answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
2 years ago
10

def retry(operation, attempts): for n in range(attempts): if operation(): print("Attempt " + str(n) + " succeeded") ___ else: pr

int("Attempt " + str(n) + " failed") retry(create_user, 3) retry(stop_service, 5)
Computers and Technology
1 answer:
marusya05 [52]2 years ago
6 0

Answer:

Following are the missing code to this question:

break;

Explanation:

In the given python code, a method "retry" is defined, that accepts two-variable, that is "operation and attempts" in its parameters, inside the method a for loop is defined that uses the n variable to holds attempt values and define the conditional statement.

  • Inside if block, it checks if the operation value is true, it will print a successful attempts values and break the condition, otherwise it will goto else block.
  • In the else block, it will print failed attempts values.  
You might be interested in
If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
Aleonysh [2.5K]

Answer: C. Live

Explanation:

A live acquisition is where data is retrieved from a digital device directly via its normal interface such as activating a computer and initiating executables. Doing so has a certain level of risk because data is highly likely to be modified by the operating system. The process becomes significantly more common likely with less available disk space to the point of completely impractical to image.

7 0
2 years ago
Write the printitem() method for the base class. sample output for below program: last name: smith first and last name: bill jon
ella [17]
The question involves basic polymorphism. The following is the partial flow of the program.

baseItemPtr = new BaseItem();
baseItemPtr.setLastName("Smith");

derivedItemPtr = new DerivedItem();
derivedItemPtr.setLastName("Jones");
derivedItemPtr.setFirstName("Bill");

itemList.add(baseItemPtr);
itemList.add(derivedItemPtr);

for (i = 0; i < itemList.size(); ++i) {
itemList.get(i).printItem();
}

return;
7 0
2 years ago
Read 2 more answers
How does making a phone call differ when using: A public phone A cell phone
rosijanka [135]

Answer:

Differ in the quality of their transmission.

Explanation:

For example, when using the public phone box, wired transmission is done not wireless as in cell phones. Public phone box use electronic signals transmitted through a cable network to send voice data which are not very effective for long distance communication.

However, cell phones wirelessly send electromagnetic wave signal to a cell tower close to the caller and then the information is then transmitted to cell tower close to the receiver within a split of a second. This method of communication has much advantages.

7 0
2 years ago
The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent messag
Scorpion4ik [409]

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

4 0
2 years ago
When a product owner adds a new feature/idea in the backlog and brings it up for discussion during refinement session, how shoul
Drupady [299]

Answer:

2 is the correct answer.

5 0
2 years ago
Read 2 more answers
Other questions:
  • Which process is used to protect transmitted data in a vpn?
    12·1 answer
  • Kirk found a local community college with a two-year program and he is comparing the cost with that of an out-of-state two-year
    13·2 answers
  • Joe runs a handyman service. He enjoys writing and keeping up on the latest trends. He wants to share this information with his
    7·1 answer
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • If byte stuffing is used to transmit Data, what is the byte sequence of the frame (including framing characters)? Format answer
    6·1 answer
  • Company A is setting up a network of mostly Windows machines. Which networking file system protocol would you recommend for maxi
    5·1 answer
  • Write a method named removeDuplicates that accepts a string parameter and returns a new string with all consecutive occurrences
    7·1 answer
  • Which OS function does a CLI fulfill? A User interface B Running applications C Hardware interface D Booting
    8·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    12·1 answer
  • Which are technical and visual demands that need to be considered when planning a project? Choose three answers
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!