Using the knowledge in computational language in python it is possible to write a code that will ask the user to insert a number of student's records from the keyboard
Writting the code:D = dict()
n = int(input('How many student record you want to store?? '))
# Add student information
# to the dictionary
for i in range(0,n):
x, y = input("Enter the complete name (First and last name) of student: ").split()
z = input("Enter contact number: ")
m = input('Enter Marks: ')
D[x, y] = (z, m)
# define a function for shorting
# names based on first name
def sort():
ls = list()
# fetch key and value using
# items() method
for sname,details in D.items():
# store key parts as an tuple
tup = (sname[0],sname[1])
# add tuple to the list
ls.append(tup)
# sort the final list of tuples
ls = sorted(ls)
for i in ls:
# print first name and second name
print(i[0],i[1])
return
# define a function for
# finding the minimum marks
# in stored data
def minmarks():
ls = list()
# fetch key and value using
# items() methods
for sname,details in D.items():
# add details second element
# (marks) to the list
ls.append(details[1])
# sort the list elements
ls = sorted(ls)
print("Minimum marks: ", min(ls))
return
# define a function for searching
# student contact number
def searchdetail(fname):
ls = list()
for sname,details in D.items():
tup=(sname,details)
ls.append(tup)
for i in ls:
if i[0][0] == fname:
print(i[1][0])
return
# define a function for
# asking the options
def option():
choice = int(input('Enter the operation detail: \n \
1: Sorting using first name \n \
2: Finding Minimum marks \n \
3: Search contact number using first name: \n \
4: Exit\n \
Option: '))
if choice == 1:
# function call
sort()
print('Want to perform some other operation??? Y or N: ')
inp = input()
if inp == 'Y':
option()
# exit function call
exit()
elif choice == 2:
minmarks()
print('Want to perform some other operation??? Y or N: ')
inp = input()
if inp == 'Y':
option()
exit()
elif choice == 3:
first = input('Enter first name of student: ')
searchdetail(first)
print('Want to perform some other operation??? Y or N: ')
inp = input()
if inp == 'Y':
option()
exit()
else:
print('Thanks for executing me!!!!')
exit()
option()
See more about python at brainly.com/question/18502436
#SPJ1
problem description IT
In IT, a problem description refers to a clear and concise explanation of an issue or challenge that needs to be resolved within a technology system or application.
How is this so?It involves providing relevant details about the symptoms, impact, and context of the problem.
A well-written problem description outlines the specific errors, failures, or undesired behavior observed and provides enough information for IT professionals to analyze and identify potential solutions.
A comprehensive problem description is crucial for effective troubleshooting and problem-solving in the IT field.
Learn more about Problem Description at:
https://brainly.com/question/25923602
#SPJ1
1. When you write HTML code, you use ______ to describe the structure of information on a webpage. a. a web address b. tags c. styles d. links
Answer:
b. tags
Explanation:
When you write HTML code, you use tags to describe the structure of information on a webpage. These tags are represented by the following symbols <>. All of HTML is written using different types of tags such as <body>, <main>, <div>, <nav>, etc. Each of these serves a different purpose but are all used for structuring the specific information on a website so that the information is well organized and is not all on top of each other. This also allows for specific sections to be easily targeted and styles separately from the other sections.
Describe how hackers maintain access in a system. What steps do they follow? What tools do they use? In your opinion, once in a system, is it easy to maintain access? Why or why not? What challenges are there to staying in the system?
The way that hackers maintain access in a system is that Hackers accomplish this by searching for every log and file that might contain information about their movements or presence.
The steps are:
Reconnaissance: This is when hacking begins.Three different kinds of scanning are involved.Gaining Access: During this stage, an attacker enters the system or network using a variety of tools or techniques. Keeping Access Open Clearing the Way:Changing the subject: How do hackers obtain information?One method is to use spyware, which sends data from your device to others without your knowledge or consent, to try and obtain data directly from an Internet-connected device. By tricking you into opening spam email or into "clicking" on attachments, images, and links in it, hackers may be able to infect your computer with spyware.
Note that Hackers may write programs that look for unprotected entry points into computers and network systems. By infecting a computer or system with a Trojan horse—a tool designed by hackers to steal sensitive data secretly from a victim—hackers can gain backdoor access.
Learn more about hackers from
https://brainly.com/question/23294592
#SPJ1
Which top-level domain can be used by anyone, regardless of their affiliation?
A. .gov
B. .edu
C. .org
D. .mil
Answer:
C. org
Explanation:
org is an open domain so anyone is allowed to register a .org domain
how much more impact that greeting card can have if visual elements like color,shapes,and lines were added to it?
The visual component that most strongly influences our emotions is color. To set the tone or ambience, we employ color. For instance, you might feel irritated looking at art that primarily features reds and oranges.
Why are the lines and shapes important in illustration?Form Shape is the artwork's actual physical shape.The basic goal of using line, shape, and form in a painting is to identify the subject matter and offer the necessary information. Artists are taught to visually arrange those components to make powerful compositions.
Therefore, the artist can utilize lines to outline shapes and direct the viewer's attention through the picture. Artists aim to draw the viewer's attention to the main point but also preventing it from becoming "fixed" there.
Read more about greeting card here:
https://brainly.com/question/30541293
#SPJ1
n choosing a career, your personal resources are defined as _____. a. the amount of money you require to accept the job when first hired b. who you are and what you have to offer an employer c. your career decisions and goals d. whether or not you have transportation to and from work
When choosing a career, personal resources are defined as who you are and what you have to offer an employer.
What is a career?A person's progression within a particular occupation or group of occupations can be regarded as their career. Whatever the case, a profession is distinct from a vocation, a job, or your occupation. It also takes into account your development and improvement in daily activities, both professional and recreational.
One of the most important decisions you will ever make in your life is your career. It involves far more than just deciding what you'll do to make ends meet. First, think about how much time we spend at work.
To get more information about Career :
https://brainly.com/question/2160579
#SPJ1
you should always log out after using a networked computer
Yes , This statement is true .
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Which one of the following statements are true about microsoft cloud storage
1.one drive servers are stored in secure data centers
2. Individual companies will have better security than the microsoft data crnters
3. You can be confident that the data is stored under the legal requirements for the country you are in
Answer:
a) OneDrive servers are stored in secured data centers.
OneDrive have one of the most safest data servers which it makes reassured for storing our items using OneDrive.
Do you think privacy policies are effective in social networking sites?
Answer:
When that information gets posted online, it is no longer private, and may end up falling into wrong hands. Even if you have put in place the highest possible security measures, some of your friends, colleagues and companies you interact with on social media, can end up leaking your personal information.
In my opinion, privacy policies are less effective in social networking sites When that fact receives published online, it's far now not private, and can become falling into incorrect hands.
What is the privacy in networking sites?Privacy and safety settings exist for a reason: Learn approximately and use the privateness and safety settings on social networks. They are there that will help you manipulate who sees what you put up and control your online revel in in a fine way.
Even when you have installed location the best viable safety measures, a number of your friends, colleagues and businesses you engage with on social media, can become leaking your private facts.
Read more about the social networking:
https://brainly.com/question/3653791
#SPJ2
JAVA: Code.org AP PROG A
The arrays that can be passed to reverse to show that the method does NOT work as intended is option:
D. {{0, 0}, {1, 1}, {0, 0}}
{{0, 0), (1, 1), (1, 1}, {0, 0}}
What is the arrays about?This array can be passed to the reverse method and it does not work as intended. This is because the for loop only goes through the elements up to arr.length-1 and not till the last element.
It also does not account for the case where the input array is a jagged array with different number of columns in each row.
Therefore, The for loop in the reverse method only goes through the elements up to arr.length-1 which means it does not reach the last element of the array. This means that the last element of the array will not be reversed. Also, the for loop only goes through the elements up to arr[0].length which means it does not account for the case where the input array is a jagged array with different number of columns in each row.
Learn more about arrays from
https://brainly.com/question/24275089
#SPJ1
See transcribed text below
Question: Consider the following method, reverse, which is intended to return the reverse the elements of arr. For example, if arr contains {{1, 2, 3}, {4, 5, 6}}, then reverse (arr) should return {{6, 5, 4}, {3, 2, 1}}.
public static int[][] reverse(int[][] arr) { int[][] ret = new int[arr.length][arr[0].length];
for (int i = 0; i < arr.length - 1; i++) {
for (int j = 0; j < arr[0].length; j++) {
}
ret[i][j] = arr[arr.length - i - 1][arr[0].length - j - 1];
}
}
return ret;
The code does not work as intended. Which of the following arrays can be passed to reverse to show that the method does NOT work as intended?
A. {{0}}
B. {{0}, {0}}
C. {{0, 1}, {0, 1}}
D. {{0, 0}, {1, 1}, {0, 0}}
{{0, 0), (1, 1), (1, 1}, {0, 0}}
Response:
A pharmaceutical company is going to issue new ID codes to its employees. Each code will have three letters followed by one digit. The letters and and the digits , , , and will not be used. So, there are letters and digits that will be used. Assume that the letters can be repeated. How many employee ID codes can be generated
Answer:
82,944 = total possible ID's
Explanation:
In order to find the total number of combinations possible we need to multiply the possible choices of each value in the ID with the possible choices of the other values. Since the ID has 3 letters and 1 digit, and each letter has 24 possible choices while the digit has 6 possible values then we would need to make the following calculation...
24 * 24 * 24 * 6 = total possible ID's
82,944 = total possible ID's
13./ Write a java program to input an integer N and compute its factorial. Print the number and the factorial.
The factorial is calculated by multiplying all the integers from the number upto 1. For example: factorial of
4 (4!) is : 4 x 3 x 2 x 1 = 24 or 4! = 1 x 2 x 3 x 4 =24.
\(write \: a \: java \: program\)
Answer:
Código Java de forma recursiva que nos ayuda a calcular el factorial de ... El factorial de un número es la multiplicación de los número que van del ... Para expresar el factorial se suele utilizar la notación n! ... mayo 5, 2010 - 4:13 am ... un programa q de un numero dado en arabigo o romano lo imprima ya
Explanation:
Espero te sirva!!
John Doe, the Netcare Hospital's IT director, is in charge of network management. He has asked
for your assistance in developing a network solution that will meet the needs of the hospital. The
hospital is expanding, and the management of the hospital has made funds available for network
upgrades. The medical staff would like to be able to access medical systems from any of the
patient rooms using laptop computers. Access to patient medical records, x-rays, prescriptions,
and recent patient information should be available to doctors and nurses. John purchased new
servers for the data center and installed them. The wireless LAN (WLAN) has about 30 laptops,
with another 15 due in six months. The servers must be highly available. The hospital's patient
rooms are located on floors 6 through 10. Doctors should be able to roam and connect to the
network from any floor.
According to a radio-frequency report, a single access point located in each communication closet
can reach all of the rooms on each floor. The current network is comprised of ten segments that
connect to a single router that also serves the Internet. Routing Information Protocol Version 1
is used by the router (RIPv1). The new back-end servers are housed in the same segment as those
on floor 1. John mentions that users have complained about slow server access, he would like to see a proposal for upgrading the network with faster switches and providing faster access to the
servers. The proposal should also include secure WLAN access on floors 6–10. Include an IP
addressing scheme that reduces the hospital's reliance on Class C networks. He wishes to reduce
the number of Internet service provider-leased networks (ISP).
Draw a logical diagram of the existing network. (8)
Because the servers in the back end are situated within the identical segment as those found on the first floor, user response times have drastically declined.
How to solveAt present, the network structure is made up of ten distinguishable segments that are all unified through one router.
This router utilizes Routing Information Protocol Version 1 (RIPv1) for the regulation of its routing dynamics.
There is a Wireless Local Area Network (WLAN) spanning across thirty laptops with an estimated fifteen more to be joined onto it in half a year's time. In each communications closet, there is a separate access point extending its reach over all six to ten stories.
Read more about network management here:
https://brainly.com/question/5860806
#SPJ1
Can someone tell me what to type up this is for my web page design class
Answer:
You have to write the HTML code as given instructions/design.
Write the below code in text file and save as test.html and run.
Explanation:
<html>
<head>
<title>
Storyboard Practice - Text Formatting
</title>
</head>
<body>
<center>
<h1>
Web Design Overview
</h1>
</center>
</body>
</html>
what is flow chart for which purpose flowchart is use in programmimg
A flowchart is a visual representation of a process or algorithm. It uses symbols and arrows to show the steps and the flow of the process. In programming, flowcharts are often used to design and document the logic of a program before it is written in code. They can help programmers visualize the structure of the program and identify potential problems or inefficiencies. Flowcharts can also be useful for explaining the logic of a program to others who may not be familiar with the code..
an excel data source must include ___
A) row labels in the first column
B) column labels in the first row
C) column labels in any row
D) row labels in any column
Answer:
Option (B)
Explanation:
To use Excel files as a data source, you must ensure that the worksheet data is in list format. This means that the data must be set up in a database format consisting of one or more named columns. The first row in each column must have a label, and there can be no blank columns or rows within the list.
Answer:B must have
Explanation:
What is the critical path?
Calculate the minimum overall project completion time and identify which activities are critical by filling out the chart below-forward and backward pass.
What is the maximum time to complete the projects?
Early start Early Finish late start Late finish Slack Critical path?
A
B
C
D
E
F
G
H
Please answer and thank you
Answer:
yeeeee
Explanation:yeeees quen HI SISTERS HI SISTERS
true or false you can create a. network with 2 computers?
Explanation:
true true jsjsdkdkskdkdksksksksk
Answer:
True :)
Explanation:
Research the following statistical tests/tools and in your lab book write what they are
used to determine:
1. Mean
2. Mode
3. Median
4. Minimum
5. Maximum
6. Range
8. Quartile
14. t-test
9. Inter-quartile range
15. Analysis of variance
10. Variance
16. Regression
11. Standard deviation
12. Standard error
7. Confidence level
13. Confidence interval
1. Mean : A group of numbers added together divided by the total number of numbers in the
group
2. Mode : Among a set of numbers, the one that pops up most frequently.
3. Median : The intermediate number among several numbers (half the numbers in the group are higher than the median and half the numbers in the group are lower than the median
4. Minimum : The lowest value in a group of values, eliminating any outliers, is known as the statistical minimum, or h.
5. Maximum: The highest value in a group of values, eliminating any outliers, is known as the statistical maximum, or h.
6. Range: The difference between the greatest and smallest values in a collection of data—the range is calculated by deducting the sample maximum and minimum.
8. Quartile: Three values called quartiles divide sorted data into four equal portions with the same amount of observations in each.
14. T-test : The t-statistic in statistics measures how far an estimated value of a parameter deviates from its hypothesised value in relation to its standard error.
9. Inter-quartile range: The spread of the data is measured statistically by the interquartile range (IQR).
15. Analysis of variance: To examine the variations in means, analysis of variance is a group of statistical models and the corresponding estimation techniques.
10. Variance : The variance is the mean squared difference between each data point and the distribution's mean as determined by each data point.
16. Regression : Regression analysis is a statistical method for connecting a dependent variable to one or more independent (explanatory) variables. A regression model can demonstrate whether variations in the dependent variable are related to variations in one or more explanatory variables.
11. Standard deviation : The standard deviation in statistics is a measurement of how much a group of values can vary or be dispersed. A low standard deviation suggests that values are often close to the set's mean, whereas a large standard deviation suggests that values are dispersed over a wider range.
12. Standard error : The population mean and sample mean are likely to deviate from one another, and the standard error of the mean, or simply standard error, shows how likely this is.
7. Confidence level : Another term for probability in statistics is confidence.
13. Confidence interval: If you repeat your experiment or resample the population in the same manner, the confidence interval is the range of values you expect your estimate to fall within a specific proportion of the time.
Therefore, mean, mode, median, minimum, maximum, range, quartile, t-test, inter-quartile, Analysis of variance, variance, regression, standard deviation, standard error, confidence level, confidence interval are some functions of statistics.
You can learn more about statistics from the given link
https://brainly.in/question/27759019
#SPJ13
What happens to the Menu Bar when the
object (image, shape, etc.) is "active"?
Answer: Ok so Sorry about this but I will answer thing at 10:20 tommorow I promise
Explanation:
Which two statements are true about 4-pin 12 V, 8-pin 12 V, 6-pin PCIe, and 8-pin PCIe connectors?
Sometimes an expansion board may have an extra PCIe power connector. This connector comes in 6-pin and 8-pin configurations.
What are PCIe power connector?
The PCle power connector also known as PEG cables, makes extra power available to PCI Express cards. Mid power to high power graphic cards get their power to function from the PSU through the 6-pin and 8-pin PCI-Express PEG cables. The 6-pin PEG cable graphics card supply capacity is 75 Watt such that a graphics card that requires 75 Watt will have a 6-pin PEG cable to supply its power needs. The 8-pin PEG cable graphics card supply capacity is 150 Watt such that a graphics card that requires 150 Watt will have an 8-pin PEG cable to supply its power needs.
To know more about PCIe power connector, Check out:
https://brainly.com/question/17248311
#SPJ1
2) - How many integers between 1 and 500 inclusive are divisible by either 2, 3, or 5?
366 numbers between 1 and 500 are divisible by 2, 3, or 5.
We can check this with the following code:
And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase
There were 5 staff members in the office before the increase.
To find the number of staff members in the office before the increase, we can work backward from the given information.
Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.
Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.
Moving on to the information about the year prior, it states that there was a 500% increase in staff.
To calculate this, we need to find the original number of employees and then determine what 500% of that number is.
Let's assume the original number of employees before the increase was x.
If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:
5 * x = 24
Dividing both sides of the equation by 5, we find:
x = 24 / 5 = 4.8
However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.
Thus, before the increase, there were 5 employees in the office.
For more questions on staff members
https://brainly.com/question/30298095
#SPJ8
Look at the picture
Answer:
im pretty sure to rent somewhere youd sign a lease
Answer:
mortgage
Explanation:
a mortgage and a lease are simliar but the answer you are looking for is a mortgage
A web application is configured to run on multiple servers. When a webserver goes down, the user connected to it needs to re-login to the application. What could be the likely cause for this behavior
There are different uses of the computer. The likely cause for this behavior is Browser cookies not shared between servers.
What are browser cookies?The computer is often used for browsing or surfing the internet. Cookies are known to be files that has been formed by websites when you visit it.
They are known to make your online experience very easy by saving your browsing information. With the advent of cookies, sites often keep you signed in, and also remember the site you visit most.
See options below
a) Session state maintained by individual servers and not shared among other servers.
b) Browser cookies not shared between servers.
c) Server IP address changes
d) The user has to re-authenticate due to security reasons.
e) Browser using sticky session cookies
Learn more about Browser cookies from
https://brainly.com/question/14102192
1. What is a situation—other than developing software—where it would be useful to follow the software development life cycle? Describe what this process might look like.
2. In this unit, you learned about four types of operating systems. Imagine that you had been hired as a consultant to a new start-up that was going to create and sell a new emergency medical device. Which kind of operating system would you recommend to them? As part of your answer, explain why the other three types of operating systems would be less appropriate.
3. Describe three different software applications that you have used recently.
4. In this unit, you learned about procedural, object-oriented, and event-driven programming. Describe an example of each one in commonly used software.
5. Many people express frustration when they have to contact customer support for help with their software. Describe two things that companies can do to make customer support a more pleasant experience for its users.
There are different kinds of software. Requirement Gathering and also designing is another stage where it would be useful to follow the software development life cycle.
Why is important to know the software development life cycle?The software development life cycle is said to be one that increase the value to software development as it helps to give an efficient structure and method to create software applications.
Windows operating systems is the one I would recommend to them as it is much easier to operate than other types.
The three different software applications that you have used mostly are Electronic Health Record (EHR) Software, Medical database software and Medical imaging software. They are often used in the healthcare system on daily basis.
Event-driven programming software is the often used in graphical user interfaces and other kinds of system applications such as JavaScript web applications. They are based on carrying out some task in response to user input.
Companies can make customer support a more better by actively to them especially their complains and make sure it is handled immediate. They should also list out the cases of high priority and work on them.
Learn more about Developing software from
https://brainly.com/question/22654163
Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed by reference are automatically passed by value
Answer:
are automatically passed by reference.
Explanation:
A parameter can be defined as a value that can be passed to a function. Thus, a parameter refers to a value that must be passed into a function, subroutine or procedure when it is called.
This value can be passed to a function either by reference or by value.
This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.
Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.
In Computer programming, an array can be defined as data structure which comprises of a fixed-size collection of variables each typically holding a piece of data and belonging to the same data type such as strings or integers.
This ultimately implies that, when a programmer wishes to store a group of related data (elements) of the same type, he or she should use an array.
A character positions in arrays start counting with the number 0 not 1.
Hence, an array uses a zero-based indexing and as such the numbering or position of the characters (elements) starts from number 0. Thus, the first character (element) in an array occupies position zero (0), the second number one (1), the third number two (2) and so on.
Generally, arrays of structures are automatically passed by reference through the use of a REPLICATE function.
How are BGP neighbor relationships formed
Automatically through BGP
Automatically through EIGRP
Automatically through OSPF
They are setup manually
Answer:
They are set up manually
Explanation:
BGP neighbor relationships formed "They are set up manually."
This is explained between when the BGP developed a close to a neighbor with other BGP routers, the BGP neighbor is then fully made manually with the help of TCP port 179 to connect and form the relationship between the BGP neighbor, this is then followed up through the interaction of any routing data between them.
For BGP neighbors relationship to become established it succeeds through various phases, which are:
1. Idle
2. Connect
3. Active
4. OpenSent
5. OpenConfirm
6. Established
ctivity 2: irections: Convert the given value to unit asked. 1. 1 tb 2. 500 mb 3. 200 kb 4. 1,000,000 bytes 5. 500 gb mb gb byte gb mb
help please
Answer:elab
Explanation: