A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Assume the search name is always in the list. Ex: If the input is: Joe, 123-5432 Linda, 983-4123 Frank, 867-5309 Frank the output is: 867-5309
Q: In addition to its other functions, what does the central processing unit do? Your thoughts? Your…
A: The combination of a computer plus extra hardware and software is known as a computer system. It has…
Q: You are going to create an autogenerated list of numbers. Ask a user for a random number between…
A: Note : You have not mention the language of the program so i'm answering your question in Python.…
Q: What is the difference, precisely, between the connotative and the denotative meanings of the word?
A: Here is a table summarizing the differences between denotative and connotative meanings:
Q: The loss of trust in the database's ability to maintain its own references might have disastrous…
A: Orphaned records: This occurs when a record is deleted or updated without updating the associated…
Q: prefixes = 'JKLMNOPQ' suffix = 'ack' for letter in prefixes: print(letter + suffix) Put this…
A: Introduction In Python, a string is a sequence of characters, and string slicing allows us to…
Q: Define a method before discussing its three essential aspects.
A: Method You want your newly made objects to be able to carry out some function. Approaches come into…
Q: Select the appropriate expression to describe the output of a computer that is written directly to…
A: The dimensions of an ISO A6 sheet of paper are identical to those of a microfiche, which is a sheet…
Q: Differentiate between two-tier and three-tier application architectures. Web apps: which is best?…
A: The application functionality is hidden within the server database, on the client (within the…
Q: Morality in the age of technology?
A: The following are some of the most pressing moral concerns raised by data innovation: The Right to…
Q: use the file Dining.java which is provided below and Complete the calcTip() method as described in…
A: Declare variables for the tip and a boolean variable for drinks Print the input statement "Were…
Q: Is it possible to use dynamic programming to arrive at a lot of alternative options that are all…
A: It utilizes dynamic programming to solve issues that can be decomposed into subproblems. Before…
Q: What precisely is meant when someone refers to something as having a "three-tier architecture"?
A: A "three-tier architecture" is a software architecture pattern that divides an application into…
Q: Why not provide people a number of different alternatives when it comes to storing their XML data
A: Introduction An abstract SQL data type called XMLType offers a variety of indexing and storage…
Q: When it comes to caching, is the
A: Introduction: Caching is a technique used to speed up data access by storing frequently accessed…
Q: Write the pseudocode for an application that will implement the requirements below. Although the…
A: Here is the pseudocode for an application that will implement the requirements:
Q: What precisely is intended by the phrase "Infrastructure as a Service" (also written as…
A: The answer to the question is given below:
Q: Demonstrate how trademark ownership may violate a person's free speech rights. How can these…
A: The right to own a trademark can sometimes get in the way of free speech, especially if the brand is…
Q: Defend the rationale for why CRT displays often have a faster refresh rate than LCD monitors.
A: Your answer is given below.
Q: Cryptographic secret keys and public keys—the what's difference?
A: The distinction between the private key and the public key in cryptography
Q: Is there anything you can do to keep your computer safe from power surges, and what other…
A: Introduction: A power surge is a sudden, brief increase in electrical power in an electrical circuit…
Q: Extensible Markup Language is an abbreviation that stands for Extensible Markup Language, which is…
A: Yes, the given statement is correct. XML stands for Extensible Markup Language. It is a markup…
Q: Please develop a table comparing engineering ethics to computer ethics and provide five instances of…
A: The following is the required table comparing engineering ethics to computer ethics: Engineering…
Q: You can choose a Microsoft-hosted Azure Pipelines agent that runs Windows, Linux, or macOS. Select…
A: Yes, the statement is true. Azure Pipelines offers Microsoft-hosted agents that can run on Windows,…
Q: Today's businesses need social media. CIOs struggle to engage workers on social media.
A: Your difficulties with social networking sites Computing the Investment Return Developing a strategy…
Q: It is typical practice for database system implementations to use a strict two-phase locking…
A: Protocol: Protocol is a set of rules and guidelines that define how two or more entities interact…
Q: What separates computer ethics, IP, copyright, and patent in the business context?
A: Computer ethics pertains to the moral principles in using technology,while intellectual…
Q: Which two computer motherboard components are most important?
A: In this question we need to explain the two most important components of a computer motherboard.
Q: Do you monitor employee performance?
A: An employee is a person or organization that compensates them for their labor. To be considered…
Q: File manager? Explain Windows Explorer. Include certain file storage and storage areas.…
A: We need to answer some questions related to file manager like what is file manager actually and what…
Q: If you turn on the computer for the first time and don't hear the fan or see any lights, is it…
A: If you turn on the computer for the first time and don't hear the fan or see any lights, it is most…
Q: What distinguishes symmetric from asymmetric key cryptography?
A: Introduction: Symmetric key cryptography is a type of encryption where the same key is used for both…
Q: If you power on your computer for the first time and don't see any indication lights or hear a…
A: Introduction The Central Processor Unit (CPU) is the main hub of a computer's internal machinery.
Q: What are the two app-based service categories? What makes these services unique in their categories?
A: There are numerous types of app-based services available in the market, but they can broadly be…
Q: Reusing application system components instead of developing unique software to satisfy individual…
A: This section serves to introduce you to both of these ideas. 1: Reusing Existing Application Systems…
Q: For what reason would stack systems use backwards Polish notation to represent arithmetic…
A: Introduction Arithmetic expression: An arithmetic expression is a mathematical statement that…
Q: One may search memory via direct or sequential access. Both access methods work. How is rapid access…
A: Rapid access to the latest technology is feasible through direct access methods, such as random…
Q: Compilers and assemblers may sequence assembly language instructions to minimize pipeline risk.…
A: Assembly language instructions may be organised in a pipeline using compilers and assemblers in a…
Q: Provide an example of how APIs may be used to connect new and existing systems
A: Sure! Let me give you an example: Suppose a company wants to integrate a new payment gateway into…
Q: Do you know how to prevent a sudden power surge from ruining your computer? If so, please leave a…
A: It would be best if you used a surge protector with your computer, regardless of whether it is a…
Q: What's a firewall's main job?
A: Note: As per guidelines, we can solve only one question at a time. Hence resubmit the question foe…
Q: Could you explain a cache hierarchy's fundamentals?
A: Given: What would you say a real cache hierarchy looks like? Answer: The hierarchy of a cache is: L1…
Q: Explain each OSI model layer, its seven sublayers, and its protocols.
A: GIVEN: Explain the OSI layer, the seven layers, and the protocols that run in each layer. OSI: An…
Q: Application development tools from these suppliers: Provide examples.
A: By offering features like an IDE, code-free development, templates, API, data synchronisation, and…
Q: Write an m-file that 1. Plots f(t) over the interval 0 ≤t≤ 2 using the equation f(t)=t/2. The time…
A: According to the Bartleby guideline, we are supposed to answer only one question at a time. Kindly…
Q: Why not provide people a number of different alternatives when it comes to storing their XML data?
A: XML is an excellent option for storing data in many situations. It is simple to read and write. It…
Q: Contemplate wireless networks in poor nations. Wireless has supplanted cable and earlier local area…
A: Introduction: Billions of individuals now have access to the Internet and can take part in the…
Q: Network and personal firewalls-how would you defend your home network?
A: In light of the query Devices linked to your network are shielded from internet intruders by a home…
Q: Please briefly describe memory addressing and its importance.
A: Memory addressing is the process of locating and accessing specific locations or cells within a…
Q: Please implement the sorted list class with array implementation, and use binary search to find…
A: A sorted list class using an array is a data structure that stores elements in an array in sorted…
Q: Name and explain the various types of interviews. Which is more effective?
A: The answer is given in the below step
Step by step
Solved in 3 steps with 2 images
- A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 python pleaseA contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 LAB 6.21.1: LAB: Contact list 0/ 10 ACTIVITY main.py Load default template... 1 user_input = input() 2 entries = user_input.split() 3 contact_list = dict(pair. split(':') for pair in entries)A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309
- A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 please make it simple im a starter at pythonIN JS PROGRAMMING LANGUAGE Your local bank has decided to upgrade its ATM machines by incorporating motion sensor technology. The machines now interpret a series of consecutive dance moves in place of a PIN number. Create a program that converts a customer's PIN number to its dance equivalent. There is one dance move per digit in the PIN number. A list of dance moves is given in the code. Examples danceConvert("0000") danceConvert("3856") ["Shimmy", "Shake", "Pirouette", "Slide"] → ["Slide", "Arabesque", "Pop", "Arabesque" ] -When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. Write a program to adjust the values by subtracting the smallest value from all the values. Assume that the list will always contain different numbers. Ex. If the list of numbers is: 40 50 10 90 75 The adjusted list is: 30 40 0 80 65 The program first will ask the user to enter the number of integers to be adjusted. Then The following functions should be used: The function dataCollection should be called to make a dynamic array to hold the user entered integers. It prompts the user to enter the list of numbers. A pointer to the array should be returned. The function minVal receives an array and its size as arguments. It finds and returns the smallest number in the array. The function adjust receives an array, the array size, and an integer as arguments. It will create an array with the same size as the argument array, but subtract the last…
- This task involves writing a program that calculates the standard deviation of all numbers in a list. First, the number of the number in the list is entered, then each number is entered. The program should print the standard deviation of the numbers in the list. Note, the values entered into the program are part of a random sample, which may need to be taken into account when choosing a method to calculate the standard deviation.This task involves writing a program that calculates the standard deviation of all numbers in a list. First, the number of the number in the list is entered, then each number is entered. The program should print the standard deviation of the numbers in the list. Note, the values entered into the program are part of a random sample, which may need to be taken into account when choosing a method to calculate the standard deviation.You have a list of student ID’s followed by the course number (separated by a space) that the student is enrolled in. The listing is in no particular order. For example, if student 1 is in CS100 and CS200 while student 2 is in CS105 and MATH210 then the list might look like this:1 CS1002 MATH2102 CS1051 CS200Write a program that reads data in this format from the console. If the ID is −1 then stop inputting data. Use the HashMap class to map from an Integer (the student ID) to an ArrayList of type String that holds each class that the student is enrolled in. The declaration should look like this:HashMap<Integer, ArrayList<String>> students =new HashMap<Integer, ArrayList<String>>();After all data is input, iterate through the map and output the student ID and all classes stored in the vector for that student. The result should be a list of classes organized by student ID.
- JAVA PROGRAM THIS PROGRAM MUST WORK IN HYPERGRADE. The output should DISPLAY the following: Enter a name to search or type QUIT to exit:\n And then I type Anabelle AND PRESS ENTER and print out this: The name 'Annabelle' was not found in either list.\n And then repeat Enter a name to search or type QUIT to exit:\n AND THEN I TYPE xavier and press enter and print out The name 'Xavier' was found in popular boy names list (line 81).\n Then repeat Enter a name to search or type QUIT to exit:\n and then I type AMANDA and press enter and print out The name 'Amanda' was found in popular girl names list (line 63).\n then repeat Enter a name to search or type QUIT to exit:\n then I type jOrdAn and press enter and print out The name 'Jordan' was found in both lists: boy names (line 38) and girl names (line 75).\n then repeat Enter a name to search or type QUIT to exit:\n and then I type quit and press enter to end the program. I HAVE PROVODED THE SCREENSHODE OF THE TEXTFILES AND THE TEST…Computer Science C# Programming Object Orientation Please use Arrays or ArrayLists where appropriate Implement a menu driven program that has some operations for a food truck. A food truck has multiple food items as well as a menu which contains a selection of the food items which will be sold for that day. A maximum of 10 food items can appear on the menu for any day. For each food item keep a code, description, category, price and quantity in stock (code, description and category are not usually changed). Create a comma delimited text file called "items.txt" for 15 or more food items, indicating the item's description, category, price and quantity in stock. Read all the food items from the text file “Items.txt” Display all the food items available for this food truck. Continuously prompt the user for a food item’s code to be placed on the menu until the menu is full or the user enters -1. Note that only food items which have a positive quantity in stock may be added to…python LAB: Subtracting list elements from max When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers. Write a program that adjusts a list of values by subtracting each value from the maximum value in the list. The input begins with an integer indicating the number of integers that follow.