1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
3 years ago
10

How do I use files and functions in programming?

Computers and Technology
1 answer:
maw [93]3 years ago
3 0

answer:

1.The program comes to a line of code containing a "function call".

2.The program enters the function (starts at the first line in the function code).

3.All instructions inside of the function are executed from top to bottom.

4.The program leaves the function and goes back to where it started from.

5.Any data computed and RETURNED by the function is used in place of the function in the original line of code.

You might be interested in
What is the difference between an ISP and a web host?
emmainna [20.7K]

Answer:

An ISP is an internet service provider. AT&T and Comcast are both popular internet service providers. On the other hand, web hosts are used to host websites like att.com. The web host makes the website accessible by other people.

Explanation:

5 0
3 years ago
Yuki is preparing to write a research paper for his history class. Which style guide would be best for him to use?
FromTheMoon [43]
The answer is Modern Language Association (MLA).  Yuki is preparing to write a research paper for his history class. The style guide that would be best for him to use is Modern Language Association (MLA).  <span>MLA style is a system for documenting sources in scholarly writing.  it has been widely used for classroom instruction and used worldwide by scholars, journal publishers, academic and commercial presses.</span>
3 0
3 years ago
Read 2 more answers
Write a program that gets five integer test scores from the user, calculates their average, and prints it on the screen. Test yo
Alex

Answer:

total = 0

for i in range(5):

   score = int(input("Enter a score: "))

   total += score

average = total / 5

print("The average is " + str(average))

Explanation:

*The code is in Python.

Initialize the total as 0

Create a for loop that iterates five times. Inside the loop, ask the user to enter a score. Add the score to the total (cumulative sum)

After the loop, calculate the average, divide the total by 5

Print the average

5 0
3 years ago
What is computer? what are the major function of computer​
Naya [18.7K]

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks.Computers are used to control large and small machines which in the past were controlled by humans. Most people have used a personal computer in their home or at work. They are used for things such as calculation, listening to music, reading an article, writing etc.

Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. ...

Medical Field. ...

Entertainment. ...

Industry. ...

Education. ...

Government. ...

Banking. ...

Business.

BRAINLIEST PLEASE

7 0
3 years ago
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
Other questions:
  • When the packet leaves the router, which source and destination ip addresses will be contained in the packet?
    9·1 answer
  • List and briefly defined categories of security services.
    8·1 answer
  • Which characteristic would be best for a person seeking a career in the Telecommunications pathway?
    15·1 answer
  • Why shouldn't a server use a glass to scoop ice?
    6·2 answers
  • James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local f
    5·1 answer
  • Which architecture for deploying a firewall is most commonly used in businesses today? Why?
    15·1 answer
  • The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet. When connected to a
    11·1 answer
  • Practising some questions for board exams for class 12 python,pls help with detailed answer
    14·1 answer
  • Computer works on the basis of?​
    9·1 answer
  • I will give brainyest
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!