

This process is described by the other part of the acronym:

CD = Collission Detection

In order to avoid this type of problem, before trying to resend the packet, it waits some time, which is called "backoff".

This time increases exponentially each time that it is not possible to send a packet successfully, in order to try to find a moment in which finally the network be clear.

8 0
4 years ago
What is the data rate on a channel if the transmission duration of a frame of 1250 kb takes 200 ms ?
posledela

Answer:

6250 Kbps

Explanation:

See it in the pic.

8 0
3 years ago
Which of the following best describes professional behavior in the IT field?
Ray Of Light [21]
Answer - teaching others about technology in order to increase IT knowledge in the community
4 0
3 years ago
A user informs you that he or she never deletes any files he or she creates. How might this affect the operating system? It will
Juliette [100K]

Answer:

Depending on the amount of files there are, the operating system will run slower because these files take up space on the hard drive, slowing it down.

Explanation:

6 0
3 years ago
TRUE or FALSE: CSS is used to style web pages.
nirvana33 [79]

Answer:

true

Explanation:

HTML is the structure and CSS is the design

3 0
3 years ago
Other questions:
  • Which area would a Gaming Designer fall under? Research and explain why you think so. Make sure to site your source and where yo
    7·1 answer
  • 1.Write the Qbasic program to find sum of any 10 different numbers.
    12·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol inclu
    11·1 answer
  • (01.05 LC)
    7·2 answers
  • Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word i
    10·1 answer
  • Write a program code to accept the names of 3 users and generate a user name as shown in the example. Accept the name of 3 user
    9·1 answer
  • Ask the user to input their grade percentage (e.g. the use will enter 98 if they had an overall grade of 98% in their course) fo
    6·1 answer
  • The Ingenuity and the MOXIE are two new pieces of technology on the Perseverance. What role will these instruments play? How wil
    6·2 answers
  • One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!