how does python show that commands belong inside a python structure?

Answers

Answer 1

Python show that commands belong inside a Python structure by using indentation to define the code blocks.

What is Python?

Python can be defined as a high-level programming language that is designed and developed to build websites and software applications, especially through the use of dynamic commands (semantics) and data structures.

In Computer programming, Python show that commands belong inside a Python structure by using indentation to define the code blocks.

Read more on Python here: https://brainly.com/question/26497128

#SPJ1


Related Questions

In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources assigned to other operating systems running in the same hardware environment

Answers

Answer:

VM escape attack

Explanation:

In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.

Which is considered the most widely used cloud computing service?

Answers

The most widely used cloud computing service is the Amazon web services.

What is cloud computing?

It should be noted that cloud computing simply means the on-demand availability of computer resources without direct active management by the user.

In this case, the most widely used cloud computing service is the Amazon web services.

Learn more about cloud computing on:

brainly.com/question/19057393

#SPJ12

What should be used to prevent javascript from accessing a session id value?.

Answers

Cookies should be used to prevent javascript from accessing session-id values.

What are cookies?

Cookies are brief text messages that a website you visit sends to your browser.

Web browsers are instructed to only send cookies using encryption using the Secure cookie property.

The session ID can be taken from the user's browser cookies during storage, frequently via cross-site scripting. The session ID may be seen while it's being sent by listening in on network traffic.

Keep in mind that every request to the server includes a session ID. Using the cookie attribute of the Document object,

JavaScript is also capable of manipulating cookies. JavaScript has the ability to read, write, change, and remove cookies that are specific to the current web page.

Hence, cookies should be used to prevent javascript from accessing session-id values.

To learn more about the cookies refer to:

https://brainly.com/question/20263903

#SPJ1

QUESTION 9 OF 100
What does it means when you see a sign with an "X" and two
letters "R" sign posted on the roadside?

Answers

Answer:

it means go sleep on ur bed

jk

Answer:

the sign means "railroad"

Explanation:

A router is performing basic routing functions. What will be the third step in the transmission of a packet?

Answers

The third step in the transmission of a packet is known as a network layer.

What is a router?

It should be noted that a router is a device that connects two or more packets networks.

Here, the third step in the transmission of a packet is known as a network layer. It adds another header in what is received.

Learn more about router on:

brainly.com/question/24812743

#SPJ12

A server creates a port that it uses to receive requests from clients. discuss the design issues concerning the relationship between the name of this port and the names used by clients

Answers

The issues raised by the name of the port and the name used by clients are service, efficiency and the local identifiers.

What is a server created port?

A server created port is the login endpoint assigned with the specific number, that mediates the delivering exchange of the information in between the server and the client.

The design issues that may rise with the name of the port and the name used by the clients includes:

Unaware to learn the port and the IP address used by the client in order to reach the service.

The problem with different servers offering services at the same time.

Efficiency problem with the port access and the local identifiers.

Learn more about server port, here:

https://brainly.com/question/13105604

#SPJ1

When a file is used by a program, there are three steps that must be taken:

Answers

The three steps that must be taken:

Open the file Process the fileClose the file

What is file opening?

The act of Opening a file is one that makes a a connection to exist between the file and the program.

Note that The three steps that must be taken:

Open the file Process the fileClose the file

Learn more about program from

https://brainly.com/question/1538272

#SPJ12

The programming process consists of several steps, which include:

Answers

The programming process consists of several steps, which include: Design, creation, testing, and debugging.

What are the steps in programming process?

The programming process is also made up of:

Defining the problem.Planning the solution.Coding the program.Testing the program.Documenting the program

Note also that The programming process consists of several steps, that include: Design, creation, testing, and debugging.

Learn more about programming process from

https://brainly.com/question/22654163

#SPJ12

A destination port number at the transport layer identifies which application on a computer should receive the data transmission

Answers

A destination port number at the transport layer identifies which software application on a computer should receive the data transmission: True.

What is the transport layer?

The transport layer can be defined as one of the seven layers of the open systems interconnection (OSI) model and it is responsible for routing messages through an active computer network while selecting the best transmission path from the source to the destination device.

In Computer networking, a destination port number at the transport layer is saddled with the responsibility of identifying which software application on a computer should receive the data transmission.

Read more on transport layer here: https://brainly.com/question/26177113

#SPJ12

What do both wireless lans (wlans) and wireless wans (wwans) rely on as the communication medium?

Answers

Wireless lans (WLANS) and wireless wans (wwans) rely on as the radio frequency spectrum communication medium.

What is Radio spectrum?

The radio spectrum is known to be an aspect of the electromagnetic spectrum that is said to have frequencies from 0 Hz to 3,000 GHz.

Note that Wireless lans (WLANS) and wireless wans (wwans) rely on as the radio frequency spectrum communication medium for their functions.

Learn more about WLANS from

https://brainly.com/question/26956118

#SPJ12

A for statement contains three expressions: initialization, test, and:

Answers

A for statement contains three expressions and these are:

InitializationTestUpdate

What is a for statement?

A for statement can be defined as a type of statement that is written by a computer programmer to repeat an action or event in a software program for a specific number of time.

In Computer programming, a for statement contains three expressions and these include the following:

InitializationTestUpdate

Read more on statements here: https://brainly.com/question/18736215

#SPJ12

Suppose a family has had a house fire in which they lost many photos, and they are worried about losing more if they have another. Which of the following is a reason this family may want to digitize their photos? Choose all that apply.

A: to make it easier to e-mail photos to friends

B: to maximize file space on their hard drive

C: to minimize risk of losing photos by backing them up in virtual space

D: to save space in their home

Answers

Answer:

C - Minimize the risk of future loss.

Explanation:

All four reasons listed are valid reasons to digitize family photos, but in this instance where this family has lost photos in a house fire before, minimizing the risk of losing photos in the future might be their primary goal.

Jack is an accountant he can't access the spreadsheet software which is installed on the server what should jack do

Answers

Answer:

Ping

Explanation:

Jack should ping the server and check to see if it has crashed. The ping command is a networking utility that determines if an IP address or domain is accessible. Once it is determined, Jack may utilize the data to derive additional inferences. While troubleshooting internet access, pinging is generally the first line of protection. It not only tests connection, but it also counts time and ensures that all Internet Control Message Protocol packets are accountable.

the control plan is essential because it tells the

Answers

The control plan is essential because it tells the Process owners the way or how to sustain the project gains.

What is the aim of a control plan?

A control plan is known to be a kind of living document that states the methods to be used for quality control of any vital or critical inputs to transport outputs that can meet customer requirements.

Note that The control plan is essential because it tells the Process owners the way or how to sustain the project gains.

Learn more about control plan from

https://brainly.com/question/25453419

#SPJ11

What is open source software​

Answers

Answer:

Open Source Software

Explanation:

Open-source software is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.

Answer:

open so software is an computer software that is reliance in which copyright holding reference uses the rights use study change and disturb this software and it so scold to anyone for any propose also open source software maybe diplobed in collaborative public manner

Explanation:

helpful

Which blu-ray standard defines rewritable disks?

Answers

The blu-ray standard that defines rewritable disks is BD-RE.

What is a rewritable disk?

It should be noted that a rewritable disk simply means an erasable disk that can be reused.

In this case, the blu-ray standard that defines rewritable disks is BD-RE. It is the recordable standard.

Learn more about disks on:

brainly.com/question/20381259

#SPJ12

When you coordinate tasks by email, you show respect for the recipient's time by:

Answers

When tasks are coordinated by email, you can show respect for the recipient's time by clearly stating your availability.

What is an e-mail?

An e-mail is an acronym for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users send and receive both texts and multimedia messages over the Internet.

As good work ethics, when tasks are coordinated by e-mail, you can show respect for the recipient's time by clearly stating your availability and providing details about time frames.

Read more on e-mail here: https://brainly.com/question/15291965

#SPJ12

Three symptoms of hacking

Answers

Answer:

1. You receive mass emails

2. Your internet searches get redirected

3. Your passwords are not working

Explanation:

Hope it helps

HURRY PLS
polina is a system architect and at the point in her current project where she must review the code at a high level to make sure it meets all the requirements. After that, which of the following groups will polina work with


A) the testing team

b)the CEO

Answers

Answer:

the testing team

Explanation:

because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not

The lower-order word of the r9 register can be addressed as

Answers

The lower-order word of the r9 register can be addressed as an aspect of  64-bit general registers and in SP-2.

What is low order word?

The "Word" that is 16 bits, and it is one where two words can fit into a 32 bit location usually at the same time. The "low" word is said to be the smallest or least significant of 16 bits.

Therefore, note that the lower-order word of the r9 register can be addressed as an aspect of  64-bit general registers and in SP-2.

Learn more about lower-order word from

https://brainly.com/question/13833510

#SPJ12

7.7% complete Question An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable

Answers

The solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

What is data?

It should be noted that data simply means the representation of facts ans concepts on a formalized manner.

In this case, the solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

Learn more about data on:

brainly.com/question/4219149

#SPJ12

algorithm to print the first 10 odd numbers​

Answers

Answer:

I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)

Explanation:

please mark brainliest

Which API gives higher performance and low graphics?
OpenGL?
Vulkan?
Direct3D11?
Metal?
pls suggest your answer

Answers

I believe Vulkan Ubisoft uses it for there large scale game for them to work on computer that can’t handle them

_____ view provides the most options for defining fields.

Answers

A table design view provides the most options for defining fields.

What is table design?

Tables are known to be a design pattern for showing a big amounts of data in rows and columns.

Note that in the case above, A table design view provides the most options for defining fields.

Learn more about  table design from

https://brainly.com/question/26961510

#SPJ12

webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so. true or false?

Answers

The statement that webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so is false.

What is webrooming?

It should be noted that webrooming simply means the consumer practice for researching products online before buying theme in stores.

In this case, the main idea of webrooming isn't to buy it at stores because it's cheaper. Therefore, it's false.

Learn more about webrooming on:

brainly.com/question/14988432

#SPJ12

what nat ip address is a public ip address that maps to an inside device?

Answers

The nat ip address is a public ip address that maps to an inside device is "inside global".

What is IP address?

It should be noted that IP address simply means an internet protocol address that's is associated with a computer network.

In this case, the nat ip address is a public ip address that maps to an inside device is "inside global".

Learn more about IP address on:

brainly.com/question/24930846

#SPJ12

what statement can you use to divide a script into multiple batches?

Answers

The GO statement can be used to divide a script into multiple batches

How to determine the statement?

To divide a script, we make use of the GO statement or the GO command.

The GO statement has no syntax because it is not a keyword in SQL.

However, it is used by the SQL to create a group or batch of instructions that would be sent into the server

Read more about SQL at:

https://brainly.com/question/25694408

#SPJ11

Your friend just noticed his smartphone's battery is running low. Unfortunately, your friend isn't very knowledgeable about computers and smartphones, so he doesn't know what type of charging cable he needs. He knows his phone is running iOS 12. What kind of cable does your friend need to charge his phone

Answers

Answer:

Lightning

Explanation:

Apple Inc. designed and developed the Lightning computer bus and power connection. Apple mobile devices such as iPhones, iPads, and iPods use the Lightning connection to connect to host computers, external displays, cameras, USB battery chargers, and other accessories. Lightning is substantially smaller than its predecessor, with only 8 pins instead of 30.

i) Convert 8GB to bits. Give the expression.

Answers

Answer:

64 billion

Explanation:

1gb = 1 billion bytes

so 8gb = 8 billion bytes

then

1 byte= 8 bits

so 8 billion bytes = 8 × 8 billion bits, 64 billion bits

You hide three worksheets in a workbook and need to unhide them. What is an accurate statement about this process?

Answers

The  accurate statement about this process is that "The person must unhide each worksheet separately".

How do you unhide multiple sheets in Excel?

To unhide multiple sheets, one can:

Right-click the Sheet tab at the bottom, and then click on  Unhide. Then also click all together the Shift + Up/Down Arrow keys to click multiple (or all) worksheets, and then click OK.

Note that The  accurate statement about this process is that "The person must unhide each worksheet separately".

Learn more about worksheets  from

https://brainly.com/question/25130975

#SPJ12

Other Questions
How does this verb sound at the end conjugated insimple past?"Cancelled"/t/O /d/O edO /id/ In "Do Not Go Gentle into That Good Night, the speaker emphasizes that older men should fight fiercely against death. The setting is the time when the father of the speaker was approaching his death.The conflict of the poem surrounds the end of life and the resistance to death. In the poem, Thomas began with the second-person point of view.In "The Charge of the Light Brigade", is a poem about a failed military action that involved British light calvary. The setting was during the Crimean war. The theme is about bravery, duty, and sacrifice.lolllllllllllllllllll Consider the formula for surface area, SA = (p h) + 2B. The perimeter isgiven in ___, the height in ___, and area of the base in ___. A. in; in2; in B. in2; in; in2 C. in; in; in D. None of the above There are some counters in a bag. the counters are blue or green or red or yellow. the table shows the probabilities that a counter taken at random from the bag will be blue or will be green. red yellow colour blue green probability 0.32 0.20 the probability that a counter taken at random from the bag will be red is five times the probability that the counter will be yellow. there are 300 counters in the bag. work out the number of yellow counters in the bag. show how to simplify y-8 = 3/4x [x-(-6)] The fact that Krebs is in asmall town showsA. that life at home has drastically changedwhile he was away.B. he has an easier time readjusting.C. that life is only complicated in his mind. A number is less than 20 units away from 7 on the number line. what numbers are within these parameters? choose the inequality that represents the situation. solve the inequality. The graph shows f(x) and its transformation g(x).Enter the equation for g(x) in the box. Identify a rational number among the following numbers :2 + 2, 22, 0 and g(x) =2x+3, find g(-3) PLEASE HELP!!!!! OVER DUE!! 100 POINTS! What building, located at the center of the acropolis, was dedicated to the goddess athena?. Erin bought a $100,000 whole life insurance policy. When she is 65 she decides to surrender the policy for its cash value of $60,000. Of the cash value, $50,000 is premiums. How much of Erin's cash surrender is taxable? Most of the text below should have been written in the past tense. Read it carefully and then correct the 3 verbs that are in the wrong tense.We located the object on radar and then we moved to the telescope. I take a bearing and Andy swivel the barrel around. Putting his eye to the eyepiece, he saw a glowing, yellow-red orb floating in mid-air. It hovered for about 30 seconds before it shoot off upwards at high speed. We couldn't believe our eyes! Which of the following statements about parasitism is true?(I) Parasitism is a symbiotic relationship.(II) In parasitism, one organism is benefited.(III) Parasitism does not affect any organism.1. Statement I alone2. Statements I and II only3. Statements II and III only4. Statements I, II, and III Cmo podemos hacer la expresin corporal? Miles is a licensed agent who represents Colgate Health and its Medicare Advantage (MA) plans. Miles has several clients who have recently come to him for help. They are in their initial coverage period9s) (ICEP) and are interested in enrolling in one of Colgate Healths MA plans. Adam will soon turn 68 and has decided to retire. Betty is about to turn 65 and has also decided to retire. Adam and Betty both currently have coverage through Colgate Health. Charles had health coverage through Colgate but dropped the coverage when he retired early to travel to Europe. Charles has just turned age 65 and is now back in the United States. Diedre, who will turn 65 next month, currently has coverage through Ditmas Health a company that Miles also represents. Who qualifies for the opt-in simplified enrollment mechanism? How many atoms of oxygen are in one molecule of Carbon dioxide? 17 = a + bb is one more than awork out the values of a and b(simultaneous equation) consider the series 1/4 1/16 1/64 1/256 which expression defines sn