1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
6

You are attempting to open a file containing a list of integer numbers, each on a separate line, and read them into Python as in

t types. What statement could you use to do this, assuming each line is represented by the line variable in a continuous loop?
Computers and Technology
1 answer:
baherus [9]3 years ago
7 0

Answer:

The answer to this question can be given as:

Statement:

number = int(line.strip())

Explanation:

In the above statement, we declare an integer variable number accept the integer value from the file that name is line. In this line, we use the strip() function. This function returns a duplicate string with both starting and tracking characters removed (based on the string parameter passed). The strip() function removes characters from both sides (left and right) based on the parameter(a string defining the collection of characters to be removed).

You might be interested in
The picture that graphically represents the items you use in Windows is called a/an GUI
egoroff_w [7]

That's a TLA for "<em><u>Graphical User Interface</u></em>".


8 0
4 years ago
Read 2 more answers
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Whic
OlgaM077 [116]

Answer:

'Urgency' is the name of this type of social engineering attack.

Explanation:

Social engineering attack describes a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

In 'Urgency attacks', the attacker uses some sort of emergency or urgent situation to get someone/people to do what they want or divulge a piece of information.

Hope this Helps!

5 0
4 years ago
Identify which of these types of sampling is​ used: random,​ systematic, convenience,​ stratified, or cluster. To determine her
Zarrin [17]

Answer:

B.

Explanation:

Based on the sampling methods provided in regards to the question it can be said that the method being used is called Simple Random. This refers to dividing the population into different group which are then chosen at random, giving each group an equal chance of getting chosen. Which is exactly what is going on in this scenario, as the day is divided into three parts and her mood is measured randomly during each part of the day.

6 0
4 years ago
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
From the Software Engineering Code of Ethics, which clauses relate to intellectual property (check all that apply)
kaheart [24]

Answer:

A) "Identify, document, collect evidence and report to the client or the employer promptly if, in their opinion, a project is likely to fail, to prove too expensive, to violate intellectual property law, or otherwise to be problematic."

B) "Ensure that there is a fair agreement concerning ownership of any software, processes, research, writing, or other intellectual property to which a software engineer has contributed."

C) "Not knowingly use software that is obtained or retained either illegally or unethically."

Explanation:

All the above are connected to intellectual stuff and hereafter are the right possibilities. One requires to comprehend the definition of intellectual property. In fact, it is a software, a piece of script, art, etc. that a knowledgeable make using his intelligence. All the rights related to such is with the intellect. And that is why the above three choices is right.

The fourth choice has nonentity to do with intellectual stuff, and it deals with the skirmish of interest. And henceforth that is not a correct option.

5 0
3 years ago
Other questions:
  • An example of live footage is when?
    10·2 answers
  • Software that controls a computer. an os controls how system resources are used and provides a user interface, a way of managing
    13·1 answer
  • When you use the Filter feature, what appears in each column label
    11·1 answer
  • If a question on a job application does not apply to you, simply write
    8·2 answers
  • Checker for integer string (Please answer in C++):
    8·1 answer
  • 2 inventions revolutionized photography, what are they?
    10·1 answer
  • Use the ______ attribute to configure the browser to render default table and table cell borders.
    12·1 answer
  • hi Let's say you graduate from school and you are unemployed or take a low-paying job. What are your debt repayment options if y
    8·2 answers
  • You're expecting visitors who will be demanding Mamet access Before they arrive, you can activate a Guest network that has its o
    11·1 answer
  • Complete the procedure for creating a new appointment by selecting the correct answers from the drop-down menus.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!