Answer:
Here is the Python function readList:
def readList(filename): #function definition of readList that takes a filename as a parameter and returns a list of integers in the file
list = [] # declares an empty list
with open(filename, 'r') as infile: # opens the file in read mode by an object infile
lines = infile.readlines() # returns a list with each line in file as a list item
for line in lines: #loops through the list of each line
i = line[:-1] # removes new line break which is the last character of the list of line
list.append(i) # add each list item i.e. integers in the list
return list #returns the list of integers
#in order to check the working of the above function use the following function call and print statement to print the result on output screen
print(readList("file.txt")) #calls readList function by passing a file name to it
Explanation:
The program is well explained in the comments mentioned with each line of the code.
The program declares an empty list.
Then it opens the input file in read mode using the object infile.
Next it uses readLines method which returns a list with each line of the file as a list item.
Next the for loop iterates through each item of the file which is basically integer one per line
It adds each item of list i.e. each integers in a line to a list using append() method.
Then the function returns the list which is the list of integers in the file.
The program along with it output is attached. The file "file.txt" contains integers 1 to 8 one per line.
You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday. While troubleshooting his computer, you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem
Answer:
the issued Automatic Private IP Addressing (APIPA) address.
Explanation:
Since we are told that the user was able to access the network resources yesterday, and all the network equipment in the user's computer is functioning properly, there is a very high possibility that because the user's computer has been issued an Automatic Private IP Addressing (APIPA) address, it affected his computer's ability to connect to a public network.
This is the case because private network IP addresses are known to prevent inflow and outflow of data onto public networks.
Write an interactive program to calculate the volume and surface area of a three-dimensional object.
Answer:
I am writing a Python program:
pi=3.14 #the value of pi is set to 3.14
radius = float(input("Enter the radius of sphere: ")) #prompts user to enter the radius of sphere
surface_area = 4 * pi * radius **2 #computes surface area of sphere
volume = (4.0/3.0) * (pi * radius ** 3) #computes volume of sphere
print("Surface Area of sphere is: ", surface_area) #prints the surface area
print("Volume of sphere is: {:.2f}".format(volume)) #prints the volume
Explanation:
Please see the attachment for the complete interactive code.
The first three lines of print statement in the attached image give a brief description of the program.
Next the program assigns 3.14 as the value of π (pi). Then the program prompts the user to enter the radius. Then it computes the surface area and volume of sphere using the formulas. Then it prints the resultant values of surface area and volume on output screen.
The psuedocode for this program is given below:
PROGRAM SphereVolume
pi=3.14
NUMBER radius, surface_area, volume
INPUT radius
COMPUTE volume = (4/3) * pi* radius ^3
COMPUTE surface_area = 4 * pi * radius ^ 2
OUTPUT volume , surface_area
END
Write a CashRegister class that can be used with the RetailItem class that you wrote in Chapter 6's Programming Challenge 4. The CashRegister class should simulate the sale of a retail item. It should have a constructor that accepts a RetailItem object as an argument. The constructor should also accept an integer that represents the quantity of items being purchased. In addition, the class should have the following methods:
• The getSubtotal method should return the subtotal of the sale, which is the quantity multiplied by the price. This method must get the price from the RetailItem object that was passed as an argument to the constructor.
• The getTax method should return the amount of sales tax on the purchase. The sales tax rate is 6 percent of a retail sale.
• The getTotal method should return the total of the sale, which is the subtotal plus the sales tax.
Demonstrate the class in a program that asks the user for the quantity of items being purchased and then displays the sale’s subtotal, amount of sales tax and total.
Answer:
Following are the code to this question:
import java.util.*; //import package for user input
class RetailItem//defining class RetailItem
{
private String desc;//defining String variable
private int unit;//defining integer variable
private double prices;//defining double variable
RetailItem()//defining default Constructor
{
//Constructor body
}
Output:
The Sub Total value: 199.75
The Sales Tax value: 11.985
The Total value: $211.735
Explanation:
In the above code three class "RetailItem, CashRegister, and Main" is defined, in the class "RetailItem", it defines three variable that is "desc, unit, and prices", inside the class "get and set" method and the constructor is defined, that calculates its value.
In the next step, class "CashRegister" is defined, and inside the class parameterized constructor is defined, which uses the get and set method to return its value.
In the next step, the main class is declared, in the main method two-class object is created and calls its method that are "getSubtotal, getTax, and getTotal".
There is some technical error that's why full code can't be added so, please find the attached file of code.
g Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argument is "gravity" the method should display -"ytivarg". Demonstrate the method in a program that asks the user to input a string and then passes it to the method.
Answer:
The program written in C++ is as follows; (See Explanation Section for explanation)
#include <iostream>
using namespace std;
void revstring(string word)
{
string stringreverse = "";
for(int i = word.length() - 1; i>=0; i--)
{
stringreverse+=word[i];
}
cout<<stringreverse;
}
int main()
{
string user_input;
cout << "Enter a string: ";
getline (std::cin, user_input);
getstring(user_input);
return 0;
}
Explanation:
The method starts here
void getstring(string word)
{
This line initializes a string variable to an empty string
string stringreverse = "";
This iteration iterates through the character of the user input from the last to the first
for(int i = word.length() - 1; i>=0; i--) {
stringreverse+=word[i];
}
This line prints the reversed string
cout<<stringreverse;
}
The main method starts here
int main()
{
This line declares a string variable for user input
string user_input;
This line prompts the user for input
cout << "Enter a string: ";
This line gets user input
getline (std::cin, user_input);
This line passes the input string to the method
revstring(user_input);
return 0;
}
If the data rate is 10 Mbps and the token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle network with 40 stations? (The average number of stations the token must pass through is 40/2 = 20.) Ignore the propagation delay and the gap Ethernet requires between packets.
Answer:
1.024x10^-5
Explanation:
To calculate the transmission delay bytes for the token,
we have the token to be = 64bytes and 10mbps rate.
The transmission delay = 64bytes/10mbps
= 51.2 microseconds
A microsecond is a millionth of a second.
= 5.12 x 10^-5
The question says the average number of stations that the token will pass through is 20. Remember this value is gotten from 40/2
20 x 5.12 x 10^-5
= 0.001024
= 1.024x10^-5
Therefore on an idle network with 40 stations, the average wait is
= 1.024x10^-5
Write a Bash script that searches all .c files in the current directory (and its subdirectories, recursively) for occurrences of the word "foobar". Your search should be case-sensitive (that applies both to filenames and the word "foobar"). Note that an occurrence of "foobar" only counts as a word if it is either at the beginning of the line or preceded by a non-word-constituent character, or, similarly, if it is either at the end of the line or followed by a non-word- constituent character. Word-constituent characters are letters, digits and underscores.
Answer:
grep -R '^foobar'.c > variable && grep -R 'foobar$'.c >> variable
echo $variable | ls -n .
Explanation:
Bash scripting is a language used in unix and linux operating systems to interact and automate processes and manage files and packages in the system. It is an open source scripting language that has locations for several commands like echo, ls, man etc, and globbing characters.
The above statement stores and appends data of a search pattern to an already existing local variable and list them numerically as standard out 'STDOUT'.
Write a program that asks the user to enter a series of numbers separated by commas. Here is an example of valid input: 7,9,10,2,18,6 The program should calculate and display the sum of all the numbers.
Answer:
Here is the JAVA program. Let me know if you need the program in some other programming language.
import java.util.Scanner; // used for taking input from user
public class Main{ //Main class
public static void main(String[] args) {//start of main() function body
Scanner scan = new Scanner(System.in); // creates a Scanner type object
String input; // stores input series
int sum = 0; //stores the sum of the series
System.out.println("Enter a series of numbers separated by commas: "); //prompts user to enter a series of numbers separated by comma
input = scan.nextLine(); //reads entire input series
String[] numbers = input.split("[, ]"); //breaks the input series based on delimiter i.e. comma and stores the split sub strings (numbers) into the numbers array
for (int i = 0; i < numbers.length; i++) { //loops through each element of numbers array until the length of the numbers reaches
sum += Integer.parseInt(numbers[i]); } // parses the each String element of numbers array as a signed decimal integer object and takes the sum of all the integer objects
System.out.println("Sum of all the numbers: " + sum); } } //displays the sum of all the numbers
Explanation:
The program prompts the user to enter a series separated by commas.
Then split() method is used to split or break the series of numbers which are in String form, into sub strings based on comma (,) . This means the series is split into separate numbers. These are stored in numbers[] array.
Next the for loop iterate through each sub string i.e. each number of the series, converts each String type decimal number to integer using Integer.parseInt and computes the sum of all these integers. The last print statement displays the sum of all numbers in series.
If the input is 7,9,10,2,18,6
Then the output is: 7+9+10+2+18+6
sum = 52
The program and its output is attached.
Each time we add another bit, what happens to the amount of numbers we can make?
Answer:
When we add another bit, the amount of numbers we can make multiplies by 2. So a two-bit number can make 4 numbers, but a three-bit number can make 8.
The amount of numbers that can be made is multiplied by two for each bit to be added.
The bit is the most basic unit for storing information. Bits can either be represented as either 0 or 1. Data is represented by using this multiple bits.
The amount of numbers that can be gotten from n bits is given as 2ⁿ.
Therefore we can conclude that for each bit added the amount of numbers is multiplied by two (2).
Find more about bit at: https://brainly.com/question/20802846
How does the teacher know you have completed your assignment in Google Classroom?
Answer:
When students have completed the assignment, they simply click the Mark As Done button to let the teacher know they have finished.
Explanation: Note: The teacher does NOT receive an alert or email notification when work has been turned in, or marked as done.
Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a space. Ex: If origList = {40, 50, 60, 70} and offsetAmount = {5, 7, 3, 0}, print:45 57 63 70 #include using namespace std;int main() {const int NUM_VALS = 4;int origList[NUM_VALS];int offsetAmount[NUM_VALS];int i = 0;origList[0] = 40;origList[1] = 50;origList[2] = 60;origList[3] = 70;offsetAmount[0] = 5;offsetAmount[1] = 7;offsetAmount[2] = 3;offsetAmount[3] = 0;// your solution goes here
Answer:
Complete the program with the following code segment
for(int i =0;i<=3;i++)
{
cout<<offsetAmount[i]+origList[i]<<" ";
}
return 0;
}
Explanation:
The following line is an iteration of variable i from 1 to 3; It iterates through elements of origList and offsetAmount
for(int i =0;i<=3;i++){
This adds and prints the corresponding elements of origList and offsetAmount
cout<<offsetAmount[i]+origList[i]<<" ";
} The iteration ends here
The program to check the highEst of n numbercan be done by ......,..
Answer: Given an array of numbers, arrange them in a way that yields the largest value. For example, if the given numbers are {54, 546, 548, 60}, the arrangement 6054854654 gives the largest value. And if the given numbers are {1, 34, 3, 98, 9, 76, 45, 4}, then the arrangement 998764543431 gives the largest value.
Explanation: If you need more help follow me on istagram at dr.darrien
-thank you
What is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps? a. Automatic vehicle locationb. Geographic information systemc. Cartographyd. Edge matching
Answer:
c. Cartography.
Explanation:
Cartography is the science and art of making an illustrated map or chart. Geographic information system (GIS) allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.
Basically, cartography is the science and art of depicting a geographical area graphically, mostly on flat surfaces or media like maps or charts. It is an ancient art that was peculiar to the fishing and hunting geographical regions. Geographic information system is an improved and technological form of cartography used for performing a whole lot of activities or functions on data generated from different locations of the Earth.
Answer:
C. Cartography
Explanation:
Speeding is one of the most prevalent factors contributing to traffic crashes.
A. TRUE
B. FALSE
Answer:
A true
Explanation:
Speeding leads to an increase in the degree of crash severity, possibly resulting in more fatalities or injuries. More damage is caused to the vehicles involved at higher speeds, increasing likelihood vehicle will not be drivable after a crash.
The statement "Speeding is one of the most prevalent factors contributing to traffic crashes" is true.
What is speeding?Speeding causes crashes to be more severe, which could lead to more fatalities or injuries. Higher speeds result in more damage to the involved vehicles, increasing the risk that the vehicle won't be drivable following a collision. There are many accidents increasing because of high speed.
The term "speeding" refers to moving or traveling swiftly. He paid a penalty for speeding. For many American drivers, speeding has become the standard, whether it is going over the posted speed limit, driving too quickly for the road conditions, or racing. Nationwide, speeding contributes to road fatalities.
Therefore, the statement is true.
To learn more about speeding, refer to the link:
https://brainly.com/question/15297960
#SPJ2
Define Proportional spacing fornt.
Answer:
Alphabetic character spacing based on the width of each letter in a font. ... Proportional spacing is commonly used for almost all text. In this encyclopedia, the default text is a proportional typeface, and tables are "monospaced," in which all characters have the same fixed width.
hope this answer helps u
pls mark me as brainlitest .-.
While interoperability and unrestricted connectivity is an important trend in networking, the reality is that many diverse systems with different hardware and software exist. Programming that serves to "glue together" or mediate between two separate and usually already existing programs is known as:
Answer:
Middleware
Explanation:
In today's technology like networking, software development, web development, etc, there is a need for connectivity. The problem at hand is the variation of the tech brands which results in the difference in operating systems, applications, and connectivity protocols. This problem is solved with the introduction of Middleware.
Middleware is the solution to conflicting software applications, interconnectivity between various tech platforms. It promotes cross-platform interactions.
what are the 21St century competencies or skills required in the information society?
Answer:
Communication
Collaboration
ICT literacy
Explanation:
These are some of the skills that are needed in the 21st century to compete and thrive in the information society.
To remain progressive, one needs to have good communication skills. These communication skills can include Active Listening and Passive Listening.
Collaboration is important because you'll have to work with other people as no man is an island, we need someone else so the skill of collaboration is necessary to compete and stay relevant in the information society in the 21st century.
IT literacy is also very important because one needs to have basic computer knowledge such as programming, computer essentials and applications, etc.
Determine the median paycheck from the following set:
{$100, $250, $300, $400, $600, $650}
$300
$350
$450
$600
Answer:
My answer to the question is $350.
The middle numbers are $300&$400.
300+400=700/2=350.
Answer:
$350
Explanation:
CHALLENGE ACTIVITY 3.1.2: Type casting: Computing average owls per zoo.
Assign avg_owls with the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4
Average owls per zoo: 2
1. num owls zooA= 1
2. num owls zooB = 2
3. numowlszooC = 4 -
4. num-zoos = 3
5. avg-owls 0.0
6.
7. Your solution goes here" Run
8.
Answer:
num_owls_zooA = 1
num_owls_zooB = 2
num_owls_zooC = 4
num_zoos = 3
avg_owls = 0.0
avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos
print("Average owls per zoo: " + str(int(avg_owls)))
Explanation:
Initialize the num_owls_zooA, num_owls_zooB, num_owls_zooC as 1, 2, 4 respectively
Initialize the num_zoos as 3 and avg_owls as 0
Calculate the avg_owls, sum num_owls_zooA, num_owls_zooB, num_owls_zooC and divide the result by num_zoos
Print the avg_owls as an integer (Type cast the avg_owls to integer, int(avg_owls))
The intention of this problem is to analyze a user input word, and display the letter that it starts with (book → B).
a. Create a function prototype for a function that accepts a word less than 25 characters long, and return a character.
b. Write the function definition for this function that evaluates the input word and returns the letter that the word starts with in capital letter (if it’s in small letters).
c. Create a function call in the main function, and use the function output to print the following message based on the input from the user. (Remember to have a command prompt in the main function requesting the user to enter any word.)
Computer starts with the letter C.
Summer starts with the letter S.
d. Make sure to consider the case where a naughty user enters characters other than the alphabet to form a word and display a relevant message.
%sb$ is not a word.
$500 is not a word.
e. Have the program process words until it encounters a word beginning with the character
Answer:
Here is the C++ program:
#include<iostream> // to use input output functions
using namespace std; //to identify objects like cin cout
void StartChar(string str) { // function that takes a word string as parameter and returns the first letter of that word in capital
int i;
char c;
do //start of do while loop
{
for (int i = 0; i < str.length(); i++) { //iterates through each character of the word str
if(str.length()>25){ //checks if the length of input word is greater than 25
cout<<"limit exceeded"; } //displays this message if a word is more than 25 characters long
c = str.at(i); // returns the character at position i
if (! ( ( c >= 'a' && c <= 'z' ) || ( c >= 'A' && c <= 'Z' ) ) ) { //checks if the input word is contains characters other than the alphabet
cout<<str<<" is not a word!"<<endl; break;} //displays this message if user enters characters other than the alphabet
if (i == 0) { //check the first character of the input word
str[i]=toupper(str[i]); //converts the first character of the input word to uppercase
cout<<str<<" starts with letter "<<str[i]<<endl; } // prints the letter that the word starts with in capital letter
} cout<<"Enter a word: "; //prompts user to enter a word
cin>>str; //reads input word from user
}while(str!="#"); } //keeps prompting user to enter a word until the user enters #
int main() //start of the main() function body
{ string str; //declares a variable to hold a word
cout<<"Enter a word: "; //prompts user to enter a word
cin>>str; //reads input word from user
StartChar(str); } //calls function passing the word to it
Explanation:
The program prompts the user to enter a word and then calls StartChar(str) method by passing the word to the function.
The function StartChar() takes that word string as argument.
do while loop starts. The for loop inside do while loop iterates through each character of the word string.
First if condition checks if the length of the input word is greater than 25 using length() method which returns the length of the str. For example user inputs "aaaaaaaaaaaaaaaaaaaaaaaaaaa". Then the message limit exceeded is printed on the screen if this if condition evaluates to true.
second if condition checks if the user enters anything except the alphabet character to form a word. For example user $500. If this condition evaluates to true then the message $500 is not a word! is printed on the screen.
Third if condition checks if the first character of input word, convert that character to capital using toupper() method and prints the first letter of the str word in capital. For example if input word is "Computer" then this prints the message: Computer starts with the letter C in the output screen.
The program keeps prompting the user to enter the word until the user enters a hash # to end the program.
The output of the program is attached.
Write a CREATE VIEW statement that defines a view named InvoiceBasic that returns three columns: VendorName, InvoiceNumber, and InvoiceTotal. Then, write a SELECT statement that returns all of the columns in the view, sorted by VendorName, where the first letter of the vendor name is N, O, or P.
Answer:
CREATE VIEW InvoiceBasic AS
SELECT VendorName, InvoiceNumber, InvoiceTotal
FROM Invoices JOIN Vendors ON Invoices.InvoiceID = Vendors.VendorID
WHERE left(VendorName,1) IN ('N' , 'O ' , 'P' )
Explanation:
CREATE VIEW creates a view named InvoiceBasic
SELECT statements selects columns VendorName, InvoiceNumber and InvoiceTotal from Invoices table
JOIN is used to combine rows from Invoices and Vendors table, based on a InvoiceID and VendorsID columns.
WHERE clause specified a condition that the first letter of the vendor name is N, O, or P. Here left function is used to extract first character of text from a VendorName column.
Which octet of the subnet mask 255.255.255.0 will tell the router the corresponding host ID?The last octetThe first octetThe first and last octetThe middle two octets
Answer:
The last octet
Explanation:
Here in the question, given the sub net mask, we want to know which octet of the subnet mask will tell the router the corresponding host ID.
The correct answer to this is the last octet. It is the last octet that will tell the router the corresponding host ID
In the three As of security, which part pertains to describing what the user account does or doesn't have access to
Answer:
Authorization
Explanation:
Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot. Sample output with inputs: 58 Total inches: 68 def print_total_inches (num_feet, hum_inches): 2 str1=12 str2=num_inches 4 print("Total inches:',(num_feet*strl+str2)) 5 print_total_inches (5,8) 6 feet = int(input) 7 inches = int(input) 8 print_total_inches (feet, inches)
I'll pick up your question from here:
Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot.
Sample output with inputs: 5 8
Total inches: 68
Answer:
The program is as follows:
def print_total_inches(num_feet,num_inches):
print("Total Inches: "+str(12 * num_feet + num_inches))
print_total_inches(5,8)
inches = int(input("Inches: "))
feet = int(input("Feet: "))
print_total_inches(feet,inches)
Explanation:
This line defines the function along with the two parameters
def print_total_inches(num_feet,num_inches):
This line calculates and prints the equivalent number of inches
print("Total Inches: "+str(12 * num_feet + num_inches))
The main starts here:
This line tests with the original arguments from the question
print_total_inches(5,8)
The next two lines prompts user for input (inches and feet)
inches = int(input("Inches: "))
feet = int(input("Feet: "))
This line prints the equivalent number of inches depending on the user input
print_total_inches(feet,inches)
Answer:
Written in Python:
def print_total_inches(num_feet,num_inches):
print("Total inches: "+str(12 * num_feet + num_inches))
feet = int(input())
inches = int(input())
print_total_inches(feet, inches)
Explanation:
Hello, I am having trouble adding a txt file into a array, so I can pop it off for a postfix problem I have uploaded what I have so far. I need help please
Answer:
#include <stack>
#include<iostream>
#include<fstream> // to read imformation from files
#include<string>
using namespace std;
int main() {
stack<string> data;
ifstream inFile("postfix.txt");
string content;
if (!inFile) {
cout << "Unable to open file" << endl;
exit(1); // terminate with error
}
while (getline(inFile, content)) {
data.push(content);
}
inFile.close();
return 0;
}
Explanation:
You were very close. Use the standard <stack> STL library, and make sure the stack elements are of the same type as what you're trying to add, i.e., std::string.
Which wireless device connects multiple laptops, tablets, phones, and other mobile devices in a corporate environment?
Answer:
Bluetooth or a wifi router or a gateway
Explanation:
Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
entering and exiting indicate a
A. construction zone.
B. railroad crossing.
C. school zone.
D. none of the above
Answer:
Explanation:
Hello friend !!!!!!!!!!!!
The answer is school zone
Hope this helps
plz mark as brainliest!!!!!!!
Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).
A school zone is a specific urban area where can be found a school and/or is near a school. A school zone shows an accessible parking area for the use of individuals (e.g. parents) holding valid accessible parking passes.Moreover, a school zone sign refers to a warning signal because children cannot be as alert as adults when they cross a road.In conclusion, children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).
Learn more in:
https://brainly.com/question/8019372
EAPOL operates at the network layers and makes use of an IEEE 802 LAN, such as Ethernet or Wi-Fi, at the link level.
A. True
B. False
An organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users have a specific set of tools installed, which they must use to perform their duties. Other tools are not permitted for compliance and tracking purposes. Team members have access to the Internet for product lookups and to research customer issues. Which of the following should a security engineer employ to fulfill the requirements for the manager?a. Install a web application firewallb. Install HIPS on the team's workstations.c. implement containerization on the workstationsd. Configure whitelisting for the team
Answer:
a
Explanation:
because they need to protect the organization's information
If you implement too many security controls, what portion of the CIA triad (Information Assurance Pyramid) may suffer?
a. Availability
b. Confidentiality
c. Integrity
d. All of the above
Answer:
Option A
Availability
Explanation:
The implementation of too many security protocols will lead to a reduction of the ease at which a piece of information is accessible. Accessing the piece of information will become hard even for legitimate users.
The security protocols used should not be few, however, they should be just adequate to maintain the necessary level of confidentiality and integrity that the piece of information should have, While ensuring that the legitimate users can still access it without much difficulty.
list three components of a computer system