Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
There are four data types in Python used to store data such as tuple, list, set, and dictionary.
The correct answer to this question is option D: Dictionary
Dictionary data type is used to store data values in key:value pairs as given in the question. It is a collection that is changeable, unordered, and does not allow duplicate entries.
Dictionaries in Python are written with curly brackets and have keys and values such as car={name="honda", model=2010}
when you run the given assignment statment such
info= {3:10,4:23,7:10,11:31}
print(info)
It will print the info dictionary (key:value pair)
{3: 10, 4: 23, 7: 10, 11: 31}
While other options are not correct because:
Tuples in Python are used to store multiple items in a single variable. For example:
info=("apple", "banana", "cherry")
List is used to store multiple items in a single variable. for example
myList = ["apple", "banana", "cherry"]
print(myList)
The list is ordered, changeable, and allows duplicate entry. But you can not put key: value pair in the list.
Deque is a double-ended queue that has the feature to add or remove an element on it either side.
Answer:
Dictionary is the answer
This is similar to the last problem, except that the first number on a line is an ID number that identifies an account. The same ID number may appear on any number of lines. Use a Dictionary to accumulate, for each ID, the sum of all the numbers that are on all the lines with that ID number. Call the input file id_data.txt. Write an output file called ID_sums.txt. On each line of the output fille, print an ID number and the sum. Sort the lines by the numerical order of the IDs
Answer:
Following are the code to this question:
def getSum(ID):#defining a method getSum that accept an ID
t= 0#defining a variable t
while ID!= 0:#defining while loop to check ID not equal to 0
t+= ID % 10# holding remainder value
ID = ID // 10#holding quotient value
return t#return total value
def readRecord(S):#defining a method readRecord that hold list
f_Read = open("idInfo.txt","r")#defining a variable f_Read to open file
for C_ID in f_Read:#defining for loop to hold file value
C_ID = C_ID.replace('\n', '')#use replace method
S[C_ID] = getSum(int(C_ID))#use list to method value
f_Read.close()#close file
def sortRecord(ID_List, t_List):#defining a sortRecord
for x in range(len(ID_List) - 1):#defining for loop to calculate the length of list
for y in range(0, len(ID_List) - x - 1):#defining for loop to calculate the length of list
if ID_List[y] > ID_List[y+1]:#defining if block to check value is greater
ID_List[y], ID_List[y+1] = ID_List[y+1], ID_List[y]#swap the value
t_List[y], t_List[y+1] = t_List[y+1], t_List[y]#swap the value
def showReport(ID, t):#defining a method showReport that accept id and t
for i in range(len(ID)):#defining for loop to hold index value
print(ID[i]," ",t[i])#print index value
def writeRecord(ID_List, t_List):#defining a method writeRecord that accept two list
f_Write = open("idSorted.txt","w")#defining a variable f_Write to hold store value in file
for i in range(len(ID_List)):#defining a for loop to store value with index
f_Write.write(ID_List[i])#hold list value
f_Write.write(" ") #for space
f_Write.write(str(t_List[i]) + "\n")# add index value
f_Write.close()#close file
def run():#defining method run
S = {}#defining an empty list
readRecord(S)#passing list into readRecord method
ID_List = list(S.keys())#defining a variable that holds key value in list
t_List = list(S.values())#defining a variable that holds values value in list
sortRecord(ID_List, t_List)#calling a method sortRecord by passing value
showReport(ID_List, t_List)#calling a method showReport by passing value
writeRecord(ID_List, t_List)#calling a method writeRecord by passing value
if "run":
run()
Output:
Please find the attached file.
Explanation:
In the above program code, 6 method getSum, readRecord, sortRecord,showReport, writeRecord, and run method is defined, in which getSum and readRecord is used a single list store value in parameters, and in other methods, it accepts two parameter to store value in key and values form and use a txt file to store and take value.
In the run method, an empty list s is declared, that pass into the variable ID_List and t_List, and call the method, in this program two a text file "idInfo.txt" is used, that holds some value in the file, and create another file that is "idSorted.txt", in this file it stores the value in the numerical order of the ID's.
For an interview, the most used microphone types are
A. Boom mics, long range mics
B. Strap, studio recording mics
C. Lapel or handheld
D.No mics are needed
Exodia
Principle of Computer Operation
Answer:
????
Explanation:
Janet needs to flag a message for follow-up in Outlook. Which option is not a default?
Today
Tomorrow
Next Week
Next Tuesday
Answer:
Next tuesday.
Explanation: Its to specific
what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and credit card info is the store?
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Answer:
By modifying the hidden form values that is in a local copy of the company web page
Explanation:
In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.
Which tab should you use to change the text font color in your presentation?
Answer:
The Home Tab
Explanation:
Is it important to study information systems
Answer:
There is massive importance if you want to study information study.
It can help you understand the data, organize, and process the data, using which we can generate and share information.
Explanation:
It largely depends on your interest and requirement, but a better knowledge or clue about information systems may help analyze the data especially if you want to become a data scientist, machine learning, Artificial intelligence or deep learning, etc.
It can help you understand the data, organize, and process the data, using which we can generate and share information.
A great understanding of information systems may exponentially increase the productivity, growth, performance, and profit of the company.
Most Professions get exposed to information Systems no matter what their career objective is, as it may help in having better decision making based on the information they get through data.
So, yes!
There is a massive importance if you want to study information study.
What is a commonly used software access restriction for a computer system connected to other networks such as the internet?
a.Passwords
b. Firewall
c. encryption
d. biometric systems
Answer:
firewall
Explanation:
Review how to write a for loop by choosing the output of this short program.
for counter in range(3):
print(counter * 2)
Please explain it to me, I’m not learning Bc I don’t have a teacher.
Answer:
The output is:
0
2
4
Explanation:
First of all, the print statement must be indented with a tab, otherwise it is not part of the for loop.
The range(3) creates an array with values 0,1,2. The variable 'counter' gets those values one after another, and the print statement outputs this value doubled, hence the 0, 2 and 4 output.
A specific packet journey, from your computer to a remote server, end-to-end across multiple networks, has the following link bandwidths (packet travels across each of these links, in order): 1000 Mbps, 1 Mbps, 40 Mbps, 400 Mbps, 100 Mbps, 1000 Mbps. Assuming your computer and the server can transfer data at > = 1000 Mbps (so neither device is limiting the data transfer relative to the links), how long, in seconds, will it take to transfer a 125 MB file?
Answer:
0.125 seconds
Explanation:
The formula for the time taken to transfer the file is = file size / bandwidth
Assuming the computer and server could only transfer data at the speed of 1000 Mbps or more, The time of transmission is;
= 125 MB / 1000 Mbps = 0.125 seconds.
Biodiversity explanation
Which of the following are risks to a network?
a Sending emails
b. Granting administrator access to a non-administrator
c. Opening files from unknown senders
d. Unwanted advertisements
Answer:
option b and c are correct answers.
Explanation:
Let see each option in detail.
a) Sending email is not a risk.
b) Granting access is a problem because the other person can undermine the network
c) Unknow senders can send virus or other malicious code to corrupts you data.
d) Unwanted advertisement is not a big deal.
Answer:
Granting administrator access to a non-administrator
Opening files from unknown senders
Explanation:
Psst those are the answers
Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose for this
purpose?
Mary needs to choose the _________
menu in order to place the text in a desired fashion around the image
Plato btw
Answer:
she needs to choose the insert menu
write algorithm and flowchart to calculate sum,difference, product and quotient of two integer number given by the user.
Answer:
Step1: Start
Step2: Initialize the count variable to zero
Step3: Initialize the sum variable to zero
Step4: Read a number say x
Step 5: Add 1 to the number in the count variable
Step6: Add the number x to the sum variable.
Step7: Is the count variable in the memory greater than 50?
If yes, display the sum: go to step 8.
If No, Repeat from step 4
Step8: Stop
Explanation:
True or false?
as the speed of a vehicle increases the amount of tire tread touching the road also increase.
If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color
Answer:
watermark
Explanation:
The OpenMP critical-section compiler directive is generally considered easier to use than standard mutex locks, because
Complete question
A) management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors.
B) programmers don't need to worry about race conditions.
C) a thread cannot block inside a critical section.
D) deadlock cannot occur.
Answer:
A. Management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors
Explanation:
This is a multiple choice question and this is the answer because:
1. OpenMp is inclusive of an APL/compiler directives:
2. any code which follows #pragma omp parallel is a parallel region and it is performed by large number of threads that are same as the number of processing cores that are in the system.
3. The critical-section compiler directive acts more like a binary semaphore or mutex lock,it makes sure that only one thread is active in the critical section at the same time.
The attenuation of a signal is -10 dB. What is the final signal power if it was originally
5 W?
Answer:
P₂ = 0.5 W
Explanation:
It is given that,
The attenuation of a signal is -10 dB.
We need to find the final signal power if it was originally 5 W.
Using attenuation for signal :
[tex]dB=10\text{log}_{10}(\dfrac{P_2}{P_1})[/tex]
Put dB = -10, P₁ = 5 W
Put all the values,
[tex]-10=10\text{log}_{10}(\dfrac{P_2}{5})\\\\-1=\text{log}_{10}(\dfrac{P_2}{5})\\\\0.1=\dfrac{P_2}{5}\\\\P_2=5\times 0.1\\\\P_2=0.5\ W[/tex]
So, the final signal power is 0.5 W.
The final signal power if it was originally 5W is; 0.5 W
Signal PowerWe are given;
Attenuation signal; dB = -10 dBOriginal signal power; P1 = 5 WFormula for attenuation signal is;
dB = 10log_10_ (P2/P1)
Where P2 is final signal power
Thus;
-10 = 10log_10_(P2/5)
-10/-10 = log_10_(P2/5)
-1 = log_10_(P2/5)
0.1 = P2/5
P2 = 0.1 × 5
P2 = 0.5 W
Read more about signal power at; https://brainly.com/question/13315405
write a an algorithm to find out volume?
I am having trouble with doing this code on Python:Develop the Car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information.Ex: If the input is:2011 18000 2018where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:Car's information: Model year: 2011 Purchase price: 18000 Current value: 5770Note: print_info() should use three spaces for indentation.
Answer:
class Car:
def __init__(self, model_year, purchase_price):
self.model_year = model_year
self.purchase_price = purchase_price
self.current_year = 0
self.current_value = 0
def set_current_year(self, year):
self.current_year = year
def calc_current_value(self, current_year):
if self.current_year == 0:
return "Must first input the current year"
depreciation_rate = 0.15
car_age = current_year - self.model_year
self.current_value = round(self.purchase_price - (car_age * (self.purchase_price * 0.15)))
def print_info(self):
print("Car's information:")
print(f"Model year: {self.model_year}")
print(f"Purchase price: {self.purchase_price}")
if self.current_value > 0:
print(f"Current value: {self.current_value}")
else:
print("Current value: Unknown")
Explanation:
The python program above defines the class "Car" that accepts the model year and purchase price of an instance. The class has a set method for the current year variable that is used to calculate and update the current value variable of the object. The print_info method prints the car model year, purchase price and its current value after nth years.
Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL
Answer:
hi
Explanation:
When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.
What is the best approach to testing a website? visit all pages to verify that they load visit every page and verify all links visit the pages with hyperlinks visit all pages that appear on the navigation menu
Answer:
B. visit every page and verify all links
Explanation:
I just took the test, and only one year late.
Answer:
THe answer s b
Explanation:
PLS HELP ASAP- Select the correct text in the passage.
Which concept explained in the paragraph below means that data always remains consistent?
Specific programs have some tasks that a computer must perform in parallel with others. These tasks (such as the performance of the same set of operations on different data sets) often work in parallel clusters. In such cases, a separate thread of execution handles each separate task. You can think of a thread as a sequence of instructions that computers can manage independently.
It is possible for different threads to access the same data elements and change their values, and this can lead to an inconsistent state of information. For instance, if multiple programs access a shared variable x and change its value, the variable will not contain the correct value at the end of the programs. We can prevent such inconsistencies by using locks. A thread puts a lock on shared data, and releases this lock only after completing its operations.
Answer:
reread the text
Explanation:
I do it it helps
Answer:
A thread puts a lock on shared data, and releases this lock only after completing its operations.
The last sentance
Explanation: TRUST ME ISTG THATS THE ANSWER
how to earn money fast in adopt me?
Answer: If you want money in adopt me quickly, you could become a baby and buy a pet and take care of it and yourself. Also, you could purchase adopt me bucks with robux.
Explanation:
If you are working on doing senior portraits and want a lens that will give you the best shallow depth of field which lens would you choose?
a) 55mm f1.2 (focal length of 55mm, maximum aperture of 1.2)
b) 28-80mm f4.5 (Zoom lens with focal length from 28-80mm, max aperture 4.5)
c) 18mm f5.6
d) 50mm f1.4
45 points and brainliest
Answer: The answer is C Hope this helps :) Please mark Brainliest
Explanation:
Answer:
c) 18mm f5.6
Explanation:
For the best lens that offers the best shallow depth of field, you need to choose the one with the maximum apertature but does not zoom.
Hence choice c) has the maximum aperture and does not zoom.
Hope this helps :)
Select the correct answer. Which type of computer application is Apple Keynote? OA. word processor O B. spreadsheet O C. presentation OD. database O E. multimedia
Answer:
Apple Keynote is presentation Software
The correct option is C
Explanation:
Now let explain each option
Word processor:
Word processor is incorrect because it is used to type text, format it add tables and figures, For example MS Word
Spread Sheet:
Spread Sheet is incorrect as it is used for calculation. Like MS Excel
Presentation:
Key tone is a presentation software. it is used to make presentation and add animation and transition to it.
Database
Database is incorrect because databases are used for storing data. Not for presentation.
Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, he discovers an arcade store that pays real cash for every game that the player wins - however, the store will only pay out once per game. The store has some games for which they will pay winners, and each game has its own completion time and payout rate. Thrilled at the prospect of earning money for his talent, Adam walked into the store only to realize that the store closes in 2 hours (exactly 120 minutes). Knowing that he cannot play all the games in that time, he decides to pick the games that maximize his earnings
Sample game board at the arcade GAME COMPLETION TIME (in minutes) PAYOUT RATE Pac-man 90 400 Mortal Kombat 10 30 Super Tetris 25 100 Pump it Up 10 40 Street Fighter II 90 450 Speed Racer 10 40
An acceptable solution is the one where it still picks the best earnings even when the list of games or completion times or payout rates change.
Question:
Write code in Java/Scala/Python to help Adam pick the sequence(s) of games that earn him the most money?.
Then, assume you have a variable list of games and their payout rates. What is the best way to pick the games that earn you the most?
Input Explanation
The first line of input is always an integer denoting many lines to read after the first line. In our sample test case, we have 6 in the first line and 6 lines after the first line, each having a game, completion_time and payout_rate.
In each data line, the game, completion_time and payout_rate are separated by a ','(comma).
The games board may change but the store still closes in 120 minutes.
Input
6
Pac-man,80,400
Mortal Kombat,10,30
Super Tetris,25,100
Pump it Up,10,40
Street Fighter II,90,450
Speed Racer,10,40
Output Explanation
Print the game names that earn him the most into the standard output in alphabetical order
Output
Mortal Kombat
Pump it Up
Speed Racer
Street Fighter II
Answer:
ask it to ur teacher boiiiiii
When save a newly created template, you use which extension for the file type? .doc, .docx, .doct, .dotx?
Answer:
The main difference between the two file formats is that in DOC, your document is saved in a binary file that includes all the related formatting and other relevant data while a DOCX file is actually a zip file with all the XML files associated with the document.