1) Create two dictionaries: one should contain bank account number as key and the customer name as value. The other should contain bank account number as key and the balance as value. (1 pt) Ex:An account dictionary with one entry: {'109': 'John Doe'} A balance dictionary with one entry: {'109': 2500.58} Create the following 4 accounts:Account #: Name: Balance ($): '109' 'John 'Doe' 2500.58 '110' 'Mary Woods' 1070.50 '111' 'Sam Brown' 7850.00 '112' 'Mark Miller' 5000.95
Q: escribe the process that ensures a single round of DES satisfies the complementation characteristics…
A: The Data Encryption Standard (DES) uses a key schedule to generate subkeys from the original key,…
Q: Design a program that prompts the user to enter a number within the range of 1 through 10. The…
A: Introduction Roman Numerals: Roman numerals are a type of numbering system that dates back to…
Q: For reasons pertaining to data protection, the values of some database properties could be…
A: 1. A Database Management system (or DBMS). 2. It is essentially nothing more than a computer-based…
Q: Is there a purpose to AI, and if so, what is it? To illustrate your points, please include a brief…
A: Artificial intelligence research aims to provide smart technology for computers and devices.…
Q: True or False We can define a custom generic exception.
A: Answer:- True.
Q: Exactly what benefits does it provide to having servers automatically supplied and configured? I was…
A: Answer: We need to explain the what benefit does and negative using technology replace human labor .…
Q: a Virtual Private Network (VPN) appliance as opposed to an operating system Contrast and compare the…
A: The reply to your query is in the next section. A functional computer OS (OS) OS acts as a…
Q: A wide variety of AIs exist today. Give some concrete examples of how AI may be used in different…
A: Artificial Intelligence:- Artificial Intelligence (AI) is a branch of computer science that deals…
Q: A web application for an online shopping website that was not created very well hides the price of…
A: given scenario is: A web application for an online shopping website that was not created very well…
Q: Give concrete examples to clarify the review process for software structures.
A: In this question we need to explain review process for software structures with proper examples.
Q: The easiest technique to update a file's string content is what?
A: String: In a programming language, a string is a group of characters. In most programming languages,…
Q: When passwords are used for authentication, how may a client attack (a remote attack) be launched…
A: Though some don't distinguish between positive identification estimate and cracking, it's wise to do…
Q: What are the differences between the various sliding window protocols used in the data connection…
A: Introduction: Sliding Window Protocol: The sliding window is a technique for sending multiple frames…
Q: Some fundamental distinctions exist between the divide-and-conquer tactic and dynamic programming.
A: Given: The topic of "Some fundamental distinctions exist between the divide-and-conquer tactic and…
Q: Determine the real root of f(x) = −26 + 85x − 91x 2 + 44x3 − 8x4 + x5 : (a) Graphically. (b) Using…
A: The algorithm of the code is as follows: Import the required libraries (matplotlib, numpy).…
Q: Describe the difference between a chained conditional and a nested conditional. Give your own…
A: Introduction of Python Programming Language: Python is a programming language that is considered to…
Q: Experiencing slowdowns in performance is possible while using an application proxy due to the…
A: 1. A computer network refers to interconnected computing devices that can exchange data and share…
Q: When people talk about dynamic programming, what do they mean, and how does it work?
A: Dynamic programming is a mathematical optimization and PC programming style. Richard Bellman's 1950s…
Q: How did the Internet of Things come to be, and what are some of its present applications?
A: Internet of things history: The idea behind the "internet of things" is that physical items that…
Q: Use cin to read floating-point numbers from input as area readings until four readings are read that…
A: The algorithm of the code can be described as follows: Initialize two variables: currentArea as a…
Q: What Do You Mean By "Computer" And "Internet"?
A: 1. Define Internet and Computer The term "computer science" is used. The subject is so broad that it…
Q: Come up with five measures to take to protect yourself against cyberattacks, and justify their…
A: Introduction: A cyberattack is a type of malicious attack that targets computers, networks, or other…
Q: Constructing AI with the aim of deploying it in healthcare settings Can you tell us anything further…
A: Artificial intelligence (AI) Artificial intelligence is often used to provide users tailored…
Q: When you say "the wireless revolution" and "the Internet of Things," what exactly do you mean?
A: This inquiry concerns the Internet of Things and the wireless revolution. Cloud computing, the…
Q: Discuss the following words as they pertain to network security and defensive strategies: The…
A: Your answer is given below.
Q: If a DDoS assault relies on several computers being brought down at the same time, how can a single…
A: A distributed denial of service (DDoS) attack leverages numerous hacked computers to flood a target…
Q: If you were troubleshooting a basic network, what steps would you take and what commands would you…
A: Introduction: Two or more computers sharing information and resources is a network. Troubleshooting…
Q: Let's talk about where AI is headed now that we've made such great strides.
A: 1. The simulation of human intelligence processes by machines, particularly computer systems, is…
Q: Think about where we could be heading with AI given where we are now.
A: Introduction: AI is changing almost every sector and individual on Earth. AI is driving the…
Q: Why do so many disgruntled current and former employees often resort to the "logic bomb" method of…
A: Cyber Security:- Cybersecurity is the activity of preventing unauthorized access to, use of,…
Q: To summarise in less than a hundred words, do a cost-benefit analysis of implementing NAS and SAN…
A: Definition: A SAN is a closely connected network of several devices that is more costly and…
Q: Read the two sides of a rectangle and calculate its area 1. Problem Analysis Chart (PAC): a-Given…
A: Problem Analysis Chart (PAC): a. Given Data: length (l) and width (w) of the rectangle b.…
Q: We consider a Bayesian network with 74 variables including Variables A, B, and C. If we want to…
A: A Bayesian network is a graphical model used to represent the probabilistic relationships between…
Q: Given the present state of the field, what do you see as the future of artificial intelligence?
A: Artificial Intelligence: The term "artificial intelligence" refers to the capacity of a computer or…
Q: Mukherjee seems to think that a human rights oriented approach to S&T&D is essential to building a…
A: Given Do you agree with Mukherjee that human rights-based science, technology, and development can…
Q: How many distinct AIs are there to choose from? The numerous varieties of AI and the applications…
A: Introduction : The term "artificial intelligence" (AI) refers to a branch of computer science that…
Q: Look at both the procedural and modular approaches to programming.
A: 1) The procedural and modular approaches to programming are two distinct programming paradigms that…
Q: Read Blown to Bits pages 253-257 write a response to the following two prompts. Your prompts should…
A: Internet: The internet is a vast network of computers and other devices that are connected,…
Q: Here is how this algorithm works step-by-step: Step 1: a = 345 and b = 89 Step 2: 345 ÷ 89 = 3 with…
A: Introduction Euclidean algorithm: A technique for determining the greatest common divisor (GCD)…
Q: Exactly what is meant by the term "artificial intelligence," then? If possible, provide an…
A: Artificial intelligence refers to a mechanism of allowing machines to think like humans.
Q: Remember that the complement of a DFA may be found by just swapping the accept and non-accept…
A: Transition function and set of approval states, not simply swap the approved and rejected states.
Q: Explain how a general-purpose computer is different from an embedded computer by providing an…
A: Computers that are embedded are made for a particular purpose. General-purpose computers are…
Q: Create a list of five things you can do to safeguard yourself against cyberattacks, and explain why…
A: Cyberattacks: A cyberattack is a malicious and deliberate attempt by an individual or group to…
Q: What is the symmetric difference of sets {1, 3, 5} and {2, 3}? O {2, 5} O{1, 2, 5} O{1, 2, 3, 5}…
A: Introduction of Symmetric: Symmetric refers to a property of an object or a mathematical concept,…
Q: Group the various DNS record kinds together. Give a concise explanation of each, illuminating its…
A: Given: Various DNS record types Task: Group the DNS record types and explain their usage and…
Q: Definition of Artificial Intellect: the capacity of a computer, or a robot under the direction of a…
A: The promise of AI for the future The Prospects for AI in Various Industries -\healthcare It…
Q: In English, VOT values tend to be positive for voiceless stops and around zero for voiced stops.…
A: 1. Programming is the process of creating a set of instructions that tells a computer how to perform…
Q: There exist sets A and B such that A E B and ACB. True False
A: The above question is solved in step 2 :-
Q: To what extent may the most typical CLI troubleshooting commands be used to detect and fix network…
A: Introduction Command Line Interface (CLI): Command Line Interface (CLI) troubleshooting commands…
Q: It is recommended that DNS records be sorted by record type. Give a brief description of each and…
A: DNS records, sometimes referred to as zone files on authoritative DNS servers, are used to give a…
(1) Create two dictionaries: one should contain bank account number as key and the customer name as value. The other should contain bank account number as key and the balance as value. (1 pt) Ex:An account dictionary with one entry: {'109': 'John Doe'} A balance dictionary with one entry: {'109': 2500.58}
Create the following 4 accounts:Account #: Name: Balance ($): '109' 'John 'Doe' 2500.58 '110' 'Mary Woods' 1070.50 '111' 'Sam Brown' 7850.00 '112' 'Mark Miller' 5000.95
Step by step
Solved in 2 steps
- ‘Write a program to maintain grades for a class. The program will repeatedly prompt the user with the following menu, and use functions to perform the tasks ofuser's choice. Exit 1. Enter student info 2. Print grades for a student 3. Print class max, min, and average grades The program should use a dictionary to keep information about a student, including the student names and grades for three exams: midterm 1, midterm 2 andfinal exam. Assume the grades are positive integers between 0 and 100. The program should keep information about the students in a list for the entire class. ‘Assample run of the program is as follows. Exit 1. Enter student info 2. Print grades for a student 3. Print class max, min, and average grades Enter your choice: 1 Do you want to enter student info (y/n):Enter the student name: Adams Enter midterm 1 grade: 85 Enter midterm 2 grade: 87 Enter final exam grade: 90 Do you want to enter student info (y/n!Enter the student name: Mary Enter midterm 1 grade: 78 Enter…Assume the following list exists: names = ['Chris', 'Katie', 'Joanne', 'Kurt'] Write a statement that uses a dictionary comprehension to create a dictionary named X in which each element contains the length of a name from the list as the key, and the corresponding name's initial character as its value.please solve these Part 21. Create a dictionary named password_lookup that contains usernames askeys and passwords as associated string values. Make up data for five entries.2. Write a program that creates an initially empty dictionary namedpassword_lookup, prompting one-by-one for usernames and passwords(until a username of 'z' is read) entering each into the dictionary.3. Create a dictionary named password_hint that contains email addressesas keys, and associated values that contain both the users’ “password securityquestion,” and the answer to the question. Make up data for dictionary entries.4. Create a dictionary named member_table that contains users’ emailaddresses as keys, and answers to their password hints as the associated values,and a function that generates a temporary new password and stored in the table.
- 1. Course informationWrite a program that creates a dictionary containing course numbers and the room numbers ofthe rooms where the courses meet. The dictionary should have the following key-value pairs:Course Number (key) Room Number (value)CS101 3004CS102 4501CS103 6755NT110 1244CM241 1411The program should also create a dictionary containing course numbers and the names of theinstructors that teach each course. The dictionary should have the following key-value pairs:Course Number (key) Instructor (value)CS101 HaynesCS102 AlvaradoCS103 RichNT110 BurkeCM241 LeeThe program should also create a dictionary containing course numbers and the meeting timesof each course. The dictionary should have the following key-value pairs:Course Number (key) Meeting Time (value)CS101 8:00 a.m.CS102 9:00 a.m.CS103 10:00 a.m.NT110 11:00 a.m.CM241 1:00 p.m.The program should let the user enter a course number, then it should display the course’s roomnumber, instructor, and meeting time.Assume that d refers to a dictionary. Write a statement in Python that retrieves from the dictionary the value that is associated with the key 'answer', and assigns this value to the result variable.Create a static dictionary with a number of users and with the following values: First name Last name Email address Password Ask the user for: 5. Email address 6. Password Loop (for()) through the dictionary and if (if()) the user is found print the following: 7. Hello, first name last name you have successfully logged in 8. Notify the user if the password and email address are wrong 9. Additional challenge: if you want the program to keep asking for a username and password when the combination is wrong, you will need a while() loop. 10. Save the file as assignment03yourlastname.py
- Create a dictionary (order_dict) that the key is the burger number, and the value is a list of the quantities. For example: order_dict which is {'1': [10, 3, 78], '2': [35, 0, 65], '3': [9, 23, 0], '4': [0, 19, 43], '5': [43, 0, 21]} Create a dictionary (total_order_dict) that the key is the burger number, and the value is the total of the quantities for that burger. For example: total_order_dict which is {'1': 91, '2': 100, '3': 32, '4': 62, '5': 64} Use "assert to test the values of the total_order_dict For example: expected_result_ototal_order_dict = {'1': 91, '2': 100, '3': 32, '4': 62, '5': 64} assert actual_result_ototal_order_dict['1'] == expected_result_ototal_order_dict['1'] , "The actual result is not the \same as expected result for the order number 1!" (and test the other elements) The function can be like: def test_sum(): #Testing assert actual_result_ototal_order_dict['1'] == 91, "The actual result is not the \ same as expected result for the…get_total_cases() takes the a 2D-list (similar to database) and an integer x from this set {0, 1, 2} as input parameters. Here, 0 represents Case_Reported_Date, 1 represents Age_Group and 2 represents Client_Gender (these are the fields on the header row, the integer value represents the index of each of these fields on that row). This function computes the total number of reported cases for each instance of x in the text file, and it stores this information in a dictionary in this form {an_instance_of_x : total_case}. Finally, it returns the dictionary and the total number of all reported cases saved in this dictionary.Code the following directions in python: 1.Write a statement that creates a dictionary containing the following key-value pairs: 'a' : 1 'b' : 2 'c' : 3 2.Write a statement that creates an empty dictionary. 3.Assume the variable dct references a dictionary. Write an if statement that determines whether the key 'James' exists in the dictionary. If so, display the value that is associated with that key. If the key is not in the dictionary, display a message indicating so.
- Assume a dictionary with some values: students = { 'CCU101': ['Anna', 88.5, 98.5, 78, 85, 92.5], ' CCU102': ['Alex', 98,91,90,92,88], 'CCU103': ['Bob', 99.5, 98.5, 96, 96, 89.5], } To access, a specific row, you would use students[key][column_number]. students['CCU101'][0] would print 'Anna' students['CCU101'][1] would print 88.5 and so on.. Write a program that defines a function that takes a dict as an argument, adds the scores of each student, calculate average for each student, and display them. Define a function display_average(students) that takes in a dictionary as an argument. Display the original dictionary. Calculate and display the average of each student. You do not need to ask user for input. You can use your own dictionary with at-least 5 rows.In Python a) Create dictionary that stores a single record of information with the attributes (i.e., columns): Name, Age, and School for a student named Jane who is 35 years old and studies at UCLA. b) Write the Python statement that grabs the value of the attribute School from this record. c) Write a Python statement that lists all the attributes of the dictionary. (Use autocompletion to find an appropriate method) d) Write a Python statement that lists all the items (formal word that means the key-value combos). Use autocompletion to find an appropriate method. e) Suppose there was a modification needed for the record and we need to correct the name to be Jane Doe rather than Jane. How would index into the record and assign this new value to the name attribute?Assuming food is a Dictionary, what does the following statement do? food[101] = "Cheesburger"; Question 63 options: a) After the statement executes, the Dictionary will have an element with the key 101 and the value “Cheeseburger.” b) After the statement executes, the Dictionary will have an element with the key “Cheeseburger” and the value 101 c) After the statement executes, the element at position 101 will have the key “Cheeseburger.” d) After the statement executes, the Dictionary will have 101 elements, each with the key “Cheeseburger.”