subject
Computers and Technology, 22.11.2019 01:31 lke123

Redactedyou are a spy. the file attached has a series of messages that need to be encrypted before being sent. open the file "messages. txt", and for each line, replace all instances of the name "james bond" with "[redacted]", and then print the result. do not use the built-in read method of files. file info: "day 1: i have started observation of james bond. day 3: james bond has still not realized that i am hiding under his fridge. day 14: i accidentally sneezed, and james bond nearly noticed. close call! day 20: after nearly three weeks, james bond has still not noticed i am not a fridge. day 21: without anyone else to talk to, i am concerned that i might be empathizing with the fridge. day 25: i am now the fridge. day 27: james bond hasn't bought any new milk lately. james bond needs more calcium. i am concerned for him. day 29: james bond discovered me after i offered to him find the eggs! i had to flee. ending mission."blockpy: #45.4) plus or minusthe file attached has a series of "+" and "-" characters, representing additions and subtractions. create a function named convert_operator, which consumes a string (a single character, either a "+" or a "-") and returns either 1 or -1, respectively. then apply this function to the contents of each of the following files to calculate the sum of all these pluses and minuses (so an integer number). notice that the "plus and minus. txt" file is entirely on one line. therefore, you should use the read method to access its contents. but you should only pass one character at a time to the function you write! file info: +++-+++--++-+++--+-++--+--+++--++-+ ++--++-+++--+-++--+-+++--+++--++-++ +--+-++-+-+++--+-++-+++-++-+++--+-+ +--+--+++--++-+++--++-+++--+-++--+- +++--+---++-++--++-+++--+-++-+-+++- -+-++--+--+++-++-+++--+--+++--+-++- +++--++-+++--+-++--+-+++--+++--++-+ ++--+-++-+-+++--+-++--+--+++-++-+++ --+-++--+--+++--++-+++--++-+++--+-+ +--+-+++--+++--++-+++--+-++-+-+++-- +-++--+--+++--+---+--+-+

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:30
Plz 40 points what are raster vectors? a bitmap image a vector file a type of printing press a small projector
Answers: 1
question
Computers and Technology, 22.06.2019 10:40
"it security policy enforcement and monitoring" respond to the following: describe how monitoring worker activities can increase the security within organizations. describe the rationale that managers should use to determine the degree of monitoring that the organization should conduct. explain the extent to which you believe an organization has the right to monitor user actions and traffic. determine the actions organizations can take to mitigate the potential issues associated with monitoring user actions and traffic.
Answers: 3
question
Computers and Technology, 22.06.2019 19:30
The following is an excerpt from a slide presentation. today we will inverse operations solving equations using inverse operations solving inequalities using inverse operations from which part of the presentation does the slide most likely come from? a. introduction b. outline c. body d. conclusion
Answers: 1
question
Computers and Technology, 23.06.2019 02:50
Thereโ€™s only one game mode that stars with the letter โ€˜eโ€™ in cs: go. which of the options below is it?
Answers: 1
You know the right answer?
Redactedyou are a spy. the file attached has a series of messages that need to be encrypted before b...
Questions
question
Social Studies, 12.12.2020 16:30
question
Mathematics, 12.12.2020 16:30
question
Mathematics, 12.12.2020 16:30
question
Computers and Technology, 12.12.2020 16:30
question
Mathematics, 12.12.2020 16:30
Questions on the website: 13722360