what is polling in python and what is active variable??

Answers

Answer 1

Answer:

Polling is a powerful python utility used to wait for a function to return a certain expected condition.An active variable is a variable that is manipulated by the investigator.

Explanation:


Related Questions

Since the ntfs file system enjoys more widespread compatibility with other operating systems, it is often used on removable devices such sd cards and usb flash drives.
a. true
b. false

Answers

Answer: false

Explanation:

create a comic strip about prepering hand tools for operation and safety

paaa helppp ​

Answers

Answer:

Hammer stools

ahsnsksns

________ software allows the user to enter, organize, and store huge amounts of data and information.

Answers

Database management software allows the user to enter, organize, and store huge amounts of data and information.

What are databases management?

Database Management is known  to be a term that connote that which gives room for a person to be able to organize, save, as well as retrieve data from a computer.

Note that Database Management can also tell more about  the data storage, operations, as well as  security practices of a database administrator (DBA) in all of the life cycle of the data.

Therefore, Database management software allows the user to enter, organize, and store huge amounts of data and information.

Learn more about Database management  from

https://brainly.com/question/24027204
#SPJ1

You have upgraded your aws support plan to the business support level. what is true of the business support plan?

Answers

The business support plan for AWS is one hour support on production system failure. AWS is stand for Amazon Web Services, Inc.

Governments, companies, and individuals can access on-demand cloud computing platforms and APIs through AWS, an Amazon corporation, on a metered pay-per-use basis. These cloud computing web services provide software tools and distributed computer processing power through AWS server farms.

One of these services is called Amazon Elastic Compute Cloud (EC2), which gives consumers access to a virtual computer cluster that is always reachable online. AWS services are delivered to customers through a global network of AWS server farms.

Learn more about AWS https://brainly.com/question/28145530?

#SPJ4

The software/system that helps make sure the retail firm doesn't have a stockout is?

Answers

The software/system that helps make sure the retail firm doesn't have a stockout is supply chain management software.

Supply chain management is a software that comprehends all the techniques and processes that convert the starting material into the finished or final product. The supply chain management software is cost-effective and time-saving.

Creating a strategy, raw materials, manufacturing, distribution, and returns are the five important ingredients of supply chain management software.

The software helps the retail firm in improving customer service by ensuring that there is a continuous flow of the starting material so that the production process does not stop indefinitely which results in good relationships with the supplier and customer.

The software also performs the functions of processing customer requirements, sourcing, and shipping management.

To know more about supply chain management, click here:

https://brainly.com/question/28282152

#SPJ4

Which ux design role focuses on designing the experience and functionality of a product?

Answers

The UX design role which focuses on designing the experience and functionality of a product is an D. Interaction designer.

What is a GUI control?

A GUI control simply refers to an abbreviation graphic user interface control and it can be defined as a form of user interface that is designed and developed to make it easier for end users to interact, control and use a product such as an electronic device, especially through a combination of graphical icons, symbols, images and audio indicator.

In Computer technology, a professional (expert) who is saddled with the responsibility of designing the experience and functionality of a product is an Interaction designer.

Read more on GUI control here: brainly.com/question/4138138

#SPJ1

Complete Question:

Which UX design role focuses on designing the experience and functionality of a product?

Motion designer

Visual designer

Production designer

Interaction designer

What paradigm is this code based on? How do you know?
What does the number 16 mean in this code? How do you know?
Imagine you wanted to tweak the project so that the list produced by the program included teachers and kept track of how many years they have been working at the school. Using the principles of inheritance and overriding, explain how you could take this code and quickly create the new programs.
How could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? Propose at least one way to use “coding” or creating programs outside of computer science and explain how it uses coding-related concepts.
Imagine that you were programming without an IDE. What problems might you encounter?

Answers

Answer:

I Don't Know

Explanation:

nsjskdoeowowokskdnekmek biien

when determining outsourcing fees, a has a variable fee based on the number of users or workstations that have access to the application.

Answers

When determining outsourcing fees, a subscription model has a variable fee based on the number of users or workstations that have access to the application.

What Is a Subscription Business Model?

Subscription business models are known to be those which are said to be based on the notion of selling a product or service to be able to get monthly or yearly subscription revenue.

Note that this model is one that is known to be focus on customer retention over the issue of customer acquisition.

Therefore, When determining outsourcing fees, a subscription model has a variable fee based on the number of users or workstations that have access to the application.

Learn more about subscription model from

https://brainly.com/question/14317614

#SPJ1

When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.

What are the major activates of operating systems with regard to file management?

Answers

Creating, deleting, manipluation, backing up file and mapping to permanent storage are the major activities of operating systems with regard to file management.

File basically refers to collection of specific information stored in the memory of computers and file management refers to the process of manipulating these files, such as  creating, modifying and deleting files.

Following are the five major activities of all operating systems in regard to file management :

Creating and deleting files:  This service creates new files and places them at the particular locations. Also it deletes unnecessary files.Creating and deleting directories: This function helps to store the files in separate folders known as directories that support users to search files quickly. Also deleting files from directories is performed by this activate.File manipulation instructions: It provides functionality to manipulate files and directories, such as modifying the data on files and changing  file names in the directories.Mapping to permanent storage: It helps in mapping files onto secondary storage so that the files can be located easily and quickly.Backing up files: This service prevents data loss by providing a backup facility of data on stable and secure storage devices.

File management is one of the basic and important functions that all operating systems perform. Therefore, creating, deleting, backing up and manipulation are the major activities of operating system regarding files management.

You can learn more about file management at

https://brainly.com/question/12736385

#SPJ4

The level of the computer hierarchy that is composed of gates and wires is the ______.

Answers

The level of the computer hierarchy that is composed of gates and wires is Digital logic level.

The level of the computer hierarchy that is composed of gates and wires is the Digital logic level. This is the level where the computer's basic operations are performed. The digital logic level is made up of two main components: the control unit and the ALU.

The control unit is responsible for the management of the computer's resources and for controlling the sequence of operations within the computer. The ALU, or arithmetic logic unit, is responsible for performing the computer's arithmetic and logic operations.

All the basic operations performed by a computer, such as addition, subtraction, multiplication, and division, are implemented at the digital logic level.

Learn more on Digital logic level here:

https://brainly.com/question/8316419

#SPJ4

Utilities are specialized programs that help the operating system function more efficiently. they are essential for computer maintenance and some come built-in to the operating system. True or false

Answers

Utilities are specialized programs that are often built-in in computers to provide support to the operating system to function more efficiently and are crucial for computer maintenance. Thus, the given statement is true.

Utility programs are system software that perform specific functions to maintain proper working of computers in an efficient way. Utility programs optimize computers performance by analyzing and managing tasks and resources of operating systems to handle different situations.

Utility programs are often pre-installed with operating systems as well as a large variety of utility programs are available on the internet for downloading or purchasing that facilitate operating systems in multiple ways.

Certain common tasks of utility programs include installation and uninstallation, virus detection, data backup and restore, deletion of unwanted files, task scheduling, and disk fragmentation.

Some examples of utility programs are disk management tools, backup software, file management tools, compression tools, and antivirus software.

You can learn more about utility programs at

https://brainly.com/question/22247778

#SPJ4

If 200.123.4.6 is a classful internet protocol (ip) address, what class is it in?

Answers

200.123.4.6 is a classful internet protocol (ip) address located in class C.

An IP address (internet protocol address) is a numeric representation. This numerical representation uniquely identifies a particular interface on the network.

Address in IPv4 that has a length of 32 bits. This allows a maximum of 4,294,967,296 (232) unique addresses. Addresses in IPv6 are 128-bits long, which allows for 3.4 x 1038 (2128) unique addresses.

The total usable address pools of both versions are subtracted by the various reserved addresses and other considerations.

IP addresses can also be defined as binary numbers but are usually expressed in decimal form (IPv4) or hexadecimal form (IPv6) to make it easier for humans to read and use them.

You can learn more about IP addresses here https://brainly.com/question/18722788

#SPJ4

Computer vandalism falls under the computer as a ________ classification of computer crime.

Answers

Computer vandalism falls under the computer as a target classification of computer crime.

What is a computer crime?

A computer crime is sometimes referred to as cyber crime and it can be defined as a type of crime that typically involves the use of a computer system by a knowledgeable computer user (hacker or attacker) to gain an authorize access to a computer, in order to steal sensitive personal data (information) such as:

PasswordSocial Security NumberEmail address

What is computer as a target?

In Cyber security, computer as a target generally involves computer vandalism, denial of service, data alteration, network intrusions, and thefts of data (information).

Read more on computer crime here: https://brainly.com/question/13109173

#SPJ1

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages. True or false?.

Answers

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages is a True statement.

What is Unicode?

Unicode is known to be a kind of a modern standard that has been laid out from  text depiction that tells each of the letters as well as the symbols commonly used in the digital and print media.

Note that Unicode has been seen at the top as a good standard for identifying characters in any kind of  text in almost any language.

Therefore, The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages is a True statement.

Learn more about coding   from

https://brainly.com/question/22654163

#SPJ1

Which new technology is a result of advances in artificial intelligence? O A. High-speed internet B. 5G networks C. Smart appliances D. Self-driving cars ​

Answers

The  new technology that is said to be a result of advances in artificial intelligence is known to be option D. Self-driving cars.

What is the artificial intelligence?

The term Artificial intelligence (AI) is known to be the ability or power of any given  computer or a robot that is said to be handled as well as controlled by a computer to be able to carry out tasks that are said to be often done by humans due to the fac that they need human intelligence and also their discernment.

Therefore, based on the above, The  new technology that is said to be a result of advances in artificial intelligence is known to be option D. Self-driving cars.

Learn more about artificial intelligence from

https://brainly.com/question/25523571
#SPJ1

Select the 3 TRUE statements about storing digital images.

Group of answer choices

When storing the original file, use highest resolution possible if you are not sure how the images might be used.

Back up important documents on an external storage device.

Don't include descriptive information, version or size, and intended use information, as this increases file size.

Keep the original high resolution file in a separate place and make a copy to edit and process.

To get a higher resolution image of a low resolution picture, simply resave it at a higher resolution.

Answers

Answer:

When storing the original file, use highest resolution possible if you are not sure how the images might be used.Back up important documents on an external storage device.Keep the original high resolution file in a separate place and make a copy to edit and process.

Explanation:

The other two are incorrect. -->

Descriptive info hardly affects file size. In fact this should be a requirement to identify the image.

You cannot go from a lower resolution image to a higher resolution image, only the other way around

What are components of the network effect in social media engagement? (choose every correct answer.) multiple select question. the exp

Answers

The components of the network effect in social media engagement are:

InformationNetworkDynamic

What is social media engagement?

The Definition of the term Social media engagement  is known to be a term that acts to measures all issues in regards to the public shares, the likes as well as the comments for any kind of online business as well as its social media efforts.

Note that the Engagement is one that is seen as a form of  historical common metric that is known to be used  for the examination of social media performance but it is one that do not  need to translate to sales.

Therefore, based on the above, one can say that The components of the network effect in social media engagement are:

InformationNetworkDynamic

Learn more about social media engagement  from

https://brainly.com/question/8360107

#SPJ1

Information

Network

Dynamic

Player

Given the variables x, y, and z, each associated with an int, write a fragment of code that assigns the smallest of these to min.

Answers

Given the variables x, y, and z, each associated with an int, a fragment of code that assigns the smallest of these to min. is given below:

if x<=y and x<=z:

   min=x

if y<=x and y<=z:

   min=y

if z<=x and z<=y:

   min=z

What is Programming?

This refers to the sequence of steps that are used to give commands to a computer system to execute a task.

Hence, we can see that Given the variables x, y, and z, each associated with an int, a fragment of code that assigns the smallest of these to min. is given below:

if x<=y and x<=z:

   min=x

if y<=x and y<=z:

   min=y

if z<=x and z<=y:

   min=z

Read more about fragment codes here:

https://brainly.com/question/15776278

#SPJ1

two examples of how scientists, technologists, engineers, and mathematicians may work together to create a new product

Answers

Answer:

Which places were Included in Nepal by Pratap. Singh Shah in his short rule

what is the headgear for​

Answers

Answer:

headgear is an orthodontic appliance used to correct bite and support proper jaw alignment and growth

After establishing fields and criteria, execute your query by clicking the _____ button in the _____ group.

Answers

After establishing fields and criteria, execute your query by clicking the Click the Run button in the Results group.

What is mean by query in SQL?

The term  query is known to be a kind of a request that is said to be made for data or information that can or that need to be obtained from a database table or combination of tables.

Note that this data may be made as results that are known to have been  returned by Structured Query Language (SQL) or as a kind of a pictorials, graphs or hard results,

Therefore, based on the above, After establishing fields and criteria, execute your query by clicking the Click the Run button in the Results group.

Learn more about query from

https://brainly.com/question/25694408

#SPJ1

what does an operating system do

Answers

Answer: An operating system manages and runs all of the hardware and software installed onto the computer.

Explanation:

It performs basic tasks such as file, memory, and process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Clicking the help button at a dialog box opens the _____ support website with specific information about the dialog box.

Answers

By clicking the help button at a dialog box opens the control support website with specific information about the dialog box.

What is a Dialog box?

The dialog box is known to be a kind of graphical control tool that is said to be in a way of a small window.

The term Help Button is one that functions as a kind of control that a user can select or use to show the application in regards to their help system.

It is known to be one that often helps one to communicates information to the user as well as quickens them for the set  response.

The Dialog boxes are said to be known to be "modal" or "modeless", based on if they block interaction and as such, By clicking the help button at a dialog box opens the control support website with specific information about the dialog box.

Learn more about dialog box from

https://brainly.com/question/23119185
#SPJ1

Formatting codes can be added to documents using a(n)_____, such as slashes // and angle brackets < >.

Answers

Using a delimiter like slashes or angle brackets, formatting codes can be applied to documents.

What are boundaries and shading mean?

Word documents often utilize borders and shading to highlight specific passages of text and make them the reader's initial impression.

We can use Borders and Shading in MS Word to make written text, paragraphs, and other elements appear lovely and attractive.

Formatting codes can be used to apply formatting to documents using a delimiter like slashes or angle brackets.

In order to add formatting codes to documents, a delimiter like slashes or angle brackets can be used.

The complete question is:

Formatting codes can be added to documents using a ___ such as slashes and angle brackets

Learn more about the borders and Shading here:

https://brainly.com/question/1553849?

#SPJ1

In addition to oracle, another source of hypervisors for macos desktops is ________.

Answers

In addition to Oracle, another source of hypervisors for macOS desktops is Parallels. Therefore, the correct answer option is B. Parallels.

What is virtualization?

Virtualization can be defined as the creation of an abstract layer over computer hardware primarily through the use of a software, in order to enable the operating system (OS) such as macOS, storage device, server, etc., to be used by end users over the Internet.

In Cloud computing, some of the components (features) which is not required for a successful virtualization environment include the following:

Virtual machineHost machineHypervisors

In Macintosh computers, oracle and parallel are sources of hypervisors.

Read more on virtualization and hypervisors here: https://brainly.com/question/28528924

#SPJ1

Complete Question:

In addition to Oracle, another source of hypervisors for macOS desktops is _____. A. Microsoft B. Parallels C. Apple D. Intel. B. Host key.

The primary function of ____ layer protocols is to move datagrams through an internetwork connected by routers.

Answers

The primary function of network layer protocols is to move datagrams through an internetwork connected by routers.

An separate, self-contained message known as a datagram is sent through the network, and its arrival, arrival time, and content are all unreliable.

A "datagram" is a chunk of data transferred through a network that uses packet switching. An information-rich datagram can be routed from its source to its destination. An IP packet is an example of a datagram using this definition. Datagram is essentially another word for "packet."

a service mode where a packet-switched network routes each datagram independently of any others that may have come before or after it. There is no need to set up a planned path for the packets to transit via the network because datagram service is connectionless.

Learn more about datagram:

https://brainly.com/question/28389702

#SPJ4

Jonathan spends his free time writing and testing code. what type of software does he work with?

Answers

Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

What is open source software?

Open source software is known to be some line of code that is said to be set up so as to be publicly available to everyone to see, change, and distribute the code as they want to.

Note that  Open source software is made  in a decentralized as well as collaborative way and as such, Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

Learn more about Open source software from

https://brainly.com/question/4593389

#SPJ1

When the output (information) of an information system is used as new input it is called:____.

Answers

When the output (information) of an information system is used as new input it is called feedback.

What is information from a system that is used to make changes to the input?

The term feedback 'is seen as a form of output that is said to be used to make alterations to input or processing activities.

Note that a system is made up of the interrelated components that carry out a lot of tasks that is said to be perceived as feedback of the  information system.

Therefore, When the output (information) of an information system is used as new input it is called feedback.

Learn more about feedback from

https://brainly.com/question/25653772
#SPJ1

True or false: the basic input-output system (bios) updates for hewlett packard and dell are the only manufacturers whose bios codes can be mixed.

Answers

Answer:

false

Explanation:

Spoofing is the forging of the __________ address on an email so that the email message appears to come from someone other than the actual sender.

Answers

Answer: Return

Explanation:

Other Questions
Find all the integer solutions of each system of inequalities {y>=0 {72-y>=4 When a company uses a marketing discipline and combines computer technology and databases with customer service and marketing communications it is known as? _____ are considered the founders of behaviorism. a. watson and skinner b. freud and jung c. maslow and rogers d. pavlov and skinner A student is given this proof.Given: AOM DONProve: CON~ BOMZAOM ZDONgivenZBOM DONvertical anglestheoremZAOM ZBOMtransitiveproperty ofcongruenceZAOM ZCONvertical anglestheoremZCON BOMtransitiveproperty ofcongruenceThe student says that the proof shows that AOM BOM because theyare vertical angles.Which statement best corrects the student's interpretation? I Need help with this ASAP Which shows ray C A? (x+2, y+3)help please Archaea with a plasma membrane composed of a tetraether monolayer would most likely be found __________. how do i do part (iii). the answer is 2 but i got the answer based on guessing. how do i do this w/o guessing? thank you. What information does a set of parametric equations provide that is lacking in a rectangular equation for describing the motion of an object? Choose the angle name JWT which of these tribes are classified as pre historic and served as the ancestors of more modern tribes?paleocreekmississippianchereokeearchaicblackfootwoodlandnone please hurry I really need help! 13. The table shows the times of runners completing amarathon. To qualify for the next marathon, arunner's time must be less than 3 hours. Whichrunners qualify?ChoKevinRunnerOjasSydneyTime (h)3-1/3.2830133603- A technician is using a modem to dial a large block of phone numbers in an attempt to locate other systems connected to a modem. which type of network scan is being used? What does the chest most likely symbolize in this story?At the auction, Trisa tried to imagine what was inside the unopenedchest. Gold? Jewels? But another person outbid her. Trisa was sofurious, she made plans to steal the chest from the winning bidder,never mind that she already had more money than one could spend ina lifetime. She broke into the bidder's mansion and found the chest in acloset. She threw open the lid only to find it empty. Outside the window,the lights of police cars flashed. Someone must have seen her.A. Needless greedB. Hidden treasuresC. Priceless goodsD. Unchecked evil 8 256m to km shortcut method and 25 000 mm to hm and 864 dm to dam and X Y-7 00 1What is the slope of the linear function represented inthe table?*-707/101/107 When the payment for an annuity is made at the end of each period, such an annuity is referred to as a(n) _____. Select the domain and range of the graph in set-builder and interval notation. What is the relashionship between longitude and time?