1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
3 years ago
7

Call your function from Example 1 three times with different kinds of arguments: a value, a variable, and an expression. Identif

y which kind of argument is which.
Computers and Technology
1 answer:
Blizzard [7]3 years ago
8 0

Answer:

Example 1:

def function(num):  

   print(num*2)

Example 2:

function(5)

num = 2

function(num)

function(3-1)

Explanation:

Given:

See attachment for complete question

To start with Example (1)

def function(num):  

   print(num*2)

<em>Note that; the above code segment which doubles the parameter, num could have been any other code</em>

<em />

<em>In Example (1), the parameter is num</em>

For example (2):

We can call the function using:

#1. A value:

function(5)

<em>In #1, the argument is 5; a value</em>

#2. A Variable

num = 2

function(num)

<em>In #2, the argument is num; a variable</em>

#3. An Expression

function(3-1)

<em>In #3, the argument is 3-1; an expression</em>

You might be interested in
A database design where certain data entities are combined, summary totals are carried in the data records rather than calculate
uranmaximum [27]

Answer: Planned data redundancy

Explanation: Planned data redundancy is the problem that occurs in the single database where the same data unit gets stored in two different places. Data redundancy can acquire unnecessary space of the database.

Planned data redundancy can effect the processing and make modification of the data difficult. It can also create the corruption in the database .Thus , the definition mentioned in the question of data redundancy.

5 0
3 years ago
Why can’t a computer use source code
Elina [12.6K]

Answer:

A computer can use a source code

Explanation:

The code that was copied

gets compiled by the terminal and

gets its traced erased

therefore there is no need to give

credit and code still used in proccess

Example:

You can get a source code from stackoverflow

github, you can use that code to build your website

giving no credit to the owners of that code

the code will get its traced erased by the compiler

5 0
3 years ago
Read 2 more answers
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
A firewall relies on or a that determine what traffic should or should not be allowed to pass through
likoan [24]
A firewall determines what external network traffic(internet) should or should not be allowed to pass internal network(computer). A firewall is network security that protects software and hardware from untrusted sites that may have viruses, worms, and bugs that are detrimental to the computer.
5 0
3 years ago
If you need to multiply 50 and 8 and divide by 2, what would you type on the numerlc keypad?
nata0808 [166]

Answer:

50*8/2

The asterisk is the multiplication sign and the parenthesis is the division.

I've never used an apostrophe for a multiplication sign before, but I'm guessing multiplication is what it stands for.

Explanation:

4 0
3 years ago
Other questions:
  • What does a closed-envelope icon next to an e-mail message header indicate?\?
    8·1 answer
  • _______ tags are tiny chips that can be embedded into almost anything and contain information used to track and locate lost pets
    14·1 answer
  • After pasting data, what can be done to access more options for how to paste it? You can change the formatting in the original c
    11·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    10·1 answer
  • What are the examples of shareware?
    9·2 answers
  • You are running out of storage space on one of your servers. you need to purchase an external hard drive, as there are no drive
    8·2 answers
  • Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
    5·1 answer
  • What are the special features of fifth generation that makes it different from the other generations?​
    9·1 answer
  • Algorithm to calculate the sum and difference of 15 and 12​
    9·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!