Write a program that prompts for a file name, then opens that file and reads through the file DNSList.txt, looking for lines of the form: Location: France Count the number of DSN server from each country. Once you have accumulated the counts for each name, print out the counts, sorted by name. For example, enter a file name “DNSList.txt" or leave it blank and match the output below. Enter file:DNSList.txt DNS server list: Country Count Brazil 1 France 6 India 1 United
Q: N (-1)" 7=4 1)" 2n +1 n=0
A: Given series as,
Q: Outsourcing should be explained.
A: Intro the above question is about Outsourcing should be explained.
Q: Illustrate the application of generalization and specialization principles to identify super class a...
A: In ER model concept, Generalization and Specialization are utilized for information reflection in wh...
Q: 9. Write an assembly code to implement the following function on ARM architecture. 2n * R2 A =
A: Input : Input R Input b Output : Value of A
Q: Question 2 1- Add the following (98A8)h + (A8B9)h 2- Using First complement, Find (621)o - (211)h 3-...
A: As per our policy we can only solve first three sub questions , Please post other questions separate...
Q: Evaluate each binary question and determine which one is out of sequence 9. 1010 in binary is ____ ...
A: answer is
Q: What would cause the current instruction to be reset if there was a problem?
A: Introduction: A page fault is a term used to describe memory pages, and when a user requests that th...
Q: Create a function that removes the correct members from the input. Use the following examples to unl...
A: Algorithm: Firstly we will take the string as an function arguments then we will split the string w...
Q: Which of the following is the correct way to perform matrix multiplication between matrices x and y?...
A: Please upvote me please I am providing you the answers to your questions. Answer 6) dot(x,y) ...
Q: Differentiate between the different types of object classes?
A: Object classes are used to indicate what type of object is represented by an entry and to specify th...
Q: Write a program in HACK assembly, without using symbols, that computes the bitwise exclusive or (XOR...
A: Lets see the solution in the next steps
Q: What exactly is the connection between datasets and information literacy?
A: Introduction: Datasets and information literacy: a link
Q: H.W Find the Adjoint to the following matrix -2 Y = 1 4 5 1 3. 2.
A: Here, we are going to find out adjoint matrix for the given 3x3 matrix.
Q: Create a task that takes a series of words and returns the highest score of goals. Each letter of th...
A: Algorithm: Firstly we will take the input form the user or some fix string Then we will run a ragex ...
Q: Discuss the significance of MAR and MDR in the context of interruptions.
A: Intro the above question is about significance of MAR and MDR in the context of interruptions
Q: What is the theta notation of f (n) +g (n)? f (n) = 0 (1) 9 (n) = e (n') O (n²) e (n) O 0 (n) O e (n...
A: Given theta functions are f(n) = Theta(1) g(n) = Theta(n²)
Q: What is the definition of a base class access specification?
A: Intro the above question is about What is the definition of a base class access specification ...
Q: Create a function that takes a mathematical expression in prefix notation as a string and evaluates ...
A: Algorithm EVALUATE_PREFIX(STRING) Step 1: Put a pointer P at the end of the end Step 2: If characte...
Q: What are the key differences between services and software components?
A: Intro the above question is about differences between services and software components
Q: urve, you can guess, 2 or 3 different numbers of clusters, depending on how the elbow bends ( the sh...
A: Given as,
Q: What is the significance of kernel mode in operating systems?
A: Introduction: User mode and kernel mode are the two operating system modes.
Q: 2. Write a JAVA program to input 2 strings, s1, and s2, return a new string made of the first char o...
A: The Java code along with the snapshot of code and output is given below:
Q: What does it mean to have a handshaking protocol?
A: Here the term handshaking refers to computer handshaking.
Q: ### Problem 1 Consider the following algorithm to check connectivity of a graph defined by its adjac...
A: Note- As per the Bartleby process we have to attempt only one question. Functioning: The algorith...
Q: H.W Find the Adjoint to the following matrix 0.5 0.2 -0.1 X = 0.9 0.7 -0.6 -0.4 -1
A: Here in this question we have asked to find adjoint of the given matrix.
Q: JOY is a CS (B.TECH) student and now has days she wants to work on marketing. AND you are trying to ...
A: Used to perform large tasks (think thousands or millions of records!) That will exceed the normal pr...
Q: G) 15th Complement for (115)o H) 8th Complement for (96)h
A: G) Given number is, (115)o That means 115 is a octal number. The equivalent Hexadecimal number for 1...
Q: Describe the fundamental structures in an operating system that govern file organisation.
A: Here we are required to explain the fundamental structures in an operating system that govern file o...
Q: PYTHON PROGRAMMING!! EXTRA CONSTRAINT: MAKE SURE THAT THE CODE ACCEPTS THE INPUT ON THE IMAGE AND O...
A: as per requirement i use PYTHON language to solve the problem... arrow_forwardcopy to code: #python ...
Q: Create a structure to hold 100 students' roll numbers, scores, names, ages, and addresses. Another u...
A: Introduction: Approach: Here, the array of the Student structure is created to store information of ...
Q: A method defined within a class and whose header does NOT include the static modifier is known as wh...
A: A class is a collection of methods and members and there are various types of methods and let's expl...
Q: What exactly are CASE tools? What exactly is a CASE repository, and how does it work?
A: Intro the above question is about what exactly are CASE tools What exactly is a CASE repository, and...
Q: What are the prerequisites and/or steps that must be completed in order to develop a proof of concep...
A: 5 Steps to a Proof of Concept for Successful Software Development.
Q: Describe the life cycle of information systems development (SDLC).
A: INTRO the above question is about SDLC system development life cycle.
Q: 5 Please convert the following C/C++ function to RISC-V assembly (RV321).
A: Swap -> void swap(int v[], int k) { int temp; temp = v[k]; v[k] = v[k+1]; v[k+1] = temp; } Cover...
Q: 1) What is the difference between the status and control flags? What are the status flags for the AE...
A: As per our policy, "Since you have asked multiple questions, we will solve the first question for yo...
Q: Please do not use "def" or "display" and use only input/output, conditionals (if, elif, else) and it...
A: we will write a program in Python to check whether the input number is prime or not and it is multip...
Q: Computer science Discuss the importance of testability and provide an overview of the compiler.
A: Introduction: Testability Suggestions The whole testability advice is as follows: 1. Make use of eup...
Q: What are the advantages of better customer service?
A: Customer service- It is the services provided by a product seller to the customer during the entire ...
Q: (p q) v (p r) is logically equivalent to 2020 a.p- (q v r) b. p v (q A r) c.pA (q v r) d. p - (q Ar)
A: Here, we are going to check logically equivalent statement for the given logic statement. We can che...
Q: Packets are sent and received by internet service providers. These packets contain the communication...
A: INTRODUCTION: Internet service providers use packets to send and receive data. These packets contain...
Q: the Email application
A: Structure of an email Email contents classified as two, the header and the body. The Header ...
Q: What exactly is the NetBeans IDE?
A: Given :- What exactly is the NetBeans IDE?
Q: What is the UNC path to a shared folder format? What distinguishes this from the drive letter and pa...
A: Before you can connect to the share you will need to know the following information: Server Name Sh...
Q: Explain why you would wish to use lightweight graphics on certain Web sites while using highly detai...
A: The use of graphics in web pages depending upon the scenario has been explained briefly below
Q: Why does the cancel button in a dialogue box appear to be unresponsive on so many systems? What comp...
A: Introduction: Why does the cancel button in a dialogue box appear to be unresponsive on so many syst...
Q: Write a complete Fortran program that asks three real numbers from the user, calculate the sum and t...
A: Your FORTRAN program is given below with an output.
Q: What table might the database need to help determine the balance field in the Patient table? Would y...
A: The database is a collection of interrelated data. In the Sports physical therapy database, there ar...
Q: JOY is a CS (B.TECH) student and now has days she wants to work on marketing. AND you are trying to ...
A: Introduction: It is used to perform large tasks (think thousands or millions of records!) That will ...
Q: Explain the distinction between the linear search and the binary search.
A: Introduction the question is about the difference between the linear search and the binary search a...
Python
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 1 images
- Write a program that queries information from three files(given to you). The first file contains the names and telephone numbers of a group of people. The second file contains the names and Social Security numbers of a group of people. The third file contains the names and annual income of a group of people. The groups of people should overlap. Your program should ask the user for a telephone number and then print the name, Social Security number, and annual income, if it can determine that information. Sample run1: Enter the phone number (7 digits, with a dash): 555-1234 555-1234 is associated with Bob Bob's SSN is 000300021 Bob's salary is 55000 Sample run2: Enter the phone number (7 digits, with a dash): 675-4566 Couldn't find a name associated with that number. Sample run3: Enter the phone number (7 digits, with a dash): 000-2345 000-2345 is associated with John John's SSN is 000000004 John's salary is 65000 python languageIn Java Write a program that reads the student information from a tab separated values (tsv) file and creates a text file that contains student information together with the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20. The program performs the following tasks: A: 90 =< x B: 80 =< x < 90 C: 70 =< x < 80 D: 60 =< x < 70 F: x < 60 Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt. Output one student per row and separate the values with a tab character. Ex: If the input of the program is: StudentInfo.tsv and the contents of StudentInfo.tsv are: Barrett Edan 70 45 59 Bradshaw Reagan 96 97 88 Charlton Caius 73 94 80 Mayo Tyrese 88 61 36 Stern Brenda 90 86 45…You are a cyber investigator, your task is to write a python program that can read file signatures from a file and save them into a list. Each file signature is an element of your list. Then, try to find out if there is a JPG file in there. If there is a JPG file, print out a True on screen. (File Signature for JPG file is: FF D8 FF DB) The input file is: FSCS360_Midterm_Exam_Part2.txt
- Given a list of employees, create JAVA a simple program that allows the user to insert, delete, display,and search an employee. The program should input 10 full names of employees with employeenumber as linked list. Also, a list of menus should be displayed.These menus are Insert, Delete, Display and Search.A. Insert - allows the user to insert one employee at a time with corresponding ID numberwhich serves as their link. All employees to be inserted must be inserted at theend of the list. B. Delete – allows the user to delete the employee from the listC. Display – allows the user to display the list of employeesD. Search - allows the user to find a certain employeeThese menus should be in loop once you test every operation based on the listed menu. Use linked list as a data structure in generating a list of employees, andPerform basic operations that can be applied in a linked listTask Write a program that can dynamically change the font of a text in a label displayed on a stack pane. The text can be displayed in bold and italic at the same time. You can select the font name or font size from combo boxes. The available font names can be obtained using Font getFontNames(). The combo box for the font size is initialized with numbers from 1 to 100. Lab22 Font Name Comic Sans MS Font Size 30 Programming is fun Bold ItalicThe history teacher at your school needs help in grading a True/False test. The students’ IDs and test answers are stored in a file. The first entry in the file contains answers to the test in the form:TFFTFFTTTTFFTFTFTFTTEvery other entry in the file is the student ID, followed by a blank, followed by the student’s responses. For example, the entry:ABC54301 TFTFTFTT TFTFTFFTTFTindicates that the student ID is ABC54301 and the answer to question 1 is True, the answer to question 2 is False, and so on. This student did not answer question 9. The exam has 20 questions, and the class has more than 150 students. Each correct answer is awarded two points, each wrong answer gets one point deducted, and no answer gets zero points. Write a program that processes the test data. The output should be the student’s ID, followed by the answers, followed by the test score, followed by the test grade. Assume the following grade scale:90%–100%, A; 80%–89.99%, B; 70%–79.99%, C; 60%–69.99%, D; and…
- You have been hired at an open-air mine. You are to write a program to control a digger. For your task, you have been given a `map' of all the underground resources in the mine. This map comes as a file. The file has n rows. Each row has n space-separated integers. Each integer is between zero and one hundred (inclusive). The file should be understood to represent a grid, n wide by n deep. Each square in the grid can contain valuable resources. The value of these resources can go from zero (no resources) to 100 (max resources). The grid maps the resources just below the surface, and down to the lowest diggable depths. The digger starts at the surface (so, just on top of the topmost row in the grid)—at any horizontal position between 1 and n. The digger cannot dig directly downwards, but it can dig diagonally in either direction, left-down, or right-down. In its first time-step, it will dig onto the first row of the grid. In its second time-step, it'll hit the second row, and so on.…You have been hired at an open-air mine. You are to write a program to control a digger. For your task, you have been given a `map' of all the underground resources in the mine. This map comes as a file. The file has n rows. Each row has n space-separated integers. Each integer is between zero and one hundred (inclusive). The file should be understood to represent a grid, n wide by n deep. Each square in the grid can contain valuable resources. The value of these resources can go from zero (no resources) to 100 (max resources). The grid maps the resources just below the surface, and down to the lowest diggable depths. The digger starts at the surface (so, just on top of the topmost row in the grid)—at any horizontal position between 1 and n. The digger cannot dig directly downwards, but it can dig diagonally in either direction, left-down, or right-down. In its first time-step, it will dig onto the first row of the grid. In its second time-step, it'll hit the second row, and so on.…You have been hired at an open-air mine. You are to write a program to control a digger. For your task, you have been given a `map' of all the underground resources in the mine. This map comes as a file. The file has n rows. Each row has n space-separated integers. Each integer is between zero and one hundred (inclusive). The file should be understood to represent a grid, n wide by n deep. Each square in the grid can contain valuable resources. The value of these resources can go from zero (no resources) to 100 (max resources). The grid maps the resources just below the surface, and down to the lowest diggable depths. The digger starts at the surface (so, just on top of the topmost row in the grid)—at any horizontal position between 1 and n. The digger cannot dig directly downwards, but it can dig diagonally in either direction, left-down, or right-down. In its first time-step, it will dig onto the first row of the grid. In its second time-step, it'll hit the second row, and so on.…
- You have been hired at an open-air mine. You are to write a program to control a digger. For your task, you have been given a `map' of all the underground resources in the mine. This map comes as a file. The file has n rows. Each row has n space-separated integers. Each integer is between zero and one hundred (inclusive). The file should be understood to represent a grid, n wide by n deep. Each square in the grid can contain valuable resources. The value of these resources can go from zero (no resources) to 100 (max resources). The grid maps the resources just below the surface, and down to the lowest diggable depths. The digger starts at the surface (so, just on top of the topmost row in the grid)—at any horizontal position between 1 and n. The digger cannot dig directly downwards, but it can dig diagonally in either direction, left-down, or right-down. In its first time-step, it will dig onto the first row of the grid. In its second time-step, it'll hit the second row, and so on.…Write a JAVA program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20. Assume also the last names and first names do not contain whitespaces. The program performs the following tasks: Read the file name of the tsv file from the user. Open the tsv file and read the student information. Compute the average exam score of each student. Assign a letter grade to each student based on the average exam score in the following scale: A: 90 =< x B: 80 =< x < 90 C: 70 =< x < 80 D: 60 =< x < 70 F: x < 60 Compute the average of each exam. Output the last names, first names, exam scores, and letter grades of the…Write a program called a2_q1.py that asks the user (business owner) for their product information and creates an electronic list (e-list) of items. In part-2 of this assignment, customers should be able to use this e-list to purchase multiple products of varying quantities while products are available in stock. Your program should start by asking the business owner's name (string) and the name of the company (string). Next, it should ask for three (3) product names (strings), their unit prices (floats), and the total number of products in stock (ints). Finally, it should display the list of items. Below is a sample run of the program that demonstrates how your output could look (user input is highlighted for emphasis): Sample output (user input is highlighted for emphasize): Please enter your name >> Bond Hi Bond, please enter your company name >> Mart 007 Let's setup a sales menu for 'Mart 007'. Enter item 1's name >> Spiked Umbrella Enter item 1's unit price >> 7.25 Enter item 1's…