PYTHON Programming ONLY. Provide explanation as well. Thank you.
Write a program that reads the contents of a text file. Create your own text file with at least three new lines of sentences at least 5 words long. The program should create a dictionary in which the key-value pairs are described as follows:
The keys are the individual words in the file.
The values are the line numbers in the file where the word (the key) is found.
For example, suppose the word "hello" is found in lines 1, 2, 3, and 4. The dictionary would contain an element in which the key was the string "hello" and the value was a list of the line numbers [1,2,3,4].
Once the dictionary is built, the program, in an infinite while loop, should prompt the user for a word. When the user enters the word, the program should display what line numbers the word can be found on. If the word is not found in the dictionary, the program should display: "{replace with user-inputted word} does not exist in the file".

Answers

Answer 1

Sure! Here's a Python program that reads the contents of a text file, builds a dictionary of word occurrences, and then prompts the user to search for a word in an infinite loop:

python

# Open the file

with open('my_file.txt', 'r') as f:

   lines = f.readlines()

# Create a dictionary of word occurrences

word_dict = {}

for line_num, line in enumerate(lines):

   words = line.strip().split()

   for word in words:

       if word in word_dict:

           if line_num+1 not in word_dict[word]:

               word_dict[word].append(line_num+1)

       else:

           word_dict[word] = [line_num+1]

# Prompt user to search for a word

while True:

   search_word = input("Enter a word to search for (or press 'q' to quit): ")

   if search_word == 'q':

       break

   elif search_word in word_dict:

       print(f"Found '{search_word}' on lines {word_dict[search_word]}")

   else:

       print(f"'{search_word}' does not exist in the file.")

Explanation:

First, we open the file my_file.txt using the open() function and read its contents into a list of strings using the readlines() method. Here, I assume that the file is located in the same directory as the Python script.

Next, we iterate through each line in the list, split it into individual words using the split() method, and add each word to a dictionary along with the line number where it appears. If a word already exists in the dictionary, we append the new line number to its list of line numbers. If it doesn't exist, we create a new key-value pair with the word as the key and a list containing the line number as the value.

Finally, we use an infinite loop to prompt the user for a search word. If the user enters 'q', we break out of the loop and exit the program. Otherwise, we check if the word exists in the dictionary. If it does, we print out the line numbers where the word appears. If it doesn't, we print an error message indicating that the word does not exist in the file.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ11


Related Questions

how many mail servers does the use of e-mail involve?

Answers

The use of email typically involves multiple mail servers. Email communication follows a client-server model, where the email client interacts with the mail server to send and receive emails.

When you send an email, your email client communicates with your outgoing mail server (SMTP server) to deliver the message. The outgoing mail server then communicates with the recipient's incoming mail server (POP or IMAP server) to store the email. The recipient's email client retrieves the email from the incoming mail server. In addition to these two mail servers involved in the direct exchange of emails, there may be intermediate mail servers and relay servers that handle the routing and delivery of emails across different networks and domains. These servers work together to ensure the successful transmission of emails between senders and recipients.

Learn more about mail servers  here:

https://brainly.com/question/30159736

#SPJ11

Why is it important to understand the default settings?
Why would you customize a document?

Answers

It is important to understand the default settings of a document because they can affect the appearance and functionality of the document.

For example, the default font and margins can affect the readability and layout of the document. Understanding the default settings allows you to make informed decisions about how to customize the document to meet your specific needs.

How can you customize a document?

Customizing a document can be done for a variety of reasons. Some common reasons include:

Changing the appearance of the document to match a specific branding or style guideModifying the layout or organization of the document to make it more readable or user-friendlyAdding or removing specific elements from the document, such as images or sectionsAdapting the document for a specific audience or purpose.

With this in mind, you can see the importance of understanding default settings and also how to customize a document.

Read more about default settings here:

https://brainly.com/question/29394469

#SPJ1

Write a 5 – 7+ sentence paragraph about Thanksgiving that DOES NOT use the letter “t.”

Answers

A period in all of our lives which is recognizing a major bond including family and friends. When summer concludes, a new season comes around bringing a cold, and chilly breeze which is fall. Fall is a special season because occurrences such as leaves falling from conifers, looking for a good pumpkin in the pumpkin field, or simply enjoying  your family and friends company. Drinking warm drinks such as coffee and baking cookies can help you embrace such an amazing season. When fall rolls around, Always be aware of nearby occurrences which can bring you joy during a cold season such as fall.

Hope wants to add a third use at the end of her nitrogen list.

What should Hope do first?

What is Hope’s next step?

Answers

Answer:the first answer is put it at the end of 2b

the second answer is press enter

Explanation:

Answer:

1,  put it at the end of 2b     2, press enter key

Explanation:

The range of positive integers possible in an 8-bit two's complement system is: A) 1 to 256. B) 1 to 127. C) 1 to 255. D) 1 to 128.

Answers

Answer:

The correct answer is B) 1 to 127.

Explanation:

In an 8-bit two's complement system, the range of positive integers possible is from 0 to (2^8)-1 = 255. However, since the two's complement system allocates the most significant bit (MSB) to represent the sign of the number, the range of positive integers would be halved. Therefore, the range of positive integers in an 8-bit two's complement system is from 1 to 127.

Assume a file containing a series of integers is named numbers.txt and exists on the computers disk. Write a program that calculates the average of all the numbers stored on the file. Write this in Python

Answers

Answer:Here is one way to calculate the average of all the numbers stored in a file named "numbers.txt" in Python:

Explanation:

# Open the file for reading

with open("numbers.txt", "r") as file:

   # Read all the lines in the file

   lines = file.readlines()

   

   # Convert each line to an integer

   numbers = [int(line.strip()) for line in lines]

   

   # Calculate the sum of the numbers

   total = sum(numbers)

   

   # Calculate the average by dividing the total by the number of numbers

   average = total / len(numbers)

   

   # Print the result

   print("The average of the numbers is", average)

A framework for all of the entities involved in digital certificates for digital certificate management is known as:

Answers

Answer:

public key infrastructure

Explanation:

Public key infrastructure (PKI) refers to tools used to create and manage public keys for encryption, which is a common method of securing data transfers on the internet. PKI is built into all web browsers used today, and it helps secure public internet traffic. Organizations can use it to secure the communications they send back and forth internally and also to make sure connected devices can connect securely.

The most important concept associated with PKI is the cryptographic keys that are part of the encryption process and serve to authenticate different people or devices attempting to communicate with the network.

On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!

Answers

Answer:

No i dont think you can i was searching on ios websites for info cause i dont own one but it doesnt seem like you can ive been searching for quite a while now doesnt look like it tho

Do you believe that Online Activism results in real change, or do you think it is something that people do to make themselves look good/feel better about themselves? Look for some examples of both in recent history to back your point.
Reflect your findings in a 350 word discussion post. Be sure to link to multiple online sources and add in visual and other multimedia resources to help you make your point. Be sure you credit your sources via a linkback. You are considering other’s ideas, so they need to be credited as such.

Answers

Online Activism results in relatively minimal change. The reason behind this matter is because people generally only take action virtually and not in real life. Although there are fewer opportunities to take action in person, there is a relatively strong difference of seeing someone dying of cancer online and seeing someone in person dying of cancer. This can be summed down to sympathetic disconnect, being how virtualization creates a disconnect between people emotionally and causes the static statement of, "There's nothing I can do" when there's donations and organizations to contribute to always there. It's much easier to feel included in person than online, and accordingly, much more often a reason for people to interact and take actual action.

Ashanti is using the PC version of Word, and she wants to create an interactive table of contents—pages that, when the user clicks on them, will take the user to that section of her document. Describe the exact process by which Ashanti could accomplish this task.

Answers

Answer:

Using some sort of link or hyperlink connected to the text would be a great way to do this, just highlight the text with your cursor and right click and click on hyperlink then set it up to go to the designated page.

Absolutely Brilliant if you to ask me!  

I will be thankful I’d you help

I will be thankful Id you help

Answers

The information used to explain the graph is known as chart title.  Hence option B is correct.

What are statistical graphs?

Statistical graphs are defined as a graphic representation of applied mathematical knowledge. To make it simpler to understand and interpret statistical data, a set of data is represented by statistical graphs.

A table chart is just another type of information presentation. In boxes or columns of the table, there are words, numbers, or a mix of the two. It depicts a group of facts and how they relate to one another.

Thus, the information used to explain the graph is known as statistical graphs.

To learn more about statistical graphs, refer to the link below:

https://brainly.com/question/28790913

#SPJ1

A chatbot is a computer program designed to emulate human conversation. For this program, you will use if statements, user input, and random numbers to create a basic chatbot.

The Scenario
You have decided to design a fashion chatbot that helps people pick out their fashion preferences. Your bot can gauge what types of clothes and accessories the user might like.

Your chatbot should ask the user the following (minimum requirements for the grader) and then give answers depending on the answers the user inputs:

at least 6 questions
at least 3 if-elif-else statements
​​the use of the random module and randomly generated numbers
Based on these criteria, some responses will be based on what the user types and some will be based on random numbers.

For example, if the chatbot asks what is your favorite head accessory, your chatbot might respond I also think baseball hats are best. in response to a user input of baseball hats, or I love beanies! in response to a user input of beanies.

Additionally, you could also have a random number generated between, say, 1 and 3 and have a corresponding response depending on the number to randomly answer with That’s in right now. or Wow, so stylish!, and so on.

Note that in order to pass all of the test cases, your randomly generated numbers should not be dependent on user input (for example, you would not want to include a situation where if the user inputs a specific phrase, then a random number is generated). The randomly generated numbers should prompt a reply from the chatbot, and should do so separately from the user input statements that prompt a reply from the chatbot.

Answers

Based on the fact that you would use a ch.a tbot to emulate human conversation and we decide to design a fashion ch.a tbot that helps people pick out their fashion preferences, a program that would gauge what types of clothes and accessories the user might like is given below:

The Program

import random

good_responses = (["That's cool!", "Wow!", "That's great to hear!", "Tell me more"])

bad_responses = (["I'm sorry", "That is too bad!"])

first_name = input("What's your first name? ")

last_name = input("What's your last name? ")

print(f"Hello {first_name} {last_name}, nice to meet you!")

age = int(input(f"How old are you, {first_name}? "))

if age > 17:

  print("Nice, you are considered an adult")

else:

  print("You are young, our children's section is to aisle 10.")

color = input("What's your favorite color? ")

print(good_responses[random.randint(0,3)])

feeling = input(" What is your current mood (sad/happy) ")

if feeling == 'sad':

  print(bad_responses[random.randint(0,1)])

else:

  print ( good _ responses [ random . randint ( 0 , 3 ) ] )

print(f"It's been a nice ch. at time with you, { first _ name } ! " )

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

A web search engine is a that helps you locate on the web.

Answers

A web search engine is a software which helps you locate on the web.

A web search engine is a software that searches the web  for information is known as a web search engine. A user query's search results are frequently presented as a list. Web pages, pictures, and other file kinds could be included in the lists.

some major search engines are  Yahoo , Bing etc

Learn more about search engine here:

https://brainly.com/question/20850124

#SPJ10

Consider some devices with the following metrics: MTTF: 2 years
MTTR: 30 days The availability for such devices is _______%

Answers

The availability for devices with an MTTF (Mean Time To Failure) of 2 years and an MTTR (Mean Time To Repair) of 30 days can be calculated using the following formula:

Availability = (MTTF) / (MTTF + MTTR) * 100

Substituting the given values:

Availability = (2 years) / (2 years + 30 days) * 100

To calculate this, we need to convert the time units to a common unit. Let's convert years to days:

Availability = (2 years) / (2 years + 30 days) * 100

            = (2 * 365 days) / (2 * 365 days + 30 days) * 100

            = 730 days / 760 days * 100

            ≈ 96.05%

Therefore, the availability for these devices is approximately 96.05%.

You can learn more about  MTTF (Mean Time To Failure) at: brainly.com/question/31828911

#SPJ11

This dialogue reflects what aspect of communication?

a.

body language

b.

good listening

c.

working together

d.

leadership


Please select the best answer from the choices provided


A
B
C
D

Answers

Answer:

B.

Explanation:

Question #3
Which techniques are useful when evaluating a program? Select 4 options.
O user experience testing
print debugging
defuncto debugging
o test cases
automated testing

Answers

Answer:

user experience testingtest casesautomated testingprint debugging

Explanation:

The techniques which are useful when evaluating a program are user experience testing, test cases, automated testing and print debugging. Thus, option 1st, 2nd, 4th and 5th are correct.

What is Programming?

Programming is the process of carrying out a certain computation, often through creating and constructing an executable computer program. Programming activities include analysis, algorithm generation, algorithm accuracy and resource use assessment, and algorithm implementation.

The process of producing a set of instructions that tells a computer how to complete a task is known as programming. Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Goal-based, process-based, and outcomes-based assessment methods are the three basic types of evaluation methodologies.

User experience testing, test cases, automated testing, and print debugging are always that may be used to evaluate an application. As a result, options 1, 2, 4, and 5 are correct.

Learn more about programming here:

https://brainly.com/question/11023419

#SPJ2

a plc program requires a routine where a sint value is subtracted from a sint value. what is the smallest data type available that can accurately hold the full result for all possible input cases.

Answers

INT is the smallest data type available that can accurately hold the full result for all possible input cases.

An int way is a datum of important information type, an information kind that represents some styles of mathematical integers. Integral information types may be of numerous sizes and might or may not be legal to embody bad values. Integers are normally represented in a computer as a fixed of binary digits.

The int() is used to head again to the numeric integer identical to a given expression. An expression whose numeric integer is identical is returned. This example truncates the decimal and returns the integer as a part of the number.

Learn more about The int at brainly.com/question/16856574

#SPJ4

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

​ One reason for using an alias is when you are joining a table to itself. T/F

Answers

True. Using an alias is necessary when you join a table to itself in order to avoid confusion and ambiguity. When you join a table to itself, you essentially create two copies of the same table, and if you refer to columns using the table name alone, it is unclear which table you are referring to.

For example, if you have a table named "employees" and you want to join it to itself to find all pairs of employees who have the same manager, you would need to use aliases to distinguish between the two copies of the "employees" table. You could use "e1" and "e2" as aliases for the two copies of the table, and then refer to columns using the appropriate alias. Using aliases not only clarifies the syntax of the SQL statement but also helps to make it more readable and understandable for others who may need to work with the code in the future. It is a best practice to always use aliases when joining a table to itself or when joining multiple tables together in a single query.

Learn more about SQL statement here-

https://brainly.com/question/31580771

#SPJ11

you are installing a 1.5 tb hard drive in a computer. what two methods could you use to partition the hard drive?

Answers

There are several methods to partition a hard drive, but two common methods that could be used to partition a 1.5 TB hard drive are:

Disk Management UtilityThird-Party Partitioning Tool

How do one  partition the hard drive?

Disk Management Utility: The Disk Management Utility is a built-in tool in Windows that can be used to partition a hard drive. To use this method, you can follow these steps:

Open the Disk Management Utility by pressing the Windows key + X and selecting "Disk Management".In the Disk Management window, locate the 1.5 TB hard drive, right-click it, and select "Shrink Volume".Enter the amount of space you want to shrink in MB (1 GB = 1024 MB), and click "Shrink".You will see the unallocated space that you have created. Right-click on it and select "New Simple Volume".Follow the on-screen instructions to set up the partition.

Lastly, in Third-Party Partitioning Tool: There are many third-party partitioning tools available, such as EaseUS Partition Master, MiniTool Partition Wizard, and Paragon Partition Manager. To use this method, you can follow these steps:

Download and install a partitioning tool of your choice.Open the partitioning tool and locate the 1.5 TB hard drive.Use the tool's interface to create a new partition by specifying the size of the partition, the drive letter, and the file system.Follow the on-screen instructions to complete the process.

Learn more about hard drive from

https://brainly.com/question/29608399

#SPJ1

Why should data be not taken from the internet directly?​
Please solve it..!!

Answers

Answer:

Explanation:

some files and websites are out of controllable. because of the hackers

Data obtained from the internet should not always be taken at face value and used directly in important decision-making processes or analysis.

What is internet?

The Internet (or internet) is a global network of interconnected computer networks that communicate using the Internet protocol suite (TCP/IP).

For several reasons, data obtained from the internet should not always be taken at face value and used directly in important decision-making processes or analysis.

Accuracy: Internet data accuracy cannot always be verified, and there is no guarantee that the information is correct.Reliability: The dependability of internet data is also debatable.Relevance: Internet data may or may not be relevant to your specific research or project needs.Legal and ethical concerns: Using data obtained from the internet may raise legal and ethical concerns, particularly regarding intellectual property rights, copyright, and privacy.

Thus, data should not be taken from the internet directly.

For more details regarding internet, visit:

https://brainly.com/question/13308791

#SPJ2

object-oriented programming (oop) allows you to derive new classes from existing classes. this is called .

Answers

Answer:

inheritance

Explanation:

It's possible to have both a dangling pointer and a memory leak to the same block of dynamically allocated memory. T/F?

Answers

True. A dangling pointer occurs when a pointer points to a block of memory that has already been deallocated. This can happen when the memory is freed or deleted, but the pointer is not set to null or reassigned to a new valid memory address.



A memory leak occurs when memory is allocated but not properly deallocated, causing it to be unavailable for reuse even though it is no longer needed.



It is possible for both of these issues to occur with the same block of dynamically allocated memory if a pointer is not properly managed and the memory is not deallocated after it is no longer needed.

Dangling pointers and wild pointers in PC writing computer programs are pointers that don't highlight a substantial object of the fitting kind. These are exceptional instances of memory security infringement. In general, references that do not resolve to a valid destination are referred to as dangling references and wild references.

Know more about dangling pointer, here:

https://brainly.com/question/31666593

#SPJ11

error 0xc0202009: data flow task 1: ssis error code dts e oledberror. an ole db error has occurred. error code: 0x80004005. an ole db record is available

Answers

The error message you encountered, "error 0xc0202009: SQL Server task 1: ssis error code dts e oledberror. an ole db error has occurred. error code: 0x80004005.

An ole db record is available," is related to the Data Flow Task in SSIS (SQL Server Integration Services). Here is a breakdown of the error message and its possible causes: 1. "error 0xc0202009: data flow task 1": This indicates an error within the Data Flow Task. The number "1" represents the specific task where the error occurred. 2. "ssis error code dts e oledberror":

Verify that the connection settings, such as the server name, database name, and authentication credentials, are correct. 2. Validate the source and destination: Ensure that the source and destination components in the Data Flow Task are properly configured and compatible. 3. Review the error details: Access the detailed error message or log to gather more specific information about the error. This can help identify the root cause. 4. Investigate permissions and security settings: Verify that the user account running the SSIS package has the necessary permissions to access the source and destination databases. 5. Check for data type mismatches: Confirm that the data types of the source and destination columns are compatible. Mismatched data types can cause errors during data transfer.

To know more about  SQL Server Visit:  

https://brainly.com/question/31923434

#SPJ11

7. What enhancing techniques that lines the interior of drawers and boxes resulted to soft velvety finish? A. Wood Turning b. Painting c. Etching d. Flocking

Answers

Answer:

d. Flocking

Explanation:

Flocking is one of the methods that is used to bring a finishing and decorative touch in the furniture. It is a process in which very fine particles are placed on the surface of the furniture to provide a texture to it. This process helps in adding a texture, providing a distinct color, and for better maintenance of the product. In the interior of the drawers and boxes, flocking is done so as to bring a soft and velvety finish.

What blocks are needed to include a cutscene in a Scratch game?
A) Broadcast, stop other scripts
B) Forever, If, While
C) Play, If
D)When touching, Forever

Answers

The blocks needed to include a cutscene in a Scratch game are:

A) Broadcast, stop other scripts

What is the braodcast block used for?

The "Broadcast" block is used to trigger a specific event, such as the start of a cutscene, while the "Stop other scripts" block is used to pause other scripts in the background to ensure that the cutscene runs smoothly.

Hence the  broadcast block are needed to include a cutscene in a Scratch game

Read more on broadcast block here:https://brainly.com/question/9238983

#SPJ1

Write a sub program to find the factors of a supplied number

Answers

Answer:

There are two options I can think of for you,

(Qbasic Code)

To Find the Factors of Given Number:

CLS

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END

To Find the Factors of Given Number Using COMMON SHARED:

DECLARE SUB factor ()

COMMON SHARED n

CLS

CALL factor

END

SUB factor

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END SUB

what happens when the following statement is executed? automobile car = new automobile(false);

Answers

Executing the statement "automobile car = new automobile(false);" creates a new instance of the "automobile" class, initializes it with a boolean value of "false", and assigns it to a variable called "car".



the compiler creates a new instance of the "automobile" class and assigns it to a variable called "car". The "new" keyword is used to create an object of the class, and the "automobile(false)" part specifies the constructor to be used to initialize the object.

Once the "car" object has been created and initialized, it can be used to perform operations and access properties of the "automobile" class. For example, if the "automobile" class has a method called "startEngine()" which turns on the car's engine, we can call this method on the "car" object by writing "car.startEngine()" in our code.

To know more about automobile visit:

https://brainly.com/question/30001893

#SPJ11

When developing an output control system, it is important to implement output standards that: (Choose all that apply.)

Answers

When creating an output control system, it is important to implement output standards  or targets that managers think will have good measure efficiency, quality, etc.

What is this system about?

In an output control system, it is important for  managers to first make sure that they set of goals or output performance standards or targets that they believe will best measure in terms of efficiency, quality, etc., for their firm.

Note that this system often acts as a behavior control systems that helps in providing methods that can be used to ensure that workers do well in ways that make the work to be efficient.

Learn more about control system from

https://brainly.com/question/27334060

Mention 2 precautionary
measures to be observed
when using ICT tools​

Answers

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage
Other Questions
if resources are not adequate to meet peak demands, the resulting reschedule is termed :A. Resource-constrained scheduling.B. Time-constrained scheduling.C. Mandatory leveling.D. Project resource adjustment.E. Allocation. a hurricane blows down trees in a forest, allowing grasses and shrubs to grow for several decades until trees regrow. the hurricane is an example of A. Write sentences with hay to say how many of each item there are in the classroom.1.2.3.4. 2. what awful things does juliet say she will do rather than marry paris? (she mentions 7 total things, 4 minimum for this answer) a patient arrives at the emergency department experiencing a headache and rates the pain as 7 on a 0 to 10 pain scale. which nonpharmacological intervention does the nurse implement for this patient while awaiting orders for pain medication from the health care provider? group of answer choices The table below shows the population growth rates for three countries in 2009: Find the equation of the linear function represented by the table below in slope- intercept form. x O 1 1 2 3 4 W -9 -3 co 9 15 Answer: Y Submit Answer attempt 1 out Techcom is designing a new smartphone. Each unit of this new phone will require $245 of direct materials; $25 of direct labor, $36 of variable overhead; $33 of variable selling, general, and administrative costs; $46 of fixed overhead costs; and $25 of fixed selling, general, and administrative costs. 1. Compute the selling price per unit if the company uses the total cost method and plans a markup of 180% of total costs. 2. The company is a price-taker and the expected selling price for this type of phone is $950 per unit. Compute the target cost per unit if the company's target profit is 60% of expected selling price. 3. Compute the selling price per unit if the company uses the variable cost method and plans a markup of 200% of variable costs. what is el picadillo?a. tomatoes, onions,and cilantrob. chicken with ricec. beef with cucumbers, garlic, and red peppersd. pork with onions, green peppers, and tomatoes pls help I need it..... Inventory valuation is the cost associated with an entity's inventory at the end of a reporting period. Select one: True False Which is better short term or long term investment? Given sin O= -35/6 and angle is in Quadrant IV, what is the exact value ofcos O in simplest form? Simplify all radicals if needed. West uses the LIFO method to cost inventory. What amount should West report as inventory at the end of February using the periodic inventory method Which of the following powers does the Constitution give to Congress?: A. to appoint ambassadors: B. to grant pardons for crimes:C. to impose and collect taxes:D. all of the above Consider the following argument: "Ned argues that IT employees should be given the raise they were promised. But of course Ned thinks that; he works for IT. I believe we can safely ignore his argument." What fallacy does this argument commit?a.personal attackb.attacking the motivec.look who's talking Lauren's Beauty Boutique has experienced the following weekly sales:Week Sales1 4322 3963 4154 4585 460Forecast sales for week 6 using the following methods. (Round answers to 1 decimal place, e.g. 15.2.)The naive method:A simple average:A three period moving average: Write 6 12 as an improper fraction. as temperature decreases, the average kinetic energy of a sample of gas molecules decreases. true or false What happened?????????