1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
2 years ago
9

1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.

Computers and Technology
1 answer:
KengaRu [80]2 years ago
3 0

Answer:

Explanation:

In Python you need to give access to a file by opening it. You can do it by using the open() function. Open returns a file object, which has methods and attributes for getting information about and manipulating the opened file.

https://eecs.wsu.edu/~cs150/tutorial/file/code11_3.html

Look at this link it may help.

You might be interested in
Which password is an ideal and secure password?
Serjik [45]
Many individuals try to use passwords that are easy to remember and so may create passwords that are not secure. These types of passwords include numbers in sequence, groups of keys on the keyboard or even the word 'password'. Some individuals use dates such as birthdays or anniversaries. These are very unsafe and can be easily hacked.
A safe and secure password has a mixture of upper and lower case letters, symbols and numbers. A carefully crafted password with any combination of these characters can be safe and also easy to remember.
5 0
3 years ago
Read 2 more answers
Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
Stells [14]

Explanation:

Every month or so

5 0
3 years ago
Read 2 more answers
In addition to the ping command, what other command is useful in displaying network delay and breaks in the path to the destinat
Natalija [7]
Tracert (windows) or traceroute (linux) will display the hops in the path between source and destination.
8 0
3 years ago
Read 2 more answers
What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
defon

Co-Ordination Difficulty: ...
Waste of Resources: ...
Larger Interests of the Enterprise Neglected: ...
Emergency Decision not Possible: ...
Lack of Qualified Managers: ...
Certain Activities Decentralization not Possible:
8 0
3 years ago
A quick boot allows you to do what?
WITCHER [35]
Access the BIOS setup
6 0
3 years ago
Read 2 more answers
Other questions:
  • Explain computer software in detail with the help of proper examples
    8·1 answer
  • An example of a current disruptive technology is a?
    8·2 answers
  • The overall visual look of a chart in terms of its graphic effects, colors, and backgrounds is the:
    5·1 answer
  • In addition to using comments and track changes, you can also use the comparison feature for reviewing documents. In this activi
    11·1 answer
  • What is the correct html for referring to an external style sheet?
    11·1 answer
  • Implement the function printTwoLargest that inputs an arbitrary number of positive numbers from the user. The input of numbers s
    14·1 answer
  • Clarice is an architect who is involved in design work on a restaurant in a building that used to be part of the city’s water wo
    8·1 answer
  • Discuss the term internal control​
    12·1 answer
  • HOW TO GET RID OF THESE LINES?? PLS WILL GIVE BRAINLIEST
    8·2 answers
  • Can anyone help me figure out why my if statements are not executing properly? When the program executes with 7 as the value for
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!