Write a function named square_list that takes as a parameter a list of numbers and replaces each value with the square of that value. It should not return anything - it should mutate the original list.

Answers

Answer 1

Answer:

The function is as follows:

def square_list(myList):

   for i in range(len(myList)):

       myList[i] = myList[i]**2

   print(myList)

Explanation:

This defines the function

def square_list(myList):

This iterates through the list elements

   for i in range(len(myList)):

This squares each list element

       myList[i] = myList[i]**2

This prints the mutated list

   print(myList)


Related Questions

Prepare an algorithm and draw a corresponding flowchart to compute the
mean value of all odd numbers between 1 and 100 inclusive.

Answers

Answer:

Algorithm :

1.START

2. sum=0 ; n=1 ; length = 1

3. sum = sum + n

4. n = n + 2

5. length = length + 1

6. Repeat steps 3, 4 and 5 until n <= 99

7. mean = sum / length

8. print(mean)

Explanation:

Sum initializes the addition of the odd numbers

n starts from 1 and increments by 2, this means every n value is a odd number

The condition n <= 99 ensures the loop isn't above range isn't above 100 ;

The length variable, counts the number of odd values

Mean is obtained by dividing the SUM by the number of odd values.

In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:What is your name? AmandaHow old are you? 15Hello Amanda! You were born in 2005.

Answers

Answer:

def main():

   name = input("What is your name? ")

   if not name == "" or "":

       age = int(input("What is your age? "))

       print("Hello " + name + "! You were born in " + str(2021 - age))

main()

Explanation:

Self explanatory

the development of modern computer system have been evolutionary, discuss this phenomena and further explain how current trends in computing would impact future computer systems develpoment

Answers

Answer: Why are there so many of these?

The modern computer system has been evolutionary. Modern computers have allowed for us to complete hard tasks rather easily. With modern computers, we are able to calculate advanced equations with the click of a button. Trends in computing like RTX can rapidly improve performance, rendering, and tons of other graphical heavy actions. In September of 2018, we got the first RTX card, now in 2021, RTX has become exponentially better than what it was in 2018. With the modern computers comes quantum computers. Quantum computing is estimated to be 100 million times faster than any modern computer. IBM, the company to make the first computer stated that we are in the decade of quantum computing. And who knows? Maybe quantum computing will come sooner rather than later.

Explanation:

You probably should modify this a little so you don't get in trouble. I researched each topic I put into this for about an hour so I hope this is what you need. If it isn't, please don't hesitate to tell me what I didn't add or what went wrong.

Have a good day :)

three hardware priorities for a CAD workstation are a multicore processor, maximum RAM, and a high-end video card. How do each of these components meet the specific demands of this type of computer system

Answers

Answer: they meet it because CAD workstations are supposed to be equipped with high end supplies.

Explanation:

Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of job. It also maintains a file of estimates given for jobs not yet performed; this file contains a customer number, name, address, proposed date of job, and proposed price. Each file is in customer number order.

Required:
Design the logic that merges the two files to produce one combined file of all customers whether past or proposed with no duplicates; when a customer who has been given an estimate is also a past customer, use the proposed data.

Answers

Answer:

Hre the complete implementation of python code that reads two files and merges them together.

def merge_file(past_file_path,proposed_file_path, merged_file_path):

   past_file_contents=load_file(past_file_path)

   proposed_file_contents=load_file(proposed_file_path)

   proposed_customer_name = []

   for row in proposed_file_contents:

       proposed_customer_name.append(row[1])

   with open(merged_file_path,'w') as outputf:

       outputf.write("Customer Number, Customer Name, Address\r\n")

       for row in proposed_file_contents:

           line = str(row[0]) +", " + str(row[1]) + ", " + str(row[2]) +"\r\n"

           outputf.write(line)

       for row in past_file_contents:

           if row[1] in proposed_customer_name:

               continue

           else:

               line = str(row[0]) + ", " + str(row[1]) + ", " + str(row[2]) + "\r\n"

               outputf.write(line)

       print("Files merged successfully!")

# reads the file and returns the content as 2D lists

def load_file(path):

   file_contents = []

   with open(path, 'r') as pastf:

       for line in pastf:

           cells = line.split(",")

           row = []

           for cell in cells:

               if(cell.lower().strip()=="customer number"):

                   break

               else:

                   row.append(cell.strip())

           if  len(row)>0:

               file_contents.append(row)

   return file_contents

past_file_path="F:\\Past Customer.txt"

proposed_file_path="F:\\Proposed Customer.txt"

merged_file_path="F:\\Merged File.txt"

merge_file(past_file_path,proposed_file_path,merged_file_path)

The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sum of the previous two, for example: 0, 1, 1, 2, 3, 5, 8, 13. Complete the fibonacci() method, which takes in an index, n, and returns the nth value in the sequence. Any negative index values should return -1.

Ex: If the input is: 7
the out put is :fibonacci(7) is 13

import java.util.Scanner;
public class LabProgram {
public static int fibonacci(int n) {
/* Type your code here. */
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int startNum;
System.out.println("Enter your number: ");
startNum = scnr.nextInt();
System.out.println("fibonnaci(" + startNum + ") is " + fibonacci(startNum));
}
}

Answers

You could use recursion to write java method for computing fibonacci numbers. Though it will be inefficient for n > about 50, it will work.

public static int fibonacci(int n) {

if (n < 0) { return -1; }

if (n < 2) { return n; }

else { return fibonacci(n-1)+fibonacci(n-2); }

}

Hope this helps.

The current term of a Fibonacci series is derived by adding the two previous terms of its sequence; and the first two terms are 0 and 1.

The code segment (without comments) that completes the program is as follows:

int T1 = 0, T2 = 1, cT;

   if (n < 0){

       return -1;     }

   for (int i = 2; i <= n; i++) {

       cT = T1 + T2;

       T1 = T2;

       T2 = cT;     }

   return T2;

With comments (to explain each line)

/*This declares the first term (T1), the second term (T2) and the current term (CT).

T1 and T2 are also initialized to 0 and 1, respectively

*/

int T1 = 0, T2 = 1, cT;

//This returns -1, if n is negative

   if (n < 0){         return -1;    

}

//The following iterates through n

   for (int i = 2; i <= n; i++) {

//This calculates cT

       cT = T1 + T2;

//This passes T2 to T1

       T1 = T2;

//This passes cT to T2

       T2 = cT;

   }

//This returns the required term of the Fibonacci series

   return T2;

At the end of the program, the nth term of the series would be returned to the main method for output.

Read more about Fibonacci series at:

https://brainly.com/question/24110383

Can anyone code this ?

Answers

Answer:

simple Reflex action it is the simplest from of reflex and does not depen on learning

1) Declare an ArrayList named numberList that stores objects of Integer type. Write a loop to assign first 11 elements values: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024. Do not use Math.pow method. Assign first element value 1. Determine each next element from the previous one in the number List. Print number List by using for-each loop.

Answers

Answer:

Explanation:

The following is written in Java and uses a for loop to add 10 elements to the ArrayList since the first element is manually added as 1. Then it calculates each element by multiplying the previous element (saved in count) by 2. The program works perfectly and without bugs. A test output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       ArrayList<Integer> numberList = new ArrayList<>();

       numberList.add(0, 1);

       int count = 1;

       for (int i = 1; i < 11; i++) {

           numberList.add(i, (count * 2));

           count = count * 2;

       }

       for (Integer i : numberList) {

           System.out.println(i);

       }

   }

}

Which of the following is not a characteristic of Web 2.0?
a. blogs
O b. interactive comments being available on many websites
O c. mentorship programs taking place via the internet
d. social networking

Answers

Answer:

c. mentorship programs taking place via the internet

Explanation:

The World Wide Web (WWW) was created by Tim Berners-Lee in 1990, which eventually gave rise to the development of Web 2.0 in 1999.

Web 2.0 can be defined as a collection of internet software programs or applications which avails the end users the ability or opportunity to share files and resources, as well as enhance collaboration over the internet.

Basically, it's an evolution from a static worldwide web to a dynamic web that enhanced social media. Some of the examples of social media platforms (web 2.0) are You-Tube, Flickr, Go-ogle maps, Go-ogle docs, Face-book, Twit-ter, Insta-gram etc.

Some of the main characteristics of Web 2.0 are;

I. Social networking.

II. Blogging.

III. Interactive comments being available on many websites.

Also, most software applications developed for Web 2.0 avails its users the ability to synchronize with handheld or mobile devices such as smartphones.

However, mentorship programs taking place via the internet is not a characteristic of Web 2.0 but that of Web 3.0 (e-mentoring).

The option that is not a characteristic of Web 2.0 from the following is mentorship programs taking place via the internet.

What is Web 2.0?

Web 2.0 speaks volumes about the Internet applications of the twenty-first millennium that have revolutionized the digital era. It is the second level of internet development.

It distinguishes the shift from static web 1.0 pages to engaging user-generated content. Web 2.0 websites have altered the way data is communicated and distributed. Web 2.0 emphasizes the following:

User-generated content, The convenience of use, andEnd-user inter-operability.

Examples of Web 2.0 social media include:

Face book, Twi tter, Insta gram etc

With these social media and web 2.0 websites;

It is possible to create a personal blog,Interact with other users via comments, and Create a social network.

Therefore, we can conclude that the one that is not part of the characteristics of Web 2.0 is mentorship programs taking place via the internet.

Learn more about web 2.0 here:

https://brainly.com/question/2780939

A junior network administrator has used the wrong cable type to connect his or her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the OSI reference model does this problem appear to reside at

Answers

Answer: Application Layer

Explanation: trust

explain the reason why vector graphics are highly recommended for logo​

Answers

Answer:

Currently, raster (bitmap files) and vector graphics are used in web design. But if you want to make a great logo and fully enjoy the use of it you should pick vector graphics for it in the first place. And this is why most designers opt for it.

Explanation:

Easier to re-editNo image distortionIt is perfect for detailed imagesVector drawings are scalableVector graphics look better in print

Wilh the aid of the the diagram using an algorithm to calculate table 2 of multiplication​

Answers

Answer:

See attachment for algorithm (flowchart)

Explanation:

The interpretation of the question is to design a flowchart for times 2 multiplication table (see attachment for the flowchart)

The explanation:

1. Start ---> Start the algorithm

2. num = 1 ---> Initializes num to 1

3. while num [tex]\le[/tex] 12 ---> The following loop is repeated while num is less than 12

 3.1 print 2 * num ----> Print the current times 2 element

 3.2 num++ ---> Increment num by 1

4. Stop ---> End the algorithm

design a relational database in EER for bike helmets and their reviews. a bike helmet has a name and color attributes. a bike company has its name (primary key) and location attributes

Answers

Answer:something you gotta do on your own

Explanation:

EER diagrams are essentially an expanded form of entity-relationship (ER) diagrams. EER models are useful tools for creating high-level model databases. By carefully examining the qualities and limitations, you may plan databases more thoroughly thanks to their improved features.

What design a relational database in EER?

Set up a relationship table. Include the main keys of all involved Entities in the table as fields with the appropriate data types. Add each attribute as a table field if the relationship has any. Establish a primary key by combining the primary keys of all involved entities.

The modeling interface in MySQL Workbench is absolutely dependent on Enhanced Entity-Relationship (EER) diagrams. The relationships between the tables in your model are depicted visually in EER diagrams.

Therefore, The related diagram displays modifications performed using the Model Editor.

Learn more about relational database here:

https://brainly.com/question/13262352

#SPJ2

As information technology has grown in sophistication, IT professionals have learned how to utilize __________ to look for hidden patterns and previously unknown relationships among data which can lead to better decision making. Multiple Choice data mining data hoarding knowledge management cloud computing

Answers

Answer:

data mining

Explanation:

Data mining can be defined as a process which typically involves extracting and analyzing data contained in large databases through the use of specialized software to generate new information.

Generally, computer database contain the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data users when required or needed.

Hence, as a result of the advancement in information technology (IT), IT professionals have learned over time on how to utilize data mining as a technique to look for hidden patterns and previously unknown relationships that exists among data which is capable of leading to better decision making.

Furthermore, data mining is a process that has been in existence for a very long time and has significantly impacted workflow management, communication and other areas.

In this progress report, you will be focusing on allowing one of the four transactions listed below to be completed by the user on one of his accounts: checking or savings. You will include defensive programming and error checking to ensure your program functions like an ATM machine would. The account details for your customer are as follows:CustomerUsernamePasswordSavings AccountChecking AccountRobert Brownrbrownblue123$2500.00$35.00For this progress report, update the Progress Report 2 Raptor program that allows the account owner to complete one of the 5 functions of the ATM:1 – Deposit (adding money to the account)2 – Withdrawal (removing money from the account)3 – Balance Inquiry (check current balance)4 – Transfer Balance (transfer balance from one account to another)5 – Log Out (exits/ends the program)After a transaction is completed, the program will update the running balance and give the customer a detailed description of the transaction. A customer cannot overdraft on their account; if they try to withdraw more money than there is, a warning will be given to the customer. Also note that the ATM does not distribute or collect coins – all monetary values are in whole dollars (e.g. an integer is an acceptable variable type). Any incorrect transaction types will display an appropriate message and count as a transaction.

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

In this question, the system for both the Savings account should also be chosen, the same should be done and for checking account. Will all stay same in. 

Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent single conditional.

Answers

Answer:

following are the program to the given question:

Program:

x = 0#defining an integer variable that holds a value

if x < 0:#defining if that checks x less than 0

   print("This number ",  x, " is negative.")#print value with the message

else:#defining else block

   if x > 0:#defining if that checks x value greater than 0

       print(x, " is positive")#print value with message

   else:#defining else block

       print(x, " is 0")#print value with message

if x < 0:#defining another if that checks x less than 0

   print("This number ",  x, " is negative.")

elif (x > 0):#defining elif block that check x value greater than 0

   print(x, " is positive")#print value with message

else:#defining else block

   print(x, " is 0")#print value with message

Output:

Please find the attachment file.

Explanation:

In this code, an x variable is defined which holds a value that is "0", in the next step nested conditional statement has used that checks the x variable value and uses the print method that compares the value and prints its value with the message.

In another conditional statement, it uses if that checks x value less than 0 and print value with the negative message.

In the elif block, it checks x value that is greater than 0 and prints the value with the positive message, and in the else block it will print the message that is 0.

Question: Name the person who originally introduced the idea of patterns as a solution design concept.

Answers

Answer:

architect Christopher Alexander is the person who originally introduced the idea of patterns as a solution design concept.

The person who originally introduced the idea of patterns as a solution design concept named as Christopher Alexander who was an architect.

What is architecture?

Architecture is referred to as an innovative technique or artwork based on buildings or physical structures that aims at creating cultural values for upcoming generations to understand the importance of history.

The external layout can be made to best support human existence and health by using a collection of hereditary solutions known as the "pattern language." It creates a set of helpful relationships by combining geometry and social behavior patterns.

Christopher Alexander, a British-American engineer and design theorist of Austrian heritage, is renowned for his several works on the design and construction process introduced the idea of patterns as a solution design concept.

Learn more about pattern language architecture, here:

https://brainly.com/question/4114326

#SPJ6

I'm using Visual Studio to make a grocery app for school that includes usernames and passwords. I'm given all the code then it tells me to use search arrays to implement two functions. They should return true if the username and password is found in the arrays. But i can't seem to get the function and arrays right. Below is the code and I'm supposed to implement the array in the two empty functions at the bottom. Would really appreciate some help here, thanks

Module Main
Friend blnLoggedIn As Boolean
Dim arrUsernames() As String = {"Admin", "Clerk", "Manager"}
Dim arrPasswords() As String = {"password", "password2", "password3"}

Sub Login(username As String, password As String)
blnLoggedIn = False
If VerifyUsername(username) And VerifyPassword(password) Then
'Find index for username
Dim userIndex As Integer
For loopIndex = 0 To arrUsernames.Length - 1
If arrUsernames(loopIndex) = username Then
userIndex = loopIndex
Exit For
End If
Next
'Check for password match
If arrPasswords(userIndex) = password Then
blnLoggedIn = True
Else
MessageBox.Show("Incorrect password.")
End If
End If
End Sub
Function VerifyUsername(username As String) As Boolean

End Function
Function VerifyPassword(password As String) As Boolean

End Function
End Module

Answers

Answer:

VB:

   Public Function VerifyUsername(ByVal username As String) As Boolean

       For positionInUsernameArray As Integer = 0 To arrUsername.Length - 1

           If positionInUsernameArray = arrUsername.Length Then Exit For

           If username = arrUsername(positionInUsernameArray) Then

               Return True

           Else

               Continue For

           End If

       Next

       Return False

   End Function

   Public Function VerifyPassword(ByVal password As String) As Boolean

       For positionInUsernameArray As Integer = 0 To arrPassword.Length - 1

           If positionInUsernameArray = arrPassword.Length Then Exit For

           If password = arrPassword(positionInUsernameArray) Then

               Return True

           Else

               Continue For

           End If

       Next

       Return False

   End Function

C#:

sealed class Main

   {

       internal bool blnLoggedIn;

       string[] arrUsername = new string[] { "Admin", "Clerk", "Manager" };

       string[] arrPassword = new string[] { "password", "password2", "password3" };

       public void Login(string username, string passowrd)

       {

           blnLoggedIn = false;

           if (VerifyUsername(username) && VerifyPassword(passowrd))

           {

               // Find index for username

               int userIndex = 0;

               for (int loopIndex = 0; loopIndex <= arrUsername.Length - 1; loopIndex++)

               {

                   if (arrUsername[loopIndex] == username)

                   {

                       userIndex = Convert.ToInt32(loopIndex);

                       break;

                   }

                   else continue;

               }

               // Check for password match

               if (arrPassword[userIndex] == passowrd)

                   blnLoggedIn = true;

               else

                   MessageBox.Show("Incorrect password");

           }

       }

       public bool VerifyUsername(string username)

       {

           for (int positionInUsernameArray = 0; positionInUsernameArray <= arrUsername.Length - 1; positionInUsernameArray++)

           {

               if (positionInUsernameArray == arrUsername.Length)

                   break;

               if (username == arrUsername[positionInUsernameArray])

                   return true;

               else continue;

           }

           return false;

       }

       public bool VerifyPassword(string password)

       {

           for (int positionInUsernameArray = 0; positionInUsernameArray <= arrPassword.Length - 1; positionInUsernameArray++)

           {

               if (positionInUsernameArray == arrPassword.Length)

                   break;

               if (password == arrPassword[positionInUsernameArray])

                   return true;

               else continue;

           }

           return false;

       }

   }

Explanation:

First I created a for loop with a "positionInUsernameArray" and singed it a value of 0. Next I stated while positionInUsernameArraywas less than or equal to arrUsername.Length - 1, positionInUsernameArraywould increment.

Once the base for loop was in place I created two if statements. The first if statement determines if positionInUsernameArray is equal to arrUsername.Length, if so, the for loop breaks and the method returns false. The second if statement determines if the parameter is equal to the position in the arrUsername array, if so, the method would return true, otherwise the for loop will restart.

For the "VerifyPassword" method, I used the same method as "VerifyUsername" just I changed the variable names.

Hope this helped :) If it didn't please let me know what happened so I can fix the code.

Have a good day!

Mark is flying to Atlanta. The flight is completely full with 200 passengers. Mark notices he dropped his ticket while grabbing a snack before his flight. The ticket agent needs to verify he had a ticket to board the plane. What type of list would be beneficial in this situation?

Answers

Answer:

The list that would be helpful in this situation would be a list of people in the airport

Hope This Helps!!!

Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the array. Then, fill the array with values using the pointer (Note: Do NOT use the array name.). Enhance the program by prompting the user for the values, again using the pointer, not the array name. Use pointer subscript notation to reference the values in the array.

Answers

Answer:

#include<iostream>

using namespace std;

int main()

{

  int a[20],n;

  int *p;

  cout<<"\n enter how many values do you want to enter:";

  cin>>n;

  for(int i=0;i<n;i++)

  {

      cout<<"\n Enter the "<<i+1 <<"th value :";

      cin>>*(p+i);

      //reading the values into the array using pointer

  }

  cout<<"\n The values in the array using pointer is:\n";

  for(int i=0;i<n;i++)

  {

      cout<<"\n (p+"<<i<<"): "<<*(p+i);

      //here we can use both *(p+i) or p[i] both are pointer subscript notations

  }

}

Output:

Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Assume that the list will always contain fewer than 20 integers.

Answers

Answer:

Ex: If the input is:

5 50 60 140 200 75 100

the output is:

50 60 75

The 5 indicates that there are five integers in the list, namely 50, 60, 140, 200, and 75. The 100 indicates that the program should output all integers less than or equal to 100, so the program outputs 50, 60, and 75.

For coding simplicity, follow every output value by a space, including the last one.

Such functionality is common on sites like Amazon, where a user can filter results.

#include <iostream>

#include <vector>

using namespace std;

int main() {

/* Type your code here. */

return 0;

}

A business should choose the platform as a service (PaaS) cloud model when: a. it designs its own applications but doesn't customize the operating system b. it doesn't need any operating system c. it doesn't design its own applications and doesn't customize the operating system d. it designs its own applications and customizes the operating system e. it doesn't design its own applications but customizes the operating syste

Answers

Answer:

a. it designs its own applications but doesn't customize the operating system.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Infrastructure as a Service (IaaS).

2. Software as a Service (SaaS).

3. Platform as a Service (PaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Some of the advantages of Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

Basically, platform as a Service (PaaS) providers (vendors) usually provide their clients (software developers) with server and data storage, operating system, data center, networking resources, etc., while the software developers design, deploy and manage their software applications.

Hence, a business should choose the platform as a service (PaaS) cloud model when it designs its own applications but doesn't customize the operating system.

Read the argument below and determine the underlying principle that was used to come to the conclusion presented: It is recommended that your diet should include at least 3-5 servings of vegetables a day. A serving of vegetables can be 1 cup of raw leafy greens, 1/2 cup of other cooked or raw vegetables, or 3/4 cup of vegetable juice. A diet that has less than 3-5 servings of vegetables a day may lead to health problems. Which other argument uses the same underlying principle as the argument above?

a. Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved,
b. Driving a car can be dangerous, therefore it's recommended that people not drive.
c. Driving a car can be dangerous and that is why states require that drivers pass a test to be licensed to drive.

Answers

Answer:

Hence option a is the correct one. Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved,

Explanation:

a) Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved.

As it belongs How to be a good car driving without risk as equivalent diet concept as a base.

Less than 3-5 servings of vegetables a day not taken equivalent car driving dangerous if no proper driving.

Hence option 1 is valid.

b) is wrong as it has negative feedback regarding the base case.

c) is a suggestion for the strong part which is also the wrong option

Write a program that opens the salesdat.txt file and processes it contents. The program should display the following per store:
The total sales for each week. (Should print 5 values - one for each week). The average daily sales for each week. (Should print 5 values - one for each week).
The total sales for all the weeks. (Should print 1 value)
The average weekly sales. (Should print 1 value)
The week with the highest amount in sales. (Should print 1 week #)
The week with the lowest amount in sales. (Should print 1 week #)
The file contains the dollars amount of sales that a retail store made each day for a number of weeks. Each line in the file contains thirty five numbers, which are sales numbers for five weeks. The number are separated by space. Each line in the file represents a separate store.
//FileIO.java
import java.io.BufferedReader;
import java.io.FileReader;
import java.io.IOException;
public class FileIO {
//Franchise readData(String filename)
public static void main(String[] args) {
try {
FileReader file = new FileReader("Salesdat.txt");
BufferedReader buff = new BufferedReader(file);
boolean eof = false;
while (!eof) {
String line = buff.readLine();
if (line == null)
eof = true;
else
System.out.println(line);
}
buff.close();
} catch (IOException e) {
System.out.println("Error -- " + e.toString());
}
}
}
//Store.java
public class Store {
private float salesbyweek[][];
Store() {
salesbyweek = new float[5][7];
}
//getter and setters
//setsaleforweekdayintersection(int week, int day, float sale)
public void setsaleforweekdayintersection(int week, int day, float sale){
salesbyweek[week][day]=sale;
}
//float [] getsalesforentireweek(int week)
//float getsaleforweekdayintersection(int week, int day)
//businessmethod
//a. totalsalesforweek
//b. avgsalesforweek
//c. totalsalesforallweeks
//d. averageweeklysales
//e. weekwithhighestsaleamt
//f. weekwithlowestsaleamt
//analyzeresults //call a through f
//print()
}
//Franchise.java
public class Franchise {
private Store stores[];
public Franchise(int num) {
stores = new Store[num];
}
public Store getStores(int i) {
return stores[i];
}
public void setStores(Store stores, int i) {
this.stores[i] = stores;
}
}
//Driver.java
public class Driver {
public static void main(String[] args) {
}
}

Answers

Answer:

I'm going to try and help you with this question.

Explanation:

Just give me a few minutes.

Write code that prints: Ready! firstNumber ... 2 1 Run! Your code should contain a for loop. Print a newline after each number and after each line of text. Ex: If the input is: 3 the output is: Ready! 3 2 1 Run!

Answers

Answer:

Explanation:

The following code is written in Java. It asks the user to enter the first number. Then it saves that number in a variable called firstNumber. It then uses that number to loop backwards from that number to 1 and goes printing out the countdown text. A test case has been created and the output can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.print("Enter First Number: ");

       int firstNumber = in.nextInt();

       System.out.println("Ready!");

       for (int i=firstNumber; i>0; i--) {

           System.out.println(i);

       }

       System.out.println("Run!");

   }

}

What is the value of 25 x 103 = ________?

Answers

Answer:

2575

heres coorect

Answer:

2575

Explanation:

you just multiply.

According the SDLC phases, which among these activities see a substantial amount of automation initiatives?

A code generation
B release build
C application enhancement
D test case generation
E incident management

Answers

Answer:

d. test case generation

Explanation:

Testing should be automated, so that bugs and other errors can be identified without a human error and lack of concentration.

The System Development Life Cycle (SDLC) phase that has seen a substantial amount of automation is the A. code generation.

The main phases of the SDLC include the planning, analysis, design, development, testing, implementation, and maintenance phases.

Using automation for the code generation will help eliminate human errors and increase efficiency.

The code generation phase still requires some human input to ensure that user requirements are completely met.

Thus, while automation will be useful with all the SDLC phases, substantial amount of automation initiatives have been seen with the code generation phase.

Learn more about SDLC phases at https://brainly.com/question/15074944

You have a contactless magnetic stripe and chip reader by Square. What type of wireless transmission does the device use to receive encrypted data

Answers

Answer:

Near field communication (NFC)

Explanation:

Near field communication (NFC) can be defined as a short-range high radio-frequency identification (RFID) wireless communication technology that is used for the exchange of data in a simple and secure form, especially for electronic devices within a distance of about 10 centimeters.

Also, Near field communication (NFC) can be used independently or in conjunction with other wireless communication technology such as Bluetooth.

Some of the areas in which Near field communication (NFC) is used are confirmation of tickets at a concert, payment of fares for public transport systems, check-in and check-out in hotels, viewing a map, etc.

Assuming you have a contactless magnetic stripe and chip reader by Square. Thus, the type of wireless transmission that this device use to receive encrypted data is near field communication (NFC).

State the Data types with two examples each​

Answers

Answer:

A string, for example, is a data type that is used to classify text and an integer is a data type used to classify whole numbers. When a programming language allows a variable of one data type to be used as if it were a value of another data type, the language is said to be weakly typed. Hope it help's! :D

What type of address do computers use to find something on a network?

Answers

An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions host or network interface identification and location addressing which can help you a lot.
Other Questions
What form of writing is displayed in the image above and who invented this writing? [tex]\boxed{\text{Solve for 'x'.}}\\\\\frac{x+3}{6}=\frac{2}{3}[/tex] plsss help me plsssssssss How much heat capacity, in joules and in calories, must be added to a 75.0-g iron block with a specific heat of 0.499J/g C to increase its temperature from 25 C to its melting temperature of 1535 C? What is the purpose of the numerical list in the document ? When the creature discovers that taking part of the DeLacys food store causes them suffering, he:______a. takes more, his selfishness and cruelty an innate part of his nature. b. begins to hunt rabbits, squirrels, and other small creatures, and leaves his left overs on their doorstep. c. no longer takes from them, instead living off of berries, roots, and nuts he finds nearby. d. abstains as much as possible, going many days without food and succumbing to hunger and taking more only when he feels he cannot go on another hour. Client A lends securities to Client B. Trade settled in the market and Client B denies paying any collateral. In this scenario, what action should Client A take? Three fourths of the offspring of two fruit flies have short wings, while the rest have wild-type wings . In a batch of offspring from those two flies, 100 have wild-type wings. How many of the flies have short wings? If I worked 8 hours and 49 minutes but my paycheck was only 97.17$ what was my hourly wage. Atkins Company collected $1,750 as payment for the amount owed by a customer from services provided the prior month on credit. How does this transaction affect the accounting equation for Atkins?A. Assets would decrease $1,750 and liabilities would decrease $1,750.B. One asset would increase $1,750 and a different asset would decrease $1,750, causing no effect.C. Assets would increase $1,750 and liabilities would increase $1,750.D. Assets would increase $1,750 and equity would increase $1,750.E. Liabilities would decrease $1,750 and equity would increase $1,750. Cow gives two fifths of liters of milk each day. How many liters of milk can the cow give in the second month of 2016? You deposit $5,000 in a savings account that pays 6.50 percent interest, compounded quarterly. How much will your account be worth in 10 years?a. 7,924.75b. 9,545.74c. 8,411.31d. 9,527.79e. 8,541.46 what is the ratio of the two values and what new value do they produce? $280 in 7mwhat is the ratio of the two values and what new value do they produce? 105 miles in 2 hourswhat is the ratio of the two values and what new value do they produce? $33 for 5lbwhat is the ratio of the two values and what new value do they produce? 50 pages in 2 hours 1. a) Name a set of homologous structures. b) Two species have homologous structures. What do these homologous structures show about the evolutionary relationship between the two species? mA = (4x - 2) and mzB = (11x + 17). Find x if the angles aresupplementaryA.) 165B.) 180C.) 15 D.) 11 Instructions: Find the missing side. Round your answer to the nearest tenth.53 and 10 Lucy rolls 2 fair dice and adds the results from each.Work out the probability of getting a total of 10. example of formal language Which ratio measures the number of dollars of operating cash available to meet each dollar of interest and other fixed charges that the firm owes? The director of research and development is testing a new medicine. She wants to know if there is evidence at the 0.02 level that the medicine relieves pain in more than 384 seconds. For a sample of 41 patients, the mean time in which the medicine relieved pain was 387 seconds. Assume the population standard deviation is 23. Find the P-value of the test statistic.