1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
11

How to give a file name as an argument in function in python.

Computers and Technology
1 answer:
Ratling [72]3 years ago
5 0

Answer:name it the secret

Explanation:

You might be interested in
What are the 3 symbols that can’t be used when saving a document? (From Microsoft Word 2016) (pls helped me!)
Charra [1.4K]

Answer:

\, /, -

Explanation:

The three symbols are forward slash, backward slash, and the hyphen. These were allowed in previous versions of the MS Word. However, since the MS Word 2016 and a little earlier, these three symbols have been banned. And you will immediately get a message if you use these, to correct, and only then the file will be saved with that new name, and that must not have the forward or backward slash or the hyphen.

6 0
4 years ago
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Which keyword lets you control the number of rows that are returned by a query?
Kaylis [27]
C all and that facts =)
4 0
4 years ago
Which of the following statement is true?
Alexxx [7]

Answer:

b. the IP address can be spoofed, so if you want to read response from the deceived party, you can use IP spoofing to hide yourself.

Explanation:

3 0
3 years ago
...............................
Gemiola [76]

............................

Mark me brainliest^^

7 0
2 years ago
Read 2 more answers
Other questions:
  • What is also known as a visual aid in a presentation?
    14·2 answers
  • Write a program for any element in keysList with a value greater than 50, print the corresponding value in itemsList, followed b
    6·1 answer
  • ASAP ε=ε=ᕕ(°□°)ᕗ<br> Sorry if you can't see it but please help me if you can!
    6·1 answer
  • Do you need internet to play xbox one
    14·1 answer
  • Which concept often comes in conflict with privacy rights?
    14·1 answer
  • Complete this code in main to perform the requested operations for a date entered by the user in this format: month dd, yyyy
    10·1 answer
  • a. Create an Abstract class called Vehicle with abstract methods accelerate, stop, and gas, &amp; data of your choice (5 marks)
    12·1 answer
  • Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
    14·1 answer
  • . . ........Sad + sad= very sad
    7·2 answers
  • Consider a system which has a memory access time of 300 nsec. An average page fault takes around 10 millisecond to get serviced.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!