Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter a value. The program multiplies the value by 10 and outputs the result

Answers

Answer 1

Answer:

Here is your pseudocode:

Declare number  and result

Get number

Set result = number * 10

Print result

Explanation:

Declare two variables, number and result

Ask the user to enter the number

Multiply the number by 10 and set it to the result

Print the result

Answer 2

In programming, flowcharts and pseudocodes are used as types of algorithms used as models of actual programs.

The pseudocode is as follows:

Input num  

Display num * 10  

The flow of the above pseudocode is as follows

The first line of the pseudocode gets input for num  The second line prints the product of the user input and 10

The above explanation is also applicable to the flowchart (see attachment)

Read more about flowcharts and pseudocodes at:

 https://brainly.com/question/24735155

Draw A Flowchart Or Write Pseudocode To Represent The Logic Of A Program That Allows The User To Enter

Related Questions

If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock the disk?

Answers

Answer:

Key escrow.

Explanation:

If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.

A major advantage of longitudinal design over the cross-sectional design is the ability to detect change as a result of repeated measurement of the same variables on the same sample. TRUE OR FALSE

Answers

Answer:

True is the correct answer to the given question .

Explanation:

In the longitudinal analysis of designing we are collecting the information from the similar sample frequently over an enlarged time where as in the cross-sectional analysis designing Gathering the information from the population at the given time interval .

The main objective longitudinal designed is used to monitor the variations in the similar sample as a result of frequent analysis of the similar variables that are not possible in the cross-sectional design analysis .

Therefore the given statement is true .

var name = prompt("Enter the name to print on your tee-shirt");
while (name.length > 12) {
name = prompt("Too long. Enter a name with fewer than 12 characters.");
}
alert("The name to be printed is " + name.toUpperCase());

What will happen if the user enters Willy Shakespeare at the first prompt?

a. The user will be prompted to enter a different name
b. The alert will display The name to be printed is " + name.toUpperCase()
c. The alert will display The name to be printed is WILLY SHAKESPEARE
d. The alert will display The name to be printed is WILLY SHAKES

Answers

Willy Shakespeare has 17 characters. It's higher than 12,so the output will be Too long. Enter a name with fewer than 12 characters.

Letter a.

Every noticeable event, transaction, interaction, request and reply, and so on are being expectantly captured and saved in storage appliances and arrays for real-time as well as posterior investigations create something we call it ______________.

Answers

Answer:

Every noticeable event, transaction, interaction, request and reply, and so on are being expectantly captured and saved in storage appliances and arrays for real-time as well as posterior investigations create something we call it Big Data.

Another way to look at is that it comprises massive amounts of data that keeps on growing exponentially over time so much so that it cannot be processed or analyzed using usual data processing techniques.

Cheers!

zybooks cis 110 challenge activity 9.8.1 Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x % 2 (remainder is either 0 or 1) x = x / 2 Note: The above algorithm outputs the 0's and 1's in reverse order. Ex: If the input is 6, the output is 011. Your program should define and call a function: Function Integer To Binary(integer num) returns nothing The function should output 1's and 0's representing the integer in binary (in reverse).

Answers

Answer:

public class IntegerToBinary

{

public static void main(String[] args) {

 integerToBinary(6);

}

public static void integerToBinary(int num){

    while(num > 0){

       System.out.print(num%2);

       num = Math.floorDiv(num, 2);

    }

}

}

Explanation:

*The code is in Java.

Create a function called integerToBinary that takes one parameter, num

Inside the function, create a while loop that iterates while the num is greater than 0. Inside the loop, print the num%2. Then, get the floor division of the num by to and assign it to the num.

Inside the main, call the function with parameter 6.

Your on-premises hosted application uses Oracle database server. Your database administrator must have access to the database server for managing the application. Your database server is sized for seasonal peak workloads, which results in high licensing costs. You want to move your application to Oracle Cloud Infrastructure (OCI) to take advantage of CPU scaling options. Which database offering on OCI would you select?

Answers

Answer:

Bare metal DB systems

Explanation:

Oracle Call Interface OCI is comprehensive system which is native C language interface to Oracle Database for custom applications. The bare metal database system requires more compute node processing power. Customers are not given OS logons or SYSDBA in Oracle autonomous applications which prevents phishing attacks.

Consider the following algorithm. x â 1 for i is in {1, 2, 3, 4} do for j is in {1, 2, 3} do x â x + x for k is in {1, 2, 3, 4, 5} do x â x + 1 x â x + 5 Count the number of + operations done by this algorithm.

Answers

Answer:

Number of + operation done by this algorithm is 60

Explanation:

i = 4

j = 3

k = 6

Now, let "n" be number of '+' operations

n = i × j + i × 2k

substituting the figures

n = 4 × 3 + 4 × (2 × 6)

n = 12 + 4 × 12

n = 12 + 48

n = 60

Answer:

i can't see some of the numbers

Explanation:

It is always possible and feasible for a programmer to come up with test cases that run through every possible path in a program.
A. True
B. False

Answers

Answer:

True

Explanation:

It is always possible and feasible for a programmer to come up with test cases that run through every possible path in a program is a "true statement" or the first option. It is very natural for a programmer/developer to come up with test that will run through every possible outcome in a program. Doing so will help the developer find things that might cause problems with the program in later time.

Hope this helps.

The answer to the question about the feasibility of a programmer to always come up with test cases that run through every possible path in a program is:

No

What is a Test Case?

This refers to the set of actions which a programmer performs to find out if his software or program passes the system requirements in order to work properly.

With this in mind, we can see that while in some cases, it is possible for the programmer to come up with test cases, but it is not feasible in all cases as there can be hardware error which a virtual machine cannot solve.

Read more about test cases here:
https://brainly.com/question/26108146

What happens if two functions are defined with the same name, even if they are in different arguments within the same .py files?

Answers

Answer:

Following are the code to this question:

def data(a):#defining method data that accepts parameter

   print (a)#print parameter value

def data(b):#defining method data that accepts parameter

   print (b)#print parameter value

x=input("enter value: ")#defining variable x that5 input value from user

print(data(x))#call method data

Output:

enter value: hello..

hello..

None

Explanation:

As the above code, it is clear defines that python doesn't support the method overloading because More than one method can't be specified in a python class with the same name and python method arguments have no type. The single argument method may be named using an integer, a series, or a double value, that's why we can say that it is not allowed.

Suppose that a main method encounters the statement t3.join(); Suppose that thread t3's run() method has completed running. What happens?
A. The main method waits for all running threads to complete their run() methods before proceeding.
B. The main method waits for any other thread to complete its run() method before proceeding
C. The main method proceeds to the next statement following the t3.join(); statement
D. Thread t 3 is re-started
E. All threads except t3 that are running are terminated

Answers

Answer:

C. The main method proceeds to the next statement following the t3.join(); statement

Explanation:

join() method allows the thread to wait for another thread and completes its execution. If the thread object is executing, then t3.join() will make that t is terminated before the program executes the instruction. Thread provides the method which allows one thread to another complete its execution. If t is a thread object then t.join() will make that t is terminated before the next instruction. There are three overloaded functions.

join()

join(long mills)

join(long millis, int Nanos)

If multiple threads call the join() methods, then overloading allows the programmer to specify the period. Join is dependent on the OS and will wait .

Create a program that will find and display the largest of a list of positive numbers entered by the user. The user should indicate that he/she has finished entering numbers by entering a 0.

Answers

Answer:

This program is written using Python Programming language,

The program doesn't make use of comments (See explanation section for line by line explanation)

Program starts here

print("Enter elements into the list. Enter 0 to stop")

newlist = []

b = float(input("User Input: "))

while not b==0:

    newlist.append(b)

    b = float(input("User Input: "))

newlist.sort()

print("Largest element is:", newlist[-1])

Explanation:

This line gives the user instruction on how to populate the list and how to stop

print("Enter elements into the list. Enter 0 to stop")

This line creates an empty list

newlist = []

This line enables the user to input numbers; float datatype was used to accommodate decimal numbers

b = float(input("User Input: "))

The italicized gets input from the user until s/he enters 0

while not b==0:

    newlist.append(b)

    b = int(input("User Input: "))

This line sorts the list in ascending order

newlist.sort()

The last element of the sorted list which is the largest element is printed using the next line

print("Largest element is:", newlist[-1])

If no other row matches, the router will select the ________ row as its best match. First Last either First or Last, depending on the circumstances neither First nor Last

Answers

Answer:

Last

Explanation:

Routing is a term in engineering which involves the process of selecting a path for traffic in a network or across multiple networks. It is applicable in circuit-switched networks, such as the public switched telephone network (PSTN), and computer networks, such as the Internet. It is mostly used as a term for IP Routing.

Hence, in IP Routing, the first step is comparing the packet's destination IP address to all rows, followed by selecting the nest-match row. However, If no other row matches, the router will select the LAST row as its best match.

A script sets up user accounts and installs software for a machine. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

deployment phase

Explanation:

This specific scenario belongs to the deployment phase of the hardware lifecycle. This phase is described as when the purchased hardware and software devices are deployed to the end-user, and systems implemented to define asset relationships. Meaning that everything is installed and set up for the end-user to be able to use it correctly.

You are scanning a network to ensure it is as secure as possible. You send a TCP probe packet to a host with a FIN flag and receive a RST/ACK response. What does this mean?

Answers

Answer:

Hello your question lacks the required options here are the options

A)This response means the port he is scanning is open.

B)The RST/ACK response means the port Fred is scanning is disabled.

C)This means the port he is scanning is half open.

D) This means that the port he is scanning on the host is closed

answer : This means that the port he is scanning on the host is closed ( D )

Explanation:

When you scan a network to ensure it is secure enough by sending a TCP probe to a host with a FIN flag and you receive a RST/ACK response it means that The port that is been scanned on the host is closed

A TCP scanning/probe involves sending a number of packets to each port that is scanned. when you Compare TCP scanning methods to other methods of scans, a TCP Connect scan is typically slow and methodical.

function of network security​

Answers

Answer:

akbar

Explanation:

Tilak friends had less time to visit him because they no longer next week so They brought Tilak a book about Snow White Cheetah

what do the tags <DT> and <DD> signify ?

pls be quick​

Answers

Hello,

This is in HTML language:

dl for Description List

dd for Description Description

   This tag is used in a description list (<dl>) and it describes a term in this list.

dt for Description Term

   This tag is used to define a term.

For instance,

<dl>

   <dt>Brainly</dt>

   <dd>Best website ever</dd>

</dl>

Hope this helps.



11. Which one of the following buttons is used for paragraph alignment?

Answers

Answer:

C

Explanation:

Option A is used for line spacing.

Option B is used for right indent.

Option C is used for right paragraph alignment.

Option D is used for bullet points.

The button used for paragraph alignment would be option C.

What is the result of giving the which utility the name of a command that resides in a directory that is not in your search path

Answers

Answer and Explanation:

The result of providing the which utility the command name i.e not covered under the search path is as follows

The device that shows a notification that the command you are searching for is not in your query path's directory list. The utility in which no information is shown. Because the search path has always been about which utility therefore it would not be work.

Your mission is to read this uber-classified memo from the Grand Poobah of annan. Of course, it's in code, so you'll need to write a program to decrypt your message. The code is set up so that for the nth element in the array, you will need to read its nth letter. (Ex: if pirates is in array position 0, then print letter 0 of the word, which = p. if gangway is in array position 4, then print letter 4 = w.) To accomplish this, your main function should do the following: a. Declare 4 separate arrays of strings called secrets1, secrets2, secrets3, & secrets4 and assign them the following values: secrets1: { "platypus", "plethora","trend", "croak","almost", "toaster" }; secrets2: _{ "fire", "seen","trend", "produce" }; secrets3: { "tiretread", "chains", "stern", "bed bug" }; secrets4: {"oracle", "stetson","mother", "stie", "twigrot" }; b. Call the function decode 4 times - once for each array variable (secrets1, secrets2, secrets3 & secreets4) from Step a. (You'll have to do this with 4 lines of code; you can't use a loop for it.) c. Write a void function called decode that will i. Accept an array of strings, and the integer array length as the parameters. ii. Read through each word in the array. If the word is in the nth position of the array, then print the nth letter for that word. (For array item 0, print the letter at position 0 in the word. For array item 1, print the letter at position 1 in the word...etc.) Print all of the letters from this array on one line. iii. Print a blank

Answers

Answer:

Following are the code to this question:

#include<iostream>//declaring header file

using namespace std;  

void decode(string* arr, int n)//defining a method decode

{

for(int i = 0; i < n; i++)//defining a loop for print value

{

cout << arr[i][i] << " "; // using print method to print ith letter of the string

}

cout << endl;//line break

}

int main()//defining main method

{

string secret1[] = {"platypus","plethora","trend","croak","almost","toaster"};//defining string arry and assign value

string secret2[] = {"fire","seen","trend","produce"};//defining string arry and assign value

string secret3[] = {"tiretread","chains","stern","bed bug"};//defining string arry and assign value

string secret4[] = {"oracle","stetson","mother","stie","twigrot"};//defining string arry and assign value

decode(secret1, 6);//calling method decode and pass string array and integer number

decode(secret2, 4);//calling method decode and pass string array and integer number

decode(secret3, 4);//calling method decode and pass string array and integer number

decode(secret4, 5);//calling method decode and pass string array and integer number

return 0;

}

output:

Please find the attachment.

Explanation:

In the above C++ language code, a method "decode" is declared that accepts a string array and an integer variable in its parameter, inside the method a for loop is declared, which is used "n" variable to print its [tex]i^{th}[/tex] letter value in the given string value.  

In the main method,  4 string array "secret1, secret2, secret3, and secret4" is declared which assigns some value, and then we call the method "decode" and pass string array value and an integer value in its parameter.

What is the value of the totalsString variable after the following code is executed? var totals = [141.95, 212.95, 411, 10.95]; totals[2] = 312.95; var totalsString = ""; for (var i = 0; i < totals.length; i++) { totalsString += totals[i] + "|"; }

Answers

Answer:

141.95|212.95|312.95|10.95|

Explanation:

Reformatting the code snippet and giving it line numbers;

1.       var totals = [141.95, 212.95, 411, 10.95];

2.      totals[2] = 312.95;

3.      var totalsString = "";

4.      for (var i = 0; i < totals.length; i++) {

5.          totalsString += totals[i] + "|";

6.      }

Line 1 creates an array called totals with four elements.

     First element = totals[0] =141.95

     Second element = totals[1] = 212.95

     Third element = totals[2] = 411

     Fourth element = totals[3] = 10.95

Line 2 replaces the value of the third element totals[2] = 411 with 312.95.

     Therefore the array totals = [141.95, 212.95, 312.95, 10.95]

Line 3 creates an empty string called totalsString

Lines 4 - 6 create a for loop that cycles from i=0 to i<totals.length

       totals.length = 4 (which is the number of items in the array totals)

       This means that the loop cycles from i=0 to i<4

       During cycle 1 when i = 0, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[0] + "|"   //substitute the values

            totalsString = "" + 141.95 + "|"

            totalsString = 141.95|

       During cycle 2 when i = 1, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[1] + "|"   //substitute the values

            totalsString = "141.95|" + 212.95 + "|"

            totalsString = 141.95|212.95|

       During cycle 3 when i = 2, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[2] + "|"   //substitute the values

            totalsString = "141.95|212.95|" + 312.95 + "|"

            totalsString = 141.95|212.95|312.95|

       During cycle 4 when i = 3, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[3] + "|"   //substitute the values

            totalsString = "141.95|212.95|312.95|" + 10.95 + "|"

            totalsString = 141.95|212.95|312.95|10.95|

At the end of the execution, totalsString = 141.95|212.95|312.95|10.95|

Write a Java application with a main() to find the two largest distinct integers entered on the command line by the user. We are just creating a simple stand-alone application. All your code can be in main().

Answers

Answer:

import java.util.Scanner; // Scanner class is to use input output functions

public class TwoDistinctLargest //class to find two distinct largest nos

{

public static void main(String[] args) { //start of main() function

Scanner input = new Scanner(System.in); // creates Scanner type object

       int integers = 0, largest1 = 0, largest2 = 0; // declare variables

/* integers holds the input integer values, largest1 has 1st largest number and largest 2 contains second distinct largest number, i is used as the count variable to move through the input integers */

       int i = 0;  

//prompts user to enter integers and enter 0 to stop

       System.out.println("Enter the integers (press 0 to stop): ");

       integers = input.nextInt(); //reads and scans input integers

       while(integers != 0) {

/* the loop keeps taking integer values from user until the value of integers is equal to 0, this means until the user enters 0 */

//checks if the value of integer is greater than first largest computed number

           if(integers > largest1) {

//if the value in largest1 is greater than that of largest2

               if(largest1 > largest2) {

                   largest2 = largest1; } // then value of largest1 is set to largest2                

               largest1 = integers; // largest1 now holds the value of integers //which means largest1 holds the first distinct largest integer

           } else { //checks if the value of integers is greater than largest2

               if(integers > largest2) {

//if the value of integers is not equal to that of largest1

                   if(integers!=largest1)  {

// set the value of second distinct largest number to largest2

                   largest2 = integers;}              }            }

                     i++; //keeps moving to the next input integer

           integers = input.nextInt();     //keeps taking input integers    }      

//prints the two distinct largest integers

       System.out.println("\n The 1st largest distinct integer is " + largest1);

       System.out.println("\n The 2nd largest distinct integer is " + largest2); } }

Explanation:

Lets suppose the user inputs the following integers

1, 6, 5, 6, 0

Initial values are:

integers = 0

largest1 = 0

largest2 = 0

i = 0

When the user enters 1, then value of integers = 1

while loop checks if integers!=0. As integers =1 so the program enters the body of while loop. The first IF condition is checked if(integers > largest1)

As largest1 = 0 and integers =1 so this condition evaluates to true as 1 > 0

So the statements in the body of this IF condition are executed. This if conditions contains another if statement if(largest1 > largest2) which checks if the value largest1 is greater than that of largest2. Its false because largest1 =0 and largest2 =0 so largest1 = largest2, so the statement of this if condition body will not execute and program moves to this                 largest1 = integers; statement which sets the value of integers i.e. 1 to largest1. So the value of largest1 = 1

Now the i is incremented by 1 and it points at second value of integers= 6.

while loop checks if integers!=0. As integers =6 so the program enters the body of while loop. The first IF condition is checked if(integers > largest1)

As largest1 = 1 and integers =6 so this condition evaluates to true as 6>1

So the statements in the body of this IF condition are executed. This if conditions contains another if statement if(largest1 > largest2) which checks if the value largest1 is greater than that of largest2.

Its true because largest1 =1 and largest2 =0 so largest1 > largest2, so the next statement is executed largest2 = largest1; So now the value of largest2=1.

Now program moves to this largest1 = integers; statement which sets the value of integers i.e. 6 to largest1. So the value of largest1 = 6

Now the i is incremented by 1 and it points at second value of integers= 5.

while loop condition is again true. IF condition is checked if(integers > largest1)

As largest1 = 6 and integers =5 so this condition evaluates to false as 5<6. So this IF part will not execute and program control moves to the else part.

Else part has an if condition if(integers > largest2) which evaluates to true because integers = 5 and largest2 = 1 so the program moves to next if statement inside the previous if statement of else part i.e. if(integers!=largest1). This if statement is the main statement which will help in finding two distinct largest numbers in case the same largest value is input more than once. It checks If the value of integers is not equal to largest1 value. As integers = 5 and  largest1 = 6 so this if condition is true. If this condition is not used in this program then largest2 will not be assigned distinct largest values but assigned 6 for both largest1 and largest2 as 6 is input twice. Next this if statement  largest2 = integers assigns value of integers to largest2 which is the second largest distinct integer.

Now the i is incremented by 1 integers value become 0.

while loop checks if integers!=0. As integers =0 so the while loop breaks. The last two print statements which produce following output.

The 1st largest distinct integer is: 6

The 2nd largest distinct integer is: 5

The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of data communications?

Answers

Answer:

Explanation:

In data communications, a protocol is connectionless if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as unreliable protocol. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is connection-oriented. An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

What is computer engineering in your own words?

Answers

Answer: Computer engineering refers to the study that integrates digital engineering with computer sciences to design and develop computer structures and different technological gadgets.

Explanation:

Answer:

Computer engineering is the branch of engineering that integrates electronic engineering with computer sciences. Computer engineers design and develop computer systems and other technological devices.

Write a program that first reads in the name of an input file and then reads the file using the csv.reader() method. The file contains a list of words separated by commas. Your program should output the words and their frequencies (the number of times each word appears in the file) without any duplicates.

Answers

Answer:

Here is the Python code.

import csv  

inputfile = input("Enter name of the file: ")

count = {}

with open(inputfile, 'r') as csvfile:

 csvfile = csv.reader(csvfile)

 for line in csvfile:

   for words in line:

     if words not in count.keys():

       count[words] = 1

     else:

         count[words] + 1

   print(count)

Explanation:

I will explain the code line by line.

import csv   here the css is imported in order to read the file using csv.reader() method

inputfile = input("Enter name of the file: ")  This statement takes the name of the input file from the user

count = {}  this is basically a dictionary which will store the words in the file and the number of times each word appears in the file.

with open(inputfile, 'r') as csvfile:  This statement opens the inputfile using open() method in read mode. This basically opens the input file as csv type

 csvfile = csv.reader(csvfile)  This statement uses csv.reader() method to read the csv file contents.

for line in csvfile:  This outer for loop iterates through each line of the file

for words in line:  This inner loop iterates through each word in the line

if words not in count.keys():  This if condition checks if the word is not in the dictionary already. The dictionary holds key value pair and keys() method returns a list of all the keys of dictionary

count[words] = 1  if the word is not present already then assign 1 to the count dictionary

co unt[words] + 1 if the word is already present in dictionary increment count of the words by 1. Suppose the input file contains the following words:

hello,cat,man,hey,dog,boy,Hello,man,cat,woman,dog,Cat,hey,boy

Then because of co unt[words] + 1 statement if the word appears more than once in the file, then it will not be counted. So the output will be:

{' cat': 1, ' man': 1, ' dog': 1, ' woman': 1, ' Hello': 1, ' hey': 1, ' boy': 1, 'hello': 1, ' Cat': 1}

But if you want the program to count those words also in the file that appear more than once, then change this co unt[words] + 1 statement to:  

count[words] = count[words] + 1

So if the word is already present in the file its frequency is increased by 1 by incrementing 1 to the count[words]. This will produce the following output:

{' Cat': 1, ' cat': 2, ' boy': 2, ' woman': 1, ' dog': 2, ' hey': 2, ' man': 2, ' Hello': 1, 'hello': 1}  

You can see that cat, boy, dog and hey appear twice in the file.                    

print(count) This statement prints the dictionary contents with words and their frequencies.

The program with its output is attached.

The program is an illustration of file manipulations.

File manipulations involve reading from and writing into files.

The program in Python, where comments are used to explain each line is as follows:

#This imports csv module

import csv  

#This initializes a dictionary

kounter = {}

#This gets input for the file name

fname = input("Filename: ")

#This opens and iterates through the file

with open(fname, 'r') as cfile:

   #This reads the csv file

   cfile = csv.reader(cfile)

   #This iterates through each line

   for line in cfile:

       #This iterates through each word on each line

       for words in line:

           #This counts the occurrence of each word

           if words not in kounter.keys():

               kounter[words] = 1

           else:

               kounter[words] + 1

#This prints the occurrence of each word

print(kounter)

Read more about similar programs at:

https://brainly.com/question/14468239

The technology environment would include studies of family changes. social engineering. information technology. minimum wage laws. customer service.

Answers

Question:

The technology environment would include studies of:

A) family changes

B) social engineering

C) information technology

D) minimum wage laws

E) customer service

Answer:

The correct answer is Information Technology (C)

Explanation:

Information and communications technology (ICT) or Information Technology. Whenever the technology environment is under discourse, these are usually the predominant subject matter.

It doesn't come as a surprise given that we live in an information age. An era of the internet of things. If we are tending towards an era where every equipment and even most biological species will give off and receive data, then a technology environment is really predominantly IT.

Cheers!


21. The quality of worth or merit, excellence and importance; custom or
ideal that people desire as an end, often shared within a group.
*

Answers

Answer:

Goals

Explanation:

Interestingly, the term goals refers to a perceived future a certain individual or group of individuals are hopeful for, or better still it could be an expectation of improved quality of worth or merit, excellence and importance; custom or ideals that people desire as an end, often shared within a group.

Remember, goals are desired end, achieved as a result of deliberate action or actions towards attaining it.

Write the definition of the function displaySubMenu that displays the following menu; this function doesn't collect the user's input; only display the following menu:
[S]top – Press 'S' to stop.

Answers

Answer:

Using Python:

def displaySubMenu():

   print("[S]top – Press ‘S’ to stop.")

Using C++ programming language:

void displaySubMenu(){

cout<<"[S]top – Press ‘S’ to stop.";}

Explanation:

The function displaySubMenu() has a print statement that prints the following message when this function is called:

[S]top – Press 'S' to stop.

You can invoke this function simply by calling this function as:

displaySubMenu()

The function doesn't take any input from the user and just displays this message on output screen whenever this function is called.

In C++ you can simply call the function using following statement:

void main(){

displaySubMenu(); }

Why can’t Java methods change parameters of primitive type? Java methods can have no actual impact on parameters of any type. Parameters of primitive type are considered by Java methods to be local variables. Parameters of primitive type are immutable. Java methods cannot accept parameters of primitive type.

Answers

Answer:

Parameters of primitive type are considered by Java methods to be local variables.

Explanation:

The parameters in JAVA are passed by value only. This means a parameter is considered to be local and a copy of the value is created used locally.

So if you change parameters of the primitive type so the value you change is local to the method. This implies that a copy of the parameter is made and the changes made on this copy will not affect the argument's value. In a nut shell, the parameters of primitive type are considered by Java methods to be local variables.

The data date is:________
a. The date all information was entered in the computer.
b. The date the scheduler produces new reports.
c. The date as of which all progress on a project is reported
d. The date actual work took place.

Answers

Answer:

c. The date as of which all progress on a project is reported

Explanation:

In construction scheduling, data date (DD), also known in MS Project as Status Date is used to update the periodic schedule. The data date is usually set at month-end or towards the month-end. It is required that all activities prior to the data date are completed and no work is reported as not completed or in-progress.

Appropriate information on the details of the project and accomplishments should be updated before the data date. After the data date, what follows should be the implementation of the remaining part of the project. The data date is also called the as-of date and time-now date.

Write a date transformer program using an if/elif/else statement to transform a numeric date in month/day format to an expanded US English form and an international Spanish form; for example, 2/14 would be converted to February 14 and 14 febrero

Answers

I wrote it in Python because it was quick so i hope this is helpful

Answer:

date = input('Enter Date: ')

split_date = date.split('/')

month = split_date[0]

day = split_date[1]

if month == '1':

   english_month = 'January'

   spanish_month = 'Enero'

elif month == '2':

   english_month = 'February'

   spanish_month = 'Febrero'

elif month == '3':

   english_month = 'March'

   spanish_month = 'Marzo'

elif month == '4':

   english_month = 'April'

   spanish_month = 'Abril'

elif month == '5':

   english_month = 'May'

   spanish_month = 'Mayo'

elif month == '6':

   english_month = 'June'

   spanish_month = 'Junio'

elif month == '7':

   english_month = 'July'

   spanish_month = 'Julio'

elif month == '8':

   english_month = 'August'

   spanish_month = 'Agosto'

elif month == '9':

   english_month = 'September'

   spanish_month = 'Septiembre'

elif month == '10':

   english_month = 'October'

   spanish_month = 'Octubre'

elif month == '11':

   english_month = 'November'

   spanish_month = 'Noviembre'

elif month == '12':

   english_month = 'December'

   spanish_month = 'Diciembre'

US_English = f'{english_month} {day}'

International_Spanish = f'{day} {spanish_month}'

print(f'US English Form: {US_English}')

print(f'International Spanish Form: {International_Spanish}')

Input:

3/5

Output:

US English Form: March 5

International Spanish Form: 5 Marzo

Explanation:

You start by taking input from the user then splitting that at the '/' so that we have the date and the month in separate variables. Then we have an if statement checking to see what month is given and when the month is detected it sets a Spanish variable and an English variable then prints it to the screen.

Hope this helps.

Other Questions
Which best explains why a firework being ignited is an example of an exothermic reaction and not an endothermic reaction?A)The fireworks produce colors.B)The fireworks give off heat.C)Igniting the fireworks requires energyD)Igniting the fireworks makes an odor. Can someone answer these questions? which sentence in the passage provides plot details that cannot be inferred from the images? Laurie lay luxuriously swinging to and fro in his cozy hammock which was tled to a tree, one warm September afternoon, wondering what hisneighbors were doing, but too lazy to go and find out. He was in one of his moods, for the day had been both unprofitable and unsatisfactory,and he was wishing he could live it over again. Staring up at the sky, he dreamed dreams of all sorts, when the sound of voices brought him outof his reverle. Looking through the meshes of the hammock, he saw Meg, Beth, Amy, and Jo, the March Sisters coming out as if bound on someexpedition.Laurie wondered what the girls were doing, as he opened his sleepy eyes to take a good look, fothere was something rather peculiar in theappearance of his neighbors. Each wore a large, flapping hat, a brown linen pouch slung over one shoulder and carried a long staff. Meg had acushion, Jo a book, Beth a basket, and Amy a sketchbook. All walked quietly through the garden, out at the little back gate, and began to climbthe hill that lay between the house and river.He was disappointed because it looked like they were having a picnic and hadn't bothered to invite him. He decided to go up the hill aswell."Here's a landscapel" thought Laurie, glancing through the bushes, and looking wide-awake and good-natured already, when he reachedthe spot where they were sitting.It was rather a pretty little picture; for the sisters sat together in the shady nook, with sun and shadow flickering over them, the aromatic windlifting their hair and cooling their hot cheeks. Meg sat upon her cushion, sewing daintily looking as fresh and sweet as a rose, in her pink dress,among the green.Beth was sorting the cones that lay thick under the hemlock nearby, for she made pretty things of them. Amy was sketching agroup of ferns, and so was knitting as she read aloud. The boy wondered if he should walk away as he did not want to force his presence onthem. Since he was not paying attention to his whereabouts, he skipped back when a squirrel darted in front of him causing Beth to look up. Shenoticed the wistful face behind the birches and beckoned with a reassuring smile. ART D: THINKING17Solve for x in the following diagram. Make sure to show all your work and clearly label yourdiagram with any missing information.E65PP55Yye52 m701151BAds*** ialWhat should be her first step?isolating the constant 1adding 4 to both sides of the equationO isolating the second term, -4xO adding 1 to both sides of the equation Write an equation and solve.Eleven more than 4 times a number is 39.The equation is _____ The solution is _____(Type an equation using x as the variable.) The temperature of liters of a ideal gas was increased from 600 to 800 kelvins. If the volume remained constant and the final pressure was 30 atmospheres, what was the initial pressure? Of the last 100 customers entering a computer shop, 25 have purchased a computer. If the relative frequency method for computing probability is used, the probability that the next customer will purchase a computer is If a cone is 5 meters tall and has a radius of 3 meters, What is its volume? 15 m360 m345 m330 m3 "If a person receives the chemical L-dopa, a precursor of dopamine, it reduces the symptoms of Parkinson's disease. However, L-dopa may increase symptoms of schizophrenia. What might one reasonably conclude from this? Give examples that proves that the Civil War played a role in advancing US industrial progress. One key aspect of the Magna Carta was ?? Which is true of the crop lien system of the 1880? WILL GIVE BRAINLIEST!!! 30 POINTS!!! TAKES LESS THAN 7 MINUTES!!! Your goal is to try to figure out what the main idea or theme could possibly be of "The Red Studio". There is not necessarily a right answer for this! What you have to do is write out 1-2 sentences that explain what you think the theme is, and then at least 5 words or phrases that lead you towards that idea. Write out your 1-2 sentences explaining your theme and include at least 5 words or phrases that you feel support your conclusion. Describe how to transform the graph of f(x) = x* to obtainthe graph of the related function g(x) = f(-4(x - 3)) + 1.Then draw the graph of g(x). Describe how to check food cans and jars for possible contamination of botulism Timed 5 minutes Please How do I solve this? I'm confused Find the value of sin x and cos y What should you do in case of credit card fraud? How are project deliverables determined? Which table represents a linear function?