Answer:
170 hope this helps you with
Explanation:
"128 + 0 + 32 + 0 + 8 + 0 + 2 + 0 = 170. So, 170 is the decimal equivalent of the number 10101010."
State the items that will be examined when performing a binary search for Monkey,
which is not in the list.
The items that will be examined when performing a binary search for monkeys are Antelope, Baboon, Cheetah, Elephant, and Giraffe in the first half of the cycle.
What is binary search?
A search algorithm known as binary search in computer science, also known as half-interval search, logarithmic lookup, or binary chop, asserts to have discovered the location of a target value within a sorted array.
The target value is compared to the middle element of the array using binary search. A successful approach for finding an item in a sorted list of elements is binary search.
Therefore, in the first half of the cycle, the following objects will be looked at when conducting a binary search for monkeys: antelope, baboon, cheetah, elephant, and giraffe.
To learn more about binary search, refer to the link:
https://brainly.com/question/12946457
#SPJ1
Plz hurry it’s timed
A new version of quicksort has been suggested by Professor I. M. CRAZY called CRAZYSORT in which anadversary picks the splitter in Partition in the worst possible way to maximize the running time of CRAZYSORT, thatis, line 1 of Partition (see textbook) is determined by the adversary in constant timeO(1). What is the running time ofCRAZYSORT? Justify your answer.
What is Machine Learning (ML)?
Answer:
Explanation:
Machine learning is a branch of artificial intelligence (AI) and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy.
Answer:
Machine learning is a type of learning that makes learning easy and faster with the help of electrical devices such as mobile phones,laptops etc
Explanation:
This enable the user to work faster and easily with no stress at all
com to enjoy dont give fkin lecture hsb-tnug-fyt
Answer:
This is my faverrrrate part of computer science lol.
Explanation:
Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name of each creature. For your hash function, you can simply use the sum of all ASCII values. You can also come up with your own hash function. Your program should present a menu to the user allowing them to look up a creature by name. Additionally, create a function that allows the user to insert a new creature. This creature should be added to the existing hash map. If the name entered by the user already exists, DO NOT ADD IT TO THE HASH MAP. Simply report that the creature already exists. If the creature is unique and successfully added, report the calculated index value. Your hash array should start as size4. You will need to implement a rehashing function to maintain a load factor of 0.75. Collision resolution should be handled via separate chaining with linked lists.
Other Requirements
•Read in a CSV file from the command line when running the program.
•Convert the raw CSV data into the creature struct and add it to a HashMap
•Make sure you properly release all of your allocated memory.
•Format your code consistently.
•Function declarations, structs, and preprocess directives should be placed in a corresponding header file.
•Save your code for this problem ascreature_hash.(c|h).
Creature struct
typedef struct {
char *name;
char *type;
int hp;
int ac;
int speed;
} Creature;
Example Run
1. Search
2. Add Creature
3. Exit
> 1
Enter name: Terrasque
Unable to find "Terrasque"
1. Search
2. Add Creature
3. Exit
> 2
Enter name: Storm Giant
Enter type: Huge giant
Enter HP: 230
Enter AC: 16
Enter speed: 50
Storm Giant added at index 3.
CSV file: Name, hp, ac, speed, type
Rakshasa,110,16,40,Fiend
Priest,27,13,25,Humanoid
Berserker,67,13,30,Humanoid
Fire Elemental,102,13,50,Elemental
Kraken,472,18,20,Monstrosity
Centaur,45,12,50,Monstrosity
Mage,40,12,30,Humanoid
Hell Hound,45,15,50,Fiend
Basilisk,52,15,20,Elemental
Androsphinx,199,17,40,Monstrosity
Efreeti,200,17,40,Elemental
Balor,262,19,40,Fiend
Chain Devil,142,19,40,Fiend
Adult Black Dragon,195,19,80,Dragon
Adult Blue Dragon,225,19,80,Dragon
Adult Red Dragon,256,19,80,Dragon
Please help in C
Answer:
Explanation:
class TableInput{
Object key;
Object value;
TableInput(Object key, Object value){
this.key = key;
this.value = value;
}
}
abstract class HashTable {
protected TableInput[] tableInput;
protected int size;
HashTable (int size) {
this.size = size;
tableInput = new TableInput[size];
for (int i = 0; i <= size - 1; i++){
tableInput[i] = null;
}
}
abstract int hash(Object key);
public abstract void insert(Object key, Object value);
public abstract Object retrieve(Object key);
}
class ChainedTableInput extends TableInput {
ChainedTableInput(Object key, Object value){
super(key, value);
this.next = null;
}
ChainedTableInput next;
}
class ChainedHashTable extends HashTable {
ChainedHashTable(int size) {
super(size);
// TODO Auto-generated constructor stub
}
public int hash(Object key){
return key.hashCode() % size;
}
public Object retrieve(Object key){
ChainedTableInput p;
p = (ChainedTableInput) tableInput[hash(key)];
while(p != null && !p.key.equals(key)){
p = p.next;
}
if (p != null){
return p.value;
}
else {
return null;
}
}
public void insert(Object key, Object value){
ChainedTableInput entry = new ChainedTableInput(key, value);
int k = hash(key);
ChainedTableInput p = (ChainedTableInput) tableInput[k];
if (p == null){
tableInput[k] = entry;
return;
}
while(!p.key.equals(key) && p.next != null){
p = p.next;
}
if (!p.key.equals(key)){
p.next = entry;
}
}
public double distance(Object key1, Object key2){
final int R = 6373;
Double lat1 = Double.parseDouble(Object);
}
}
NEED HELP IMMEDIATELY!!
What is the difference between a worm and a typical virus?
A) Worms are a type of spyware; viruses are a type of malware.
B) Worms are impossible to remove; viruses can be tracked and removed.
C) Worms are stronger than viruses; viruses are stronger than spam.
D) Worms travel independently of human action; viruses require human actions.
Answer:
Option C
Explanation:
Option A is incorrect as Worm is a form of malware
Option B is incorrect because antivirus can remove all forms of malware
Option C is correct because a worm is more problematic as compared to the virus. Also, viruses are weaker than worm because they need a host file to run but a worm can work independently.
Option D is also incorrect because both are able to self replicate.
How does an introduction in a set of instructions help an audience of laypeople?
A. It defines unfamiliar terms that are used in the instructions.
B. It provides background information about the instructions.
C. It warns about potential hazards in the instructions.
D. It shows a list of supplies needed to complete the instructions.
E. It cautions against causing damage while carrying out the instructions.
Answer:
B. It provides background information about the instructions.
Explanation:
It says introduction in a set of audience. A introduction creates a background.
Write a function to calculate the distance between two points Distance( x1, y1,x2.2) For example Distance(0.0,3.0, 4.0.0.0) should return 5.0 Use the function in main to loop through reading in pairs of points until the all zeros are entered printing distance with two decimal precision for each pair of points.
For example with input
32 32 54 12
52 56 8 30
44 94 4439 6
5 19 51 91 7.5
89 34 0000
Your output would be:__________.
a. 29.73
b. 51.11
c. 55.00
d. 73.35
e. 92.66
Answer:
The function in Python3 is as follows
def Distance(x1, y1, x2, y2):
dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5
return dist
Explanation:
This defines the function
def Distance(x1, y1, x2, y2):
This calculates distance
dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5
This returns the calculated distance to the main method
return dist
The results of the inputs is:
[tex]32, 32, 54, 12 \to 29.73[/tex]
[tex]52,56,8,30 \to 51.11[/tex]
[tex]44,94,44,39\to 55.00[/tex]
[tex]19,51,91,7.5 \to 84.12[/tex]
[tex]89,34,00,00 \to 95.27[/tex]
When an exception is thrown by code in the try block, the JVM begins searching the try statement for a catch clause that can handle it and passes control of the program to ___. Group of answer choices Each catch clause that can handle the exception The first catch clause that can handle the exception If there are two or more catch clauses that can handle the exception, the program halts The last catch clause that can handle the exception
Answer:
The answer is "the first catch clause that can handle the exception".
Explanation:
In the catch block handles the exception which is indicated by its argument, exception type, declares the type of exception, which can handle the name of a class which inherits from the "throw class", that's why As code in the try block throws the exception, the JVM looks for a catch clause that really can handle this in the try statement or transfers control of a program to first catch clause which can handle the exception.
I am a bunch of large LANS spread out over several physical locations. Who am I?
Answer:
You're WAN
Explanation:
Wide Area Network
Suppose that a minus sign in the input indicates pop the stack and write the return value to standard output, and any other string indicates push the string onto the stack. Further suppose that following input is processed:
this parrot - wouldn't voom - if i put -- four thousand --- volts - through it -
What are the contents (top to bottom) left on the stack?
a. through wouldn't this.
b. this wouldn't through.
c. it through wouldn't.
d. it through volta.
e. volts through it.
Answer:
e. volts through it
Explanation:
volts through it
The contents (top to bottom) left on the stack is volts through it. Thus, option E is correct.
What is standard output?When a computer program begins execution, standard streams are interconnected input and output channels of communication between the program and its surroundings. The three I/O connections are known as standard input (stdin), standard output (stdout), and standard error (stderr).
A negative sign in the input indicates that the stack should be popped, and the return value should be sent to standard output, whereas any other string means that the string should be pushed into the stack. Assume that the following input is processed: this parrot would not voom if I pushed — four thousand —- volts - through it.
The contents of the stack (from top to bottom) are volts via it. As a result, option E is correct.
Learn more about standard output here:
https://brainly.com/question/30054426
#SPJ5
desktop and personal computer are also known as
4. Why do animals move from one place to another?
Answer:
Animal move from one place to another in search of food and protect themselves from their enemies.They also move to escape from the harsh climate. Animal move from one place to another in search of food,water and shelter.
Answer:
Animals move one place to another because he search food and shelter
difference between academic library and school Library
Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value with no sign. For example, the absolute value of -5 is 5, and the absolute value of 2 is 2. Test the template in a simple driver program being sure to send the template short, int, double, float, and long data values.
Answer:
The function in Java is as follows:
public static double func(double num){
num = Math.abs(num);
return num;
}
Explanation:
This defines the function
public static double func(double num){
This determines the absolute function of num
num = Math.abs(num);
This returns the calculated absolute value
return num;
}
search for five ms excel terms
Answer:
work book, work sheet, cell, columns and rows
Write a program that reads in a text file, infile.txt, and prints out all the lines in the file to the screen until it encounters a line with fewer than 4 characters. Once it finds a short line (one with fewer than 4 characters), the program stops. Your program must use readline() to read one line at a time. For your testing you should create a file named infile.txt. Only upload your Python program, I will create my own infile.txt using break
Answer:
Explanation:
f=open("infile.txt","r")
flag=True
while(flag):
s=f.readline().strip()
if(len(s)>=4):
print(s)
else:
flag=False
Uhh... What is happening?.. What...
Answer:
the Redstone underneath is activating the piston
Answer:
lever under each piston
Write the MIPS assembly code to find the area of a given shape. Your program must take a floating-point value and shape (Circle - 1, Triangle - 2, Square - 3) as input and return the circumference/perimeter and area of the shape. Assume the floating-point value units are meters and the triangle is an equilateral triangle. [Note: you can search for the expression to calculate the area and circumference/perimeter of these shapes]
Answer:
Explanation:
.data
msg1: .asciiz "Enter the floating point value = "
msg2: .asciiz "\nEnter the shape (Circle - 1, Triangle - 2, Square - 3) = "
msg3: .asciiz "\nThe perimeter of the triangle with side = "
msg4: .asciiz " meters is "
msg5: .asciiz " meters.\n"
msg6: .asciiz "\nThe area of the triangle with side = "
msg7: .asciiz " square meters.\n"
msg8: .asciiz "\nThe circumference of the circle with radius = "
msg9: .asciiz "\nThe area of the circle with radius = "
msg10: .asciiz "\nThe perimeter of the square with side = "
msg11: .asciiz "\nThe area of the square with side = "
pi: .float 3.1415816
eq_tr_area: .float 0.43305186
two: .float 2
three: .float 3
four: .float 4
.text
li $v0,4 # system call code for printing string = 4
la $a0,msg1 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0,6 # system call code for reading floating point number
syscall # call operating system to perform read operation
li $v0,4 # system call code for printing string = 4
la $a0,msg2 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0,5 # system call code for reading integer
syscall # call operating system to perform read operation
move $t0,$v0
IF:
bne $t0,1,ELSE_IF #if not 1 then goto elseif
li $v0,4 # system call code for printing string = 4
la $a0,msg8 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f0 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg4 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
l.s $f1,pi
l.s $f3,two
mul.s $f3,$f3,$f1 #calculate 2*pi*radius
mul.s $f3,$f3,$f0
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f3 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg5 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg9 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f0 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg4 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
mul.s $f2,$f0,$f0 #calculate radius *radius
mul.s $f2,$f2,$f1 #calculate pi *r^2
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f2 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg7 # load address of string to be printed into $a0
syscall
ELSE_IF:
bne $t0,2,ELSE #if not 2 then check else
li $v0,4 # system call code for printing string = 4
la $a0,msg3 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f0 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg4 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
l.s $f3,three
mul.s $f3,$f3,$f0 #calculate 3*side
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f3 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4
la $a0,msg5
syscall
li $v0,4
la $a0,msg6
syscall
li $v0, 2
mov.s $f12,$f0
syscall
li $v0,4
la $a0,msg4
syscall
l.s $f3,eq_tr_area
mul.s $f2,$f0,$f0
mul.s $f2,$f2,$f3
li $v0, 2
mov.s $f12,$f2
syscall
li $v0,4
la $a0,msg7
syscall
ELSE:
bne $t0,3,END
li $v0,4
la $a0,msg10
syscall
li $v0, 2
mov.s $f12,$f0
syscall
li $v0,4
la $a0,msg4
syscall
l.s $f3,four
mul.s $f3,$f3,$f0
li $v0, 2
mov.s $f12,$f3
syscall
li $v0,4
la $a0,msg5
syscall
li $v0,4
la $a0,msg11
syscall
li $v0, 2
mov.s $f12,$f0
syscall
li $v0,4
la $a0,msg4
syscall
mul.s $f2,$f0,$f0
li $v0, 2
mov.s $f12,$f2
syscall
li $v0,4
la $a0,msg7
syscall
END:
li $v0,10
syscall
Code is as follows:
.data
msg1: .asciiz "Enter the floating point value = "
msg2: .asciiz "\nEnter the shape (Circle - 1, Triangle - 2, Square - 3) = "
msg3: .asciiz "\nThe perimeter of the triangle with side = "
msg4: .asciiz " meters is "
msg5: .asciiz " meters.\n"
msg6: .asciiz "\nThe area of the triangle with side = "
msg7: .asciiz " square meters.\n"
msg8: .asciiz "\nThe circumference of the circle with radius = "
msg9: .asciiz "\nThe area of the circle with radius = "
msg10: .asciiz "\nThe perimeter of the square with side = "
msg11: .asciiz "\nThe area of the square with side = "
pi: .float 3.1415816
eq_tr_area: .float 0.43305186
two: .float 2
three: .float 3
four: .float 4
.text
li $v0,4 # system call code for printing string = 4
la $a0,msg1 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0,6 # system call code for reading floating point number syscall # call operating system to perform read operation
li $v0,4 # system call code for printing string = 4 la $a0,msg2 # load address of string to be printed into $a0 syscall # call operating system to perform print operation
li $v0,5 # system call code for reading integer syscall # call operating system to perform read operation move $t0,$v0
IF:
bne $t0,1,ELSE_IF #if not 1 then goto elseif
li $v0,4 # system call code for printing string = 4
la $a0,msg8 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0, 2 # system call code for printing float = 2 mov.s $f12,$f0 #move the single precision f2 in f12 syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4 la $a0,msg4 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
l.s $f1,pi l.s $f3,two
mul.s $f3,$f3,$f1 #calculate 2*pi*radius
mul.s $f3,$f3,$f0
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f3 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg5 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg9 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f0 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg4 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
mul.s $f2,$f0,$f0 #calculate radius *radius
mul.s $f2,$f2,$f1 #calculate pi *r^2
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f2 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg7 # load address of string to be printed into $a0
syscall
ELSE_IF:
bne $t0,2,ELSE #if not 2 then check else
li $v0,4 # system call code for printing string = 4 la $a0,msg3 # load address of string to be printed into $a0 syscall # call operating system to perform print operation
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f0 #move the single precision f2 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg4 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
l.s $f3,three
mul.s $f3,$f3,$f0 #calculate 3*side
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f3 #move the single precision f2 in f12
syscall
bne $t0,3,END #if not 3 then end
li $v0,4 # system call code for printing string = 4
la $a0,msg10 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f0 #move the single precision f0 in f12
syscall # call operating system to perform print operation
li $v0,4 # system call code for printing string = 4
la $a0,msg4 # load address of string to be printed into $a0
syscall # call operating system to perform print operation
l.s $f3,four # multilply by 4
mul.s $f3,$f3,$f0 #calculate 4*side
li $v0, 2 # system call code for printing float = 2
mov.s $f12,$f3 #move the single precision f3 in f12
syscall # call operating system to perform print operation
END:
li $v0,10 # system call code for printing exit (end of program)
syscall # call operating system to perform print operation
Learn More:https://brainly.com/question/10169933
write a object oriented c++ program
Answer:
I don't know how to code C++
Explanation:
Describing How to Create a Self-Join Query
Use the drop-down menus to complete the steps for creating a self-join query.
1. Click the
tab.
2. In the Queries group, click Query Design.
3. In the Show Table dialog box, add
4. Click and drag a field from one copy of the table and drop it on the other table.
5. Add the fields to the query.
6. Click
to see the results.
е
Answer:1. Click the ✔ Create tab.
2. In the Queries group, click Query Design.
3. In the Show Table dialog box, add ✔ the same table twice
.
4. Click and drag a field from one copy of the table and drop it on the other table.
5. Add the fields to the query.
6. Click ✔ Run
to see the results.
Explanation:on edg
Describing How to Create a Self-Join Query Use the drop-down menus to complete the steps for creating a self-join query is by 1. Click the tick in the tab to design a Self-Join Query.
Why can we use self be a part of?A self-be a part of is a be a part of that may be used to sign up for a desk with itself. Hence, it's miles a unary relation. In a self-be, a part of, every row of the desk is joined with itself and all of the different rows of the equal desk.
The Query and View Designer assigns an alias to the second one example via way of means of including a sequential wide variety to the desk name. In addition, the Query and View Designer creates a be a part of line among the 2 occurrences of the desk or desk-valued item withinside the Diagram pane.
Read more about the Queries :
https://brainly.com/question/25694408
#SPJ2
Programming errors can result in a number of different conditions. Choose all that apply.
The program will halt execution.
An error message will be displayed.
Incorrect results will occur.
Code will run faster.
the first 3
Answer:
The program will halt execution and and error message will be displayed. Probably number 3 too.
Answer:
A, B and C
Explanation:
Write a test program that prompts the user to enter the number of the items and weight for each item and the weight capacity of the bag, and displays the maximum total weight of the items that can be placed in the bag. Here is a sample run:
Answer:
The program in Python is as follows:
n = int(input("Number of weights: "))
weights= []
for i in range(n):
inp = float(input("Weight: "))
weights.append(inp)
capacity = float(input("Capacity: "))
possible_weights = []
for i in range(n):
for j in range(i,n):
if capacity >= weights[i] + weights[j]:
possible_weights.append(weights[i] + weights[j])
print("Maximum capacity is: ",max(possible_weights))
Explanation:
This gets the number of weights from the user
n = int(input("Number of weights: "))
This initializes the weights (as a list)
weights= []
This iteration gets all weights from the user
for i in range(n):
inp = float(input("Weight: "))
weights.append(inp)
This gets the weight capacity
capacity = float(input("Capacity: "))
This initializes the possible weights capacity (as a list)
possible_weights = []
This iterates through the weights list
for i in range(n):
for j in range(i,n):
This gets all possible weights that can be carried by the bag
if capacity >= weights[i] + weights[j]:
possible_weights.append(weights[i] + weights[j])
This prints the maximum of all possible weights
print("Maximum capacity is: ",max(possible_weights))
Why is it important to isolate evidence-containing devices from the internet?
To save the battery
To hide their location
Devices can be remotely locked or wiped if connected
It is not important to isolate the devices
Answer:
C.
Devices can be remotely locked or wiped if connected
Explanation:
spreadsheet formula for total 91?
Answer:
Go to any blank cell. Enter the number 91.
Select the cell that contains 91. Press Ctrl+C to copy.
Select your range the contains numbers.
Press Ctrl+Alt+V to open the Paste Special dialog.
In the top of the Paste Special dialog, choose Values. In the Operation section, choose Add. Click OK.
Explanation:
When determining the statement of purpose for a database design, what is the most important question to ask?
O Who will use the database?
O Should I use the Report Wizard?
O How many copies should I print?
O How many tables will be in the database?
Answer: A. Who will use the database?
Explanation:
When determining the statement of purpose for a database design,the most important question to ask is Who will use the database?
What is the purpose of statement of purpose for a database ?Statement of purpose in a data base is very essential to know more about the database, this is why it is important to ask the question Who will use the database?
This question help the programmer to know the kind of data that will be running at the database so as make sure the database serve the required purpose.
Therefore option A is correct.
Read more about database at:
https://brainly.com/question/518894
#SPJ9
CS160 Computer Science I In class Lab 10
Objective:
Work with dictionaries
Work with strings
Work with files
Assignment:
This program will read a file of English words and their Spanish translation. It then asks the user for an English word. If it exists in your dictionary the Spanish translation is displayed. If the English word does not exist in the dictionary the program states that the word does not exist in its list of words.
Specifics:
Create a text file, with one English word and a Spanish word per line, separated by a colon. You can create the language file using a text editor, you do not need to write a program to create this file. An example of the file might be:
one:uno
two:dos
three:tres
four:cuatro
five:cinco
six:seis
seven:siete
eight:ocho
nine:nueve
ten:diez
After reading the text file, using it to fill up a dictionary, ask the user for an English word. If the word exists, print out the Spanish version. If the word does not exist state that the word is not in your list. Continue this process of asking for a word until the user does not enter a word (just pressed Enter).
As you might have noticed, there is nothing in the program that limits this Spanish words. This program can be written to work with any translation, so feel free to make it be French, or German or any other language where you can come up with a list of translated words. You also are not limited to 10 words, that is just the list I came up with for the example. The number of key/values pairs that you have in your dictionary is basically limited by the memory in your computer.
Hints
You will need to determine if the key (the English word) exists in the dictionary. Use the in operator with the dictionary, or the get() method. Either can be used to avoid crashing the program, which happens if you attempt to use a key that does not exist.
An example of running the program might be:
Enter the translation file name: oneToTen.txt
> Enter an English word to receive the Spanish translation.
Press ENTER to quit.
Enter an English word: one
he Spanish translation is uno
Enter an English word: ten
The Spanish word is diez
Enter an English word: 5
I don’t have that word in my list.
Enter an English word: three
The Spanish word is tres
Answer:
The program in Python is as follows:
fname = input("Enter the translation file name: ")
with open(fname) as file_in:
lines = []
for line in file_in:
lines.append(line.rstrip('\n'))
myDict = {}
for i in range(len(lines)):
x = lines[i].split(":")
myDict[x[0].lower()] = x[1].lower()
print("Enter an English word to receive the Spanish translation.\nPress ENTER to quit.")
word = input("Enter an English word: ")
while(True):
if not word:
break
if word.lower() in myDict:
print("The Spanish word is ",myDict[word.lower()])
else:
print("I don’t have that word in my list.")
word = input("Enter an English word: ")
Explanation:
This prompts the user for file name
fname = input("Enter the translation file name: ")
This opens the file for read operation
with open(fname) as file_in:
This creates an empty list
lines = []
This reads through the lines of the file
for line in file_in:
This appends each line as an element of the list
lines.append(line.rstrip('\n'))
This creates an empty dictionaty
myDict = {}
This iterates through the list
for i in range(len(lines)):
This splits each list element by :
x = lines[i].split(":")
This populates the dictionary with the list elements
myDict[x[0].lower()] = x[1].lower()
This prints an instruction on how to use the program
print("Enter an English word to receive the Spanish translation.\nPress ENTER to quit.")
This prompts the user for an English word
word = input("Enter an English word: ")
This loop is repeated until the user presses the ENTER key
while(True):
If user presses the ENTER key
if not word:
The loop is exited
break
If otherwise, this checks if the word exists in the dictionary
if word.lower() in myDict:
If yes, this prints the Spanish translation
print("The Spanish word is ",myDict[word.lower()])
If otherwise,
else:
Print word does not exist
print("I don’t have that word in my list.")
Prompt the user for another word
word = input("Enter an English word: ")
For this assignment your are to implement the Pet Class described in Programming Exercise 1, starting on page 494 in our textbook. Additionally your program will allow users to enter the pet's information until the user enters in the string "quit". Once the user enters quit the program will print out a summary of all the information that has been entered. Your program should not assume any maximum number of pets that can be added. Items in blue designate output. Items in red designate computer input. Example Test Case: Enter name, type and age of your pet: Name: Momo Type: Bird Age: 33 Enter "quit" to stop entering. Anything else to continue. a Enter name, type and age of your pet: Name: Pooh Type: Dog Age: 8 Enter "quit" to stop entering. Anything else to continue. quit SUMMARY: Name: Momo, Type: Bird, Age: 33. Name: Pooh, Type: Dog, Age: 8.
Answer:
ohhhvhhffifyuddfuiicfdguc
Explain the IT vendor selection and management processes
Answer:
The vendor management process includes a number of different activities, such as: Selecting vendors. The vendor selection process includes researching and sourcing suitable vendors and seeking quotes via requests for quotation (RFQs) and requests for proposal (RFPs), as well as shortlisting and selecting vendors. hope it helps