- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 128字
- 2021-08-20 10:17:07
User input
Allowing user input enhances the dynamic nature of a program. It is a good practice to query the user for file paths or values rather than explicitly writing this information into the code file. Therefore, if the user wants to use the same program on a separate file, they can simply provide a different path, rather than editing the source code. In most programs, users supply input and output locations or identify which optional features or modules should be used at runtime.
User input can be supplied when the program is first called or during runtime as an argument. For most projects, it is recommended to use command-line arguments because asking the user for input during runtime halts the program execution while waiting for the input.
推薦閱讀
- 科技安全:戰略實踐與展望
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 黑客大曝光:無線網絡安全(原書第3版)
- Practical Network Scanning
- Kali Linux Network Scanning Cookbook(Second Edition)
- Kali Linux Wireless Penetration Testing Cookbook
- Computer Forensics with FTK
- 數據安全與隱私計算(第3版)
- 計算機網絡安全基礎(第5版)
- Instant Java Password and Authentication Security
- API安全技術與實戰
- 人工智能安全(精裝版)
- 電腦安全與攻防入門很輕松(實戰超值版)
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- Bug Bounty Hunting Essentials