1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
9

When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the interna

l format used by strings?
Computers and Technology
1 answer:
EastWind [94]3 years ago
7 0

Answer:

decode( )

Explanation:

We can use the method decode( ) to decode the string using the codec registered for encoding.

There are two parameters

encoding: We can encode with this parameter.

errors: If used to manage the errors.

For example:

String = "this is string example....wow!!!";

String = Str.encode('base64','strict');

If we print these variables we have:

String = b'dGhpcyBpcyBzdHJpbmcgZXhhbXBsZS4uLi53b3chISE='

String = this is string example....wow!!!

You might be interested in
What is one step taken when solving a computer software problem?
k0ka [10]
Properly scanning the computer and deleting any viruse. this is Answer

Some of the feedback I hear from new developers working on a programming problem revolves around uncertainty of where to start. You understand the problem, the logic, basics of the syntax, etc. If you see someone else’s code or have someone to guide you, you can follow along. But maybe you feel uncertain about doing it yourself and have trouble turning your thoughts into code at first even though you understand the syntax or logic. Here’s my process and some tips to tackling a sample problem that hopefully some of you may find helpful in your journey.
HOME







Some of the feedback I hear from new developers working on a programming problem revolves around uncertainty of where to start. You understand the problem, the logic, basics of the syntax, etc. If you see someone else’s code or have someone to guide you, you can follow along. But maybe you feel uncertain about doing it yourself and have trouble turning your thoughts into code at first even though you understand the syntax or logic. Here’s my process and some tips to tackling a sample problem that hopefully some of you may find helpful in your journey.


3 0
4 years ago
Read 2 more answers
Analyze the following code:
user100 [1]

Answer:

Constructor issue

Explanation:

When you look at the Class A, the constructor takes one argument as a parameter, a String.

A(String newS) {

s = newS;

}

However, in the main, the constructor does not take any argument as a parameter.

A a = new A();

That's why the code does not compile.

5 0
3 years ago
5 steps in cleaning and sanitizing smokehouse​
topjm [15]

Answer:

  1. Scrape or remove food bits from the surface.
  2. Wash the surface.
  3. Rinse the surface.
  4. Sanitize the surface.
  5. Allow the surface to air-dry.

Explanation: These are steps for cleaning and sanitizing.

4 0
3 years ago
What does the following if statement do?<br><br> if (num1 == Math.abs(num1))
Gennadij [26K]

This statement checks if num1 is equal to the absolute value of num1

For instance,

num1 = 4 and the absolute value of num1 = 4. This would run the code inside the if statement but if num1 = -1 the absolute value of num1 = 1 and the if stamtent would be skipped because -1 does not equal 1

6 0
3 years ago
What data does Bittorrenting uses? Explain.
amid [387]

Answer:

A BitTorrent software consumer utilizes that data into the torrent data to communicate special tracker and support shifting of that data among networks including either complete or incomplete representations about the data-set.

Explanation:

BitTorrent is based at the thought of any torrent, which is a smallish data that includes metadata regarding a host, specific tracker, that organizes the data sharing and data that is distributed. A peer that wants to advance data available need first attain a tracker for the data, generate a torrent and later share the torrent data. Different peers can next use the information included in the torrent file support all other in downloading that data. That download is organized by that tracker.

5 0
3 years ago
Other questions:
  • Is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data a
    13·1 answer
  • A light or optical microscope most commonly used is called a(n) _____. bright-field microscope dark-field microscope electron mi
    8·2 answers
  • Write a program that asks the user to enter the amount s/he has budgeted for a month. The amount should be between 1000 and 2000
    11·1 answer
  • NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
    11·1 answer
  • You specify the shape of an oval in a Java applet by defining the oval's:__________.
    5·1 answer
  • The fall of the Berlin Wall and the emergence of a way to find things on the Web through the Netscape browser were two that was
    10·1 answer
  • Write a program in c++ that plays a number guessing game with a Human user. The Human user will think of a number between 1 and
    7·2 answers
  • Provide an example where a company has demonetized a market or industry.
    8·1 answer
  • Your network has four Hyper-V hosts, which are running three domain controllers and about 10 member servers. Three of the member
    10·1 answer
  • Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!