A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Assume the search name is always in the list. Ex: If the input is: Joe, 123-5432 Linda, 983-4123 Frank, 867-5309 Frank the output is: 867-5309
Q: How does the CAP theorem work in practise? What does "NoSQL" mean in databases?
A: The CAP theorem, also known as Eric Brewer's theorem, asserts that a database may achieve just two…
Q: Please describe one cache protocol's internals.
A: Introduction: The Cache Protocol is a set of rules that allows a web browser to communicate with a…
Q: Some people could be drawn to cybercrime.
A: Cybercrime:Criminal action that uses or targets a computer, a computer network, or a networked…
Q: Please explain how the machines were bought, used, and accounted for.
A: The purchase, use, and accounting of machines can vary depending on the context and the…
Q: The capacity of multicore architecture to accommodate a large number of cores is the defining…
A: Introduction Multicore architecture is how computer processors are made so that they have more than…
Q: Provide an explanation of the key distinctions between unit testing and integration testing, as well…
A: The difference between unit testing and integration testing, as well as methods for doing black box…
Q: How do you keep track of array components with data even if they're half full?
A: Keeping an eye on the details A set of statements are kept in partially populated arrays. The…
Q: How do you stay current in management?
A: Successful managers get to know their employees better and find ways to support them to do their…
Q: The Large Hadron Collider grid computing project has technological and non-technical challenges.…
A: Distributed processing grids Grid computing involves bringing together disparate sets of computers…
Q: What's software to you? Is it significant? Why? Provide examples.
A: A collection of program, instructions, and data collectively referred to as "software" allow a…
Q: Which application software purchase method saves time and money? Please provide examples.
A: Introduction: All of your actions and the software that gives you the ability to achieve your…
Q: How can integrated circuits outperform discrete ones?
A: An integrated circuit (IC), often known as a chip or microchip, may serve as an amplifier,…
Q: Eventually, what is Al's purpose? Do any primary topics have specific examples?
A: Create the AI's goals: Academics in the past created algorithms that imitated humans' step-by-step…
Q: Find the shortest path and the minimum cost for the following network using Bellman's algorithm: 2 1…
A: Answer: We need to find the shortest path from source to destination using the Bellman ford…
Q: The function of OLAP should be elucidated through descriptive analytics.
A: OLAP, or Online Analytical Processing, is a technology that enables analysts and decision-makers to…
Q: Show the five most common uses of computer-aided system design and modelling using real-world…
A: System Design offers a wide range of design, modelling, and simulation services for fast,…
Q: Describe an actual SQL database.
A: A predetermined schema is used by SQL Databases to understand and decode data, according to the…
Q: Why did the developers of Linux decide to use a kernel that is not preemptible? With a computer…
A: Introduction: The Linux kernel was originally designed by Linus Torvalds in 1991 as an open-source…
Q: 1. For global variables in C: (1) how can they be accessed in other C files? (2) how can a global…
A: To access global variables in other C files, you can declare the global variable in one file and…
Q: How important is data security during storage and transport? Which technique best protects data and…
A: The practice of safeguarding company data and avoiding data loss due to illegal access is known as…
Q: EPIC-style active hardware metering offers design-level computer system safety utilizing these three…
A: EPIC (Explicitly Parallel Instruction Computing)-style active hardware metering is a technique used…
Q: Explore the characteristics of massive data sets and organize them into a variety of categories.
A: Big-Data:- Big Data is a term used to refer to datasets that are too large or complex for…
Q: Many CPU cores-what does it mean? End consumers benefit from multi-core CPUs. There's no need for…
A: CPU with several cores: A single integrated circuit (also known as a chip multiprocessor or CMP)…
Q: Privilaged users get different instructions.
A: Privilege-Level Instructions: Privileged Instructions are those that can only be executed in Kernel…
Q: How do you stay current in management?
A: I'm continuously reading a book on the subject. My supervisors' criticism is taken seriously, and I…
Q: The Access Control list is extensively dissected.
A: In terms of a computer file system, an access control list (ACL) is a list of permissions associated…
Q: How crucial is work satisfaction to an organization's success?
A: Work satisfaction is crucial to an organization's success for several reasons: Employee Retention:…
Q: "Access rights byte" use in protected mode?
A: Answer the above question are as follows
Q: Please explain how the machines were bought, used, and accounted for.
A: Considering the information provided: We must explain how the computers were acquired, utilised, and…
Q: Why does society require access restrictions? Provide two access limitations in your answer.
A: Introduction: The term "access control" refers to a set of security measures used to restrict the…
Q: Is Windows' architecture reactive or proactive? Which one performs best? What's going on there?
A: Proactive architecture An approach to the design of computer systems known as proactive architecture…
Q: Instead of the snowflake model, write about the pros and cons of the star schema. Which one deviates…
A: Snowflake model:- The snowflake model is a data warehousing architecture that uses a dimensional…
Q: What are the rules that must be strictly adhered to in the process of developing an architecture?
A: In the field of computer science, the rules that must be strictly adhered to in the process of…
Q: Provide a clear and succinct description of the many stakeholders involved in the creation of the…
A: Introduction System: A system is a group of interrelated components that operate together to…
Q: How will you secure your Linux systems?
A: Securing a Linux system involves taking a multi-layered approach to protect against various types of…
Q: The field of study known as computer science examines computers. What kinds of things do you want to…
A: You must create something that benefits people, makes life simpler for them, or positively impacts…
Q: What does it really mean to claim that a computer system has a "architecture"?
A: In this question we have to understand what does it really mean to claim that a computer system has…
Q: Select FirstName,LastName,department,project_name,hours from employeetab,Project where…
A: This SQL code aims to select certain columns from two tables, employeetab and Project, join them…
Q: When someone refers to "multimedia software," what precisely do they mean by that term?
A: Multimedia It is a blend of animation, graphics, video, photos, and audio that is used to create a…
Q: Discuss various AI methods. Provide examples to support your arguments.
A: 1) Artificial Intelligence (AI) is a field of computer science that focuses on the development of…
Q: The function of OLAP should be elucidated through descriptive analytics.
A: OLAP, or Online Analytical Processing, is a tool that helps analysts and decision-makers get insight…
Q: pagation mechanism and the Model-View-Controller architecture, to completely modify the interface of…
A: Introduction:When considering the propagation method in the context of the version view controller…
Q: Describe the difference between pixel graphics and object graphics, then compare and contrast their…
A: Pixel graphics and object graphics are two distinct types of graphics used in digital art and…
Q: Task - Using pointers to process arrays (C Languaage) In a TV show, each minute can be either…
A: Interesting minute should less than or equal to currTime+7 in order for average person to continue…
Q: I need ER Diagram with ER diagram symbols and notations (as in rectangle, diamond, ellipse, ect).…
A: An Entity Relationship (ER) Diagram is a type of flowchart that illustrates how entities such as…
Q: In VES modeling, how do smooth and layered models differ?
A: The smooth model and the layered model are the two varieties of models that may be used in the…
Q: Computer studies Privatizing the penitentiary system: pros and cons?
A: What Benefits Do Private Prisons Offer? Regarding service pricing constraints, private businesses…
Q: Sun Solaris supports user and kernel threading. Describe just Solaris' threading strategy's pros and…
A: Introduction Operating systems manage hardware and software resources as well as provide common…
Q: Compare magnetic versus solid-state secondary storage devices and analyse their pros and downsides.
A: magnetic storage devices such as hard disks. Optical storage devices such as CDs, DVDs, and Blu-ray…
Q: Authentication—useful? Best authentication methods?
A: Authentication allows businesses to maintain the security of their networks by allowing only…
The source code of the program
contacts = {}
# read in the contact list
while True:
line = input()
if not line:
break
name, phone = line.split(',')
contacts[name.strip()] = phone.strip()
# read in the search name and output the associated phone number
search_name = input().strip()
print(contacts[search_name])
Step by step
Solved in 4 steps with 2 images
- A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 python pleaseA contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 LAB 6.21.1: LAB: Contact list 0/ 10 ACTIVITY main.py Load default template... 1 user_input = input() 2 entries = user_input.split() 3 contact_list = dict(pair. split(':') for pair in entries)A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309
- A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 please make it simple im a starter at pythonIN JS PROGRAMMING LANGUAGE Your local bank has decided to upgrade its ATM machines by incorporating motion sensor technology. The machines now interpret a series of consecutive dance moves in place of a PIN number. Create a program that converts a customer's PIN number to its dance equivalent. There is one dance move per digit in the PIN number. A list of dance moves is given in the code. Examples danceConvert("0000") danceConvert("3856") ["Shimmy", "Shake", "Pirouette", "Slide"] → ["Slide", "Arabesque", "Pop", "Arabesque" ] -This task involves writing a program that calculates the standard deviation of all numbers in a list. First, the number of the number in the list is entered, then each number is entered. The program should print the standard deviation of the numbers in the list. Note, the values entered into the program are part of a random sample, which may need to be taken into account when choosing a method to calculate the standard deviation.
- When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. Write a program to adjust the values by subtracting the smallest value from all the values. Assume that the list will always contain different numbers. Ex. If the list of numbers is: 40 50 10 90 75 The adjusted list is: 30 40 0 80 65 The program first will ask the user to enter the number of integers to be adjusted. Then The following functions should be used: The function dataCollection should be called to make a dynamic array to hold the user entered integers. It prompts the user to enter the list of numbers. A pointer to the array should be returned. The function minVal receives an array and its size as arguments. It finds and returns the smallest number in the array. The function adjust receives an array, the array size, and an integer as arguments. It will create an array with the same size as the argument array, but subtract the last…You have a list of student ID’s followed by the course number (separated by a space) that the student is enrolled in. The listing is in no particular order. For example, if student 1 is in CS100 and CS200 while student 2 is in CS105 and MATH210 then the list might look like this:1 CS1002 MATH2102 CS1051 CS200Write a program that reads data in this format from the console. If the ID is −1 then stop inputting data. Use the HashMap class to map from an Integer (the student ID) to an ArrayList of type String that holds each class that the student is enrolled in. The declaration should look like this:HashMap<Integer, ArrayList<String>> students =new HashMap<Integer, ArrayList<String>>();After all data is input, iterate through the map and output the student ID and all classes stored in the vector for that student. The result should be a list of classes organized by student ID.JAVA PROGRAM THIS PROGRAM MUST WORK IN HYPERGRADE. The output should DISPLAY the following: Enter a name to search or type QUIT to exit:\n And then I type Anabelle AND PRESS ENTER and print out this: The name 'Annabelle' was not found in either list.\n And then repeat Enter a name to search or type QUIT to exit:\n AND THEN I TYPE xavier and press enter and print out The name 'Xavier' was found in popular boy names list (line 81).\n Then repeat Enter a name to search or type QUIT to exit:\n and then I type AMANDA and press enter and print out The name 'Amanda' was found in popular girl names list (line 63).\n then repeat Enter a name to search or type QUIT to exit:\n then I type jOrdAn and press enter and print out The name 'Jordan' was found in both lists: boy names (line 38) and girl names (line 75).\n then repeat Enter a name to search or type QUIT to exit:\n and then I type quit and press enter to end the program. I HAVE PROVODED THE SCREENSHODE OF THE TEXTFILES AND THE TEST…
- This task involves writing a program that calculates the standard deviation of all numbers in a list. First, the number of the number in the list is entered, then each number is entered. The program should print the standard deviation of the numbers in the list. Note, the values entered into the program are part of a random sample, which may need to be taken into account when choosing a method to calculate the standard deviation.Computer Science C# Programming Object Orientation Please use Arrays or ArrayLists where appropriate Implement a menu driven program that has some operations for a food truck. A food truck has multiple food items as well as a menu which contains a selection of the food items which will be sold for that day. A maximum of 10 food items can appear on the menu for any day. For each food item keep a code, description, category, price and quantity in stock (code, description and category are not usually changed). Create a comma delimited text file called "items.txt" for 15 or more food items, indicating the item's description, category, price and quantity in stock. Read all the food items from the text file “Items.txt” Display all the food items available for this food truck. Continuously prompt the user for a food item’s code to be placed on the menu until the menu is full or the user enters -1. Note that only food items which have a positive quantity in stock may be added to…python LAB: Subtracting list elements from max When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers. Write a program that adjusts a list of values by subtracting each value from the maximum value in the list. The input begins with an integer indicating the number of integers that follow.