Question 2: Write a Program to calculate max and min of rain fall over 12 months, with below requirement . ● ● ● . Asks the user to enter amount of rain for each month of year For each input make sure the value must be between 0 and 100 If the user enters invalid value ask the user to enter again Use a List to save this information Use the List methods to show the minimum and maximum rain amount. Program should use List and loops to achieve the task.
Q: As you can see in the next sentences, data modelling is of the highest importance.
A: Data Modelling: Data modelling is the technique of utilising words and symbols to describe the data…
Q: The usage of digital communication has overtaken the use of both face-to-face and voice-to-voice…
A: Every company undertakes a specific project and develops it based on the criteria. The project…
Q: Provide examples for each of the three fundamental file management techniques as you illustrate each…
A: Introduction: Give illustrations of each of the three different forms of file management. Ordinary…
Q: What type of reaction does the capacity analysis get when many processes are occurring…
A: Introduction: An organization's strength can be determined through a capacity analysis, which takes…
Q: As you can see in the next sentences, data modelling is of the highest importance.
A: Data Modelling: Data modelling is the technique of utilising words and symbols to describe the data…
Q: What is the conclusion on the File Integrity Monitoring Program?
A: Introduction: The File Integrity a Monitoring (FIM) system contributes to the security and…
Q: CS-related domains Are there two sorts of Internet services given by apps? Uniqueness separates…
A: The following is a list of the some of the most popular internet services: Communication Services…
Q: How does information technology influence the communication procedures of modern businesses?
A: Information technology (IT) is the creation, processing, storage, secure transmission, and exchange…
Q: Explain why authentication is such a challenging undertaking in the current internet world.
A: The process or action of proving something is valid, real or genuine is called authentication.
Q: Could you describe the notion of a challenge-and-response authentication system in your own words so…
A: Authentication in client-server systems is performed with the use of passwords. This strategy is not…
Q: Authentication management in a hypothetical situation is detailed here. Create a list of the various…
A: Scenario management is an efficient way to manage futures and create customized scenarios. Scenario…
Q: As you can see in the next sentences, data modelling is of the highest importance.
A: Data modeling is the method involved with graphing information streams. While making a new or…
Q: What does the High Performance File System of the operating system look like compressed?
A: The High-Performance File System, sometimes known as HPFS, is a document framework that was designed…
Q: Explain how the capacity analysis reacts when a high number of processes are operating concurrently.
A: Capacity Analysis: Finding an operation's capacity is done through capacity analysis. In this…
Q: Describe the essential concepts behind computer networks as well as the many benefits of using…
A: introduction; Computer networking refers to the interconnection of computer equipment that may…
Q: A system for monitoring the integrity of files may be designed in line with a standard.
A: Integrity of File Monitoring: File-Integrity Monitoring is a programme that keeps track of,…
Q: What benefits can clicks stream analysis provide to other businesses?
A: Introduction: Because of its widespread use, clickstream analysis provides businesses with several…
Q: What are some examples of time constant and time complexity?
A: Constant time complexity means that take O(1) time for doing a operation i.e. 1 unit of time for…
Q: In what ways does the data modelling process vary when one starts with a bought solution?
A: Data Modelling Process: Data modelling creates a simplified picture of a software system and its…
Q: As a computer manufacturer, one of your difficulties will be to provide high-quality machines with…
A: The question has been answered in step2
Q: What are the company's rules governing the disclosure of sensitive information in the case of a…
A: Introduction: A data breach occurs when a security event exposes the confidentiality, availability,…
Q: Create a fictitious situation involving login management and explain it in full. Determine different…
A: Given: The most popular authentication methods will then be covered, along with examples of how each…
Q: What do you mean when you say "objectives of authentication"? Contrast the advantages and…
A: Authentication tells a server who's accessing its data. website without revealing it. Authentication…
Q: What is the precise purpose of the canvas element inside the HTML5 standard?
A: guidelines for HTML5 A markup language called HTML5 is used to organise and distribute material on…
Q: How does the capacity analysis react when many processes are operating concurrently?
A: The method of determining the capabilities of an organization, such as its production capacity,…
Q: How has the growth of technology affected the manner in which we communicate?
A: Technology influences communication because it makes it easier, quicker, and more efficient. It…
Q: Modify your program to use at least one method to perform the same task. You will also need to add…
A: I have implemented your code according to your requirements , Kindly check that out , I have written…
Q: Create a concise overview of your file integrity monitoring software.
A: Start: You must use file integrity monitoring to protect your organization's data from unauthorized…
Q: Programming Language: C++ Create a variable val with value 6. Using a pointer variable, display the…
A: The question has been answered in step2
Q: Write the appropriate algorithm for each mathematical problem 1. X = (a+b) - c 2. Get the…
A: In this question we need to write algorithm for the mathematical problems. Algorithm:- An algorithm…
Q: What are the design specifications for the file integrity monitoring system?
A: File access monitoring tools track your network to detect unusual activity that poses a security…
Q: Who should have access to a private key in a two-key authentication system
A: A private key is an entity or a variable used in cryptography. It is a long sequence of bits…
Q: The usage of digital communication has overtaken the use of face-to-face and voice-to-voice…
A: Introduction: Every business undertakes a particular project and develops that project following the…
Q: Problem: Conditional Create an algorithm that will display the average of all numbers divisible by 3…
A: We need to write flowchart and paeudo-code for given scenario.
Q: How would you describe a challenge-and-response authentication system such that we may better…
A: Challenge and response authentication is a set of protocols which are used to protect the services…
Q: What are some of the objectives of the process of authenticating someone? Compare and contrast the…
A: Verifying that someone or anything is who they claim they are is done through the authentication…
Q: In consideration of your new system, discuss password management and the need of a strong password.
A: Password management is defined as a system that provides an easy and secure way to store passwords…
Q: What is the World Wide Web exactly? Is it an extra network that runs similarly to the Internet, or…
A: Internet-Based Service: All services that use the Internet are referred to as "internet-based…
Q: What impact does the growth of mobile devices with smaller screens, such as smartphones and tablets,…
A: OVERVIEW: USER INTERFACE: User interface (UI) is the interface that connects a device to its user.…
Q: What do you mean when you say "objectives of authentication"? Contrast the advantages and…
A: Start: Authentication is used when a server wants to know who is accessing their information or…
Q: What do you mean when you say "objectives of authentication"? Contrast the advantages and…
A: If a server needs to know who is accessing its data or website but does not want to reveal that…
Q: How should businesses react when a security breach occurs?
A: Security lapses: An unrecognized and unauthenticated source might pose a hazard to an online…
Q: data structures ob
A: Introduction: A data structure is a set of data elements that are structured in some way, for…
Q: What are the most common errors that might occur throughout the data modelling process?
A: Introduction: Inappropriate denormalization: This approach should only be used in emergency…
Q: What are the design specifications for the file integrity monitoring system?
A: Monitoring file integrity has three benefits: FIM software detects, analyses, and alerts unusual…
Q: v. Look at the following graph: G V₂ V6 V3 What color would you use for v5 so that it is a…
A: The question is related to graph theory.
Q: Is the use of authentication able to aid in the accomplishment of any of our objectives? In this…
A: Solution: Authentication: Protecting sensitive programmes, data, and services requires digital…
Q: "Why are authorisation lists so susceptible to unauthorised modification that they must be encrypted…
A: The answer is given in the below step
Q: What qualities characterise Unified Communications Systems? How do these solutions benefit the…
A: Answer is
Q: The following explanation is given to help clarify the distinctions between SLA and HDD:
A: According to the information given:- We have to follow and explanation is given to help clarify the…
java program
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 1 images
- Prompt the user to enter four numbers, each corresponding to a person's weight in pounds. Store all weights in a list. Output the list.Ex: Enter weight 1: 236.0 Enter weight 2: 89.5 Enter weight 3: 176.0 Enter weight 4: 166.3 Weights: [236.0, 89.5, 176.0, 166.3]C# Gas Station Program: Write a program that allows the users to select items that are for sale in a gas station. Candy, Soda, Pizza, Muffins and the list goes on. Keep a running total of the items ordered (loop until user is done ordering) when they are done ordering items, output the total salessales.Write a program that uses 2 lists. Call the lists Items and Basket respectively. The first list will contain a list of at least 10 items (make up your own items) to select from. The second list will be used to add the selected items in the new list.(Basket) Your program should do the following in a Loop until the user exits the loop: Display the list (print out 1, 2, 3, 4, etc. before each item in the list (Hint: Use Index + 1) Prompt the user to select an item from the Items list. Add the selected item to the new list (Basket) (HINT: Use number entered - 1 for the Index) When the user selects 0, exit the loop and print out the new list of items (Basket) Use Microsoft Word to create your Outline and Logic sections. You can copy and paste your Python code at the end under the heading "Code:" Upload your work into the assignment when completed
- This question is about Block 2 Part 2 Section 2.3.2 (Find the best value). Consider again a list of hourly temperature readings from a fridge, as described in Question 9. Write a program that prints the hour at which the temperature first reached its maximum value. Assume position 0 is the reading at midnight (which will be printed as 0 : 00), position 1 is the reading at 1am (1 : 00), etc. The list has at least 1 and at most 23 readings. To get you started, the answer box contains, as comments, Pattern 2.9 version 3 (Find position of first best value), taken from the solution to Activity 2.32. Before completing the current quiz question, revisit Activity 2.32. Write the corresponding code beneath each comment. Use variable names appropriate to the problem at hand instead of the generic names used by the pattern. The first step has been done for you. Note that the output is expected to have a space before and after the colon. Input Result [4.7] 0 : 00 [4.7, 3] 0…Problem:Write a program that reads a list of integers from the keyboard and creates thefollowing information.a. Finds and prints the sum and the average of the integersb. Finds and prints the largest and the smallest integerc. Prints a Boolean (true or false) if some of them are less than 20d. Prints a Boolean (true or false) if all of them are between 10 and 90The input data consist of a list of integers with a sentinel. The program mustprompt the user to enter the integers, one by one, and enter the sentinel whenthe end of the list has been reached. The prompt should look like the following: Enter the numbers with <return>(99999 to stop):The output should be formatted as shown below: The number of integers is: xxxThe sum of the integers is: xxxxThe average of the integers is: xxx.xxThe smallest integer is: xxxThe largest integer is: xxxAt least one number was < 20: <true or false>All numbers were ( 10 <= n >= 90): <true or false>Through Scratch Programming - 1) Generate random numbers in a list. 2) 10 Numbers only 3) Count and report the number of As (say for 5 sec): A student earns an A if their gradeis greater than or equal to 90. Traverse through the list and ask the right question! Youwill need a variable to keep track of your position in the list and a variable to do thecounting.
- 1. Write a game of rock paper scissors, one of the choices will be from the user and the other from the computer (use random) Print results for each game.Play the games in a row until you exit the game. Explain each step as comment.Game rules:Rock crushes scissors, you win.Paper covers rock, you win.Scissors cut paper, you win. 2. Write a program that sorts a list in ascending order. Don’t use sort method.Ask user number of list elements (at least 10 elements)Enter all elements from keyboard and printed.Sort your list. 3. Write a code for craps game. Craps is a dice game in which the players make wagers on the outcome of the roll, or a series of rolls, of a pair of dice.The rules of the dice game craps are as follows:You roll two dice. Each die has six faces, which contain one, two, three, four, five and six spots, respectively. After the dice have come to rest, the sum of the spots on the two upward faces is calculated. If the sum is 7 or 11 on the first throw, you win and play is…weights = []for i in range(1, 5): weight = float(input(f"Enter weight {i}: ")) weights.append(weight)# Output the list of weightsprint(f"Weights: {weights}")print()# Calculate and output the average of the weightsaverage_weight = sum(weights) / len(weights)print(f"Average weight: {average_weight:.2f}")print()# Find and output the maximum weight in the listmax_weight = max(weights)print(f"Max weight: {max_weight:.2f}")print()# Prompt the user to enter a location in the list and output the weight at that location in pounds and kilogramslocation = int(input("Enter a list location (1 - 4): "))weight_pounds = weights[location - 1]weight_kilograms = weight_pounds / 2.2print(f"Weight in pounds: {weight_pounds:.2f}")print(f"Weight in kilograms: {weight_kilograms:.2f}")print()# Sort the list and output the sorted listweights.sort()print(f"Sorted list: {weights}")a) Create a list named vehicles: car, Truck, boat, PLANE.b) Request a user input for a search letter.c) Use the decision structure in a for loop to search all the items which contains the input letter (ignoring case) in thelist.d) Print the item and its position in vehicles if it exists. Otherwise, print the statement indicating it does not containthe letter to search.e) Print the error message if more than one letter is entered
- A> Take a string input from the user with multiple words (minimum 5 words) (String and List) Print the string input by the user Use split() method to convert the string into a list of words Sort the list in the reverse alphabetical order using appropriate list methods [Hint: Use dir(list) , help(list) to find help on the available list methods] Print the sorted and reversed list of words B> Write a function to check whether two strings are anagrams or not. If two strings share same characters in any order you may consider them anagrams E.g. ‘sore’ and ‘rose’ are anagrams. ‘peals’ and ‘leaps’ are anagrams. [Hint: Convert strings to list and sort the characters]In NumPy write a program to generate a list that contain 5 random integers in the range 1 to 100. Display the list in the output.Please help me, create your won code Create a function that takes a 2D list and an integer v, and returns the number of times the value v is in the list of lists. Add the Nsteps variable to count how many times the loops execute and display a message.• The main program must give a 2D list (no need to generate it, just create it manually), call the function, and display the result example it's the picture