1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
12

Need help with python coding

Computers and Technology
2 answers:
Ivanshal [37]3 years ago
7 0

Answer:

def= definition

Explanation:

Gekata [30.6K]3 years ago
7 0
Def means definition
You might be interested in
What is boot sector virus​
Galina-37 [17]

Answer:

Boot Sector virus is when a virus infects the Boot Sector of a hard disk. A Boot Sector is the initial files necessary to start an OS and other bootable programs. It is typically infected by these viruses when started with infected floppy disks, however the boot virus does not have to be successful to infect your computer. Once infected, the virus tries to infect every other disk.

Hope this helps!

4 0
1 year ago
Which of the following is an advantage of batch processing?
alina1380 [7]

Answer:

it can balance computing resources by time

Explanation:

this this is as it involves multiprogramming

8 0
3 years ago
Some Tiny College staff employees are information technology (IT) personnel.
const2013 [10]
xndnxbxnndndndnndnxndnnxndndnndndndnndndndndndnndnxnx
5 0
2 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
. List four different ways automation can be used in testing?
hichkok12 [17]

Answer:

Automation testing can be used for:

<u>Input-output test :</u> If the main function of your software is to transform input data into output data you can configure a new test by providing a new input/output pair, then the test will check to see if the output matches with the expected values.

<u>Unit test :</u> This test is a script to check the return values of a specific code by initializing it and calling his methods. This is a part of a test-driven development process.

<u>Integration test :</u> This test is a code level script that does a complete check process involving multiple objects. For example, you might make a test for “buy a product” which checks to see if the database is updated, if the data is correct of the person is correct, and if the person placing the order gets the right confirmation email.

<u>Smoke Tests:</u> This test is executed immediately after implementation on production to ensure that the application is still functioning.

6 0
2 years ago
Other questions:
  • you are a software engineering consultant and have been called in by the vice president of finance of a corporation that manufac
    10·1 answer
  • In this digital age of rapid communications, how can you justify the time it takes to stop and revise a message
    10·1 answer
  • Identify possible advantages and disadvantages of using automatic withdrawal to pay bills
    12·2 answers
  • Write a program in C++ or C that includes two different enumeration types and has a significant number of operations using the e
    15·1 answer
  • Next, go to the mw_tour.html file. Within the document head, create links to the mw_layout.css and mw_styles.css style sheet fil
    10·1 answer
  • Small data files that are deposited on a user's hard disk when they visit a website are called _______.
    6·2 answers
  • You implement basic version control and go through the phase of creating a local repository. Initiate the commands to set up tha
    7·1 answer
  • Which line of code will find the first occurrence of a three in an array?
    5·2 answers
  • How many passes will it take to find 30 using a binary search?
    6·1 answer
  • Name various input and output devices used with computers.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!