Run a python program that will receive a chemical compound formula as an input and will give its molar mass
Q: Determine and discuss three distinct reasons why someone may hack into a computer system.
A: answer is
Q: Names and definitions for entities, relationships, and attributes should all be proper.
A: Relationships and Entities: An entity–relationship model (or ER model) depicts related entities of…
Q: Defintion: What is a disaster recovery strategy, exactly?
A: A disaster is a result of natural or man-made causes that leads to severe damage to life and…
Q: ) Hexadecimal byte of Ox58 is passed to the physical layer of the network. Assuming, Manchester…
A: Below i am using manchester encoding :…
Q: Because his online store and accounting software are hosted on one of his firm's LANs, the Managing…
A: Introduction: The identifier is one of the possible keys that uniquely specifies the attributes of…
Q: Computer animations are created by arranging and displaying a series of still pictures in a certain…
A: Explain: Computer animations are the sequencing and presentation of a group of pictures to produce…
Q: Tom got a new sequence A1, A2,..., AN. He does not like the orderly sequence for no reason, so he…
A: Input-Output Details: The first line of the input contains a single integer T denoting the number of…
Q: Assume that u have joined in garment manufacturer company that just taken over by e-commerce company…
A: Introduction: An automated (or semi-automatic) system for integrating heterogeneous, different…
Q: There are several advantages to being computer literate. What are the potential benefits of…
A: Given: Individuals with computer literacy may improve their professional performance, integrate…
Q: What does a dual-channel memory design serve?
A: THe answer is given below...
Q: Explain what you mean by distributed systems. Please explain why the definition of distributed…
A: Distributed systems: Distributed systems allow hardware and software components on network computers…
Q: 1- Draw an NPDA for the following languages h) L= {a^b2n, n20} U {ww}, w={a,b}*
A: A nondeterministic pushdown automaton is basically an nfa with a stack added to it.
Q: Because to technological improvements, practically all current appliances can connect wirelessly.…
A: Introduction: The internet's relevance in business has grown as communication and information…
Q: a) Give a DFA b) Give an NFA c) Give an 8-NFA
A: A
Q: Other Math 4) Prove the following arguments invalid using counterexample method 1. (3x)(Ax ~Cx) 2.…
A: ANSWER:-
Q: Cluster the following 8 points into three clusters A1(2,10) A2(2,5) A3(8,4) A4(5,8) A5(7,5) A6(6,4)…
A: The distance function between two points a = (x1, y1) and b = (x2, y2) is defined as- Ρ(a, b) = |x2…
Q: What are some of the possible reasons for an interruption in network service?
A: Given: It is assumed that you are aware of the elements that cause a network to slow down.
Q: Security protocols are an excellent illustration of how model checking may be used in a variety of…
A: A security protocol, commonly referred to as a cryptography or encryption protocol, can be abstract…
Q: How to become a good software engineer? What kind of abilities should a successful software engineer…
A: Software engineering is the branch of computer science that deals with the design, development,…
Q: What potential dangers may arise from putting in place a security architecture that encompasses…
A: POS outages: An attacker tries to get installation information by compromising PCs/workers running…
Q: A mousepad may be thought of as the plural form of a computer mouse.
A: Given: It is possible that the majority of the technical improvements made today may be attributed…
Q: Let IP address 200.210.56.76/28 find the subnet mask, subnet id ,broadcast address and also find…
A: IP Address: An IP is stands for Internet protocol It is a numerical label(designation), such as…
Q: Determine the costs of the following instruction sequences: LD R0, c LD R1, i…
A: As expected, the code generator input is the output of the central code generator. We assume that…
Q: What precisely do we mean when we talk about artificial intelligence? Give an example to demonstrate…
A: Artificial intelligence: The broad field of study known as artificial intelligence in computer…
Q: What is HTML5 exactly? What are some of its other capabilities that HTML lacked?
A: Introduction HTML5 is an abbreviation that stands for Hyper Text Markup Language, and it is a…
Q: Dissect the many approaches to artificial intelligence. Explanation in depth with relevant instances…
A: Artificial Intelligence (AI) refers to the imitation of human-like intelligence processes through…
Q: Code in python. You have a triplet of strings, such that Str₁, Str₂, and Str3 are non-empty…
A: code is given below
Q: What are some of the drawbacks of using symmetric encryption for key management?
A: The Answer start from step-2.
Q: How may data dimensions can you represent on a scatterplot graph?
A: NOTE :- Below i explain the answer in my own words by which you understand it well. For a bunch…
Q: Create text file using stream writer, then write and read the file information?
A: Answer has been explained below:-
Q: Modems are used for a wide range of applications. Tell us about the potential for sending data…
A: Modulator-Demodulate: A modulator-demodulator, often known as a modem, is a piece of hardware that…
Q: a) Describe one benefit of Assembler over Compiler and one drawback of High Level Language over…
A: a) Describe one benefit of Assembler over Compiler and one drawback of High-Level Language over…
Q: Why is it thought that the issue of system security is more complex than the problem of system…
A: System Safety and System Security both are the necessity of the system but if we compare the…
Q: Cluster the following 8 points into three clusters A1(2,10) A2(2,5) A3(8,4) A4(5,8) A5(7,5) A6(6,4)…
A: We use K-Means Algorithm Here The distance function between two points a = (x1, y1) and b = (x2,…
Q: What exactly do we mean when we talk about physical security, and how does it compare to other forms…
A: Physical security: Physical security protects buildings, hardware, and data against theft,…
Q: What are the many cyber security dangers that you will be expecting and preparing for when you…
A: Given: An attack that illegally accesses information, disrupts advanced activity, or damages data is…
Q: 5 2 |Create the matrix of the graph above and answer the following questions (If there is no arrow…
A: As per our guidelines, we are supposed to answer only 1st three parts. Kindly repost the remaining…
Q: Identify the many types of hacks and viruses, and provide an explanation of how a business may…
A: There are several sorts of hackings, some of which are described here. 1. Financial crimes: There…
Q: 8. What are the three types of domain-controllers that can be installed through PS?
A: The answer for the given question is as follows.
Q: For the following C statement, write the corresponding RISC-V assembly code. Assume that the C…
A: f is placed in the register x5 g is placed in the register x6 h is placed in the register x7 addi…
Q: 7. A function is defined for a positive integer n as follows: 3n + 1, if n is odd f(n) = { if n is…
A: Given : ------------------------------------------------
Q: 8. A country has coins of denomination 3, 5 and 10 respectively. Write a recursive function…
A: Write recursive function in C to return minimum number of coins needed to make payment.
Q: pooling,stride-2 --->3X3-filter (128-filters), Stride-2,padding-0 --> 2X2 max-pooling,stride-2 --->…
A: The answer is
Q: 2. Prove by Mathematical Induction that: 2.1 4 +95m, m≥ 3 2.2 1x² 10n, m = n, n ≥ 7
A:
Q: What are the main ideas underpinning RISC machine design?
A: In the given question RISC stand for Reduced Instruction Set Computer.
Q: The processing of natural languages What characteristics distinguish the algorithms that are the…
A: In Natural Language Processing (NLP), embedding refers to the representation of words for text…
Q: In a network that is switched as well as routed, how can the department ensure that users always…
A: Given: Below, the department ensures network access in a switched and routed network. A host may…
Q: What are the drawbacks of analog computers?
A: Given: An analogue computer is made up of a collection of circuit modules, each of which is able to…
Q: a proxy firewall in the DMZ that may access an internal Web server using a "server farm" setup…
A: Given: A server farm, also known as a server cluster, is a collection of computer servers maintained…
Q: In GSM, a "TDMA frame" is composed of eight distinct time slots. Each GSM time slot is 577 s…
A: The total 8 timeslots and 577 microseconds are available in each time slot in a TDMA framework.…
Run a python
Inputs:
a. Chemical Formula
b. Elements in the compound
c. Number of atoms per element (must be in separated lines depending on the number of elements present)
Output:
a. Molar Mass
Additional Information:
a. If the element entered in “b.” is not in the chemical formula, the output must be: “Incorrect Formula.”
b. If the number of atoms per element is not the same as what was entered in the chemical formula, the output must be: “Incorrect number of atoms.”
Please create a program like this. If not familiar with chemistry, please create a similar program.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Write a C Program which reads the contents of the attached sequential file - customers.txt Print the surname of people who agreed to share their data. This is denoted by the final field in the file (1 for agree, 0 for not agreed). Print the average age of these people (age is the 4th column in the data) Print the average age for people who live in Dublin and have agreed to share their data. This is denoted by the first field in the file. customers.txt New York Dunne 865463389 21 1New York Milford 865438990 22 0New York Mowlds 876765443 24 1New York Wang 873456789 22 1New York Smith 875432234 25 1New York Henry 876654429 22 0New York Gupta 896765443 24 1Los Angeles Monahan 865432245 22 1Los Angeles Brunsdon 865678894 22 1Alabama Tyson 865434566 22 0Alabama Browne 865564766 20 1New York Dunne 890065443 27 1New…In Python, Given the grades.csv file, where hours = [15,7,8,7.3,19.1,17,14,9.3,4.3,8,12.4,9,6,7.5], and grades = [94,86,87,100,96,94,90,79,88,91,90,86,88,89]. The first column is hours studied and the second column is grades, read its data and place them into two numpy arrays. Find the regression line using the built-in linregress() method. Plot the data points along with the regression line and print: slope, y-intercept, r (correlation coefficient), p-value, standard error. Predict a student’s grade given 10.5 hours of study''' xhours = [ ] yhours = [ ]In a python pandas Jupiter notebook: I have a series of data in a clolum named "Course Age" and the following code of which the first three lines were given. -I need to put this into these categories: unknown, 17 and under, 18-25, 26-35, 36-45, 46-55, and 56+ -I need to convert all the strings into the text "unknown" and then into the category "unknown". -This is the code I am working with and I am getting a type float/ string error. I know I have a problem with my strings and numbers but I don't know how to fix it. Please tell me what I did wrong and what I should be doing. array(['44', '49', '40', '23', nan, '53', '33', '43', '56', '64', '37', '48', '54', '36', '45', '25', '34', '35', '38', '58', '50', '47', '16', '52', '63', '65', '41', '27', '31', '59', '61', '46', '42', '62', '29', '39', '32', '28', '69', '67', '30', '22', '51', '70', '24', '19', 'Old enough', '57', '60', '66', '12', 'Many', '55', '72', '?', '21', '11', 'no', '9', '68',…
- Python Run an object oriented python program that will guess for a person’s age based on their height, weight and number of siblings. The inputs should be enclosed in a text file (information.txt), while the guessed age will be put into another text file (output.txt). The age of the person must be in 1 decimal place. Formula for Age: (Weight in kg /height in feet)*no.of siblings Use the following template (two files) for guidance: main.py from person import Person # Input # Insert your code here that will read the inputs from “information.txt # Process # Insert your code below that will compute for the “age” as guessed from the three inputs. The formula is given for this # Make use of the “Person” class by creating an instance of this. The object will help you retrieve the information of the person. # Output # Insert your code that will create an "output.txt" that contains the hypothesized age. person.py class Person: def __init__(self, name): self.name = name…Write a python code for the following question. Your program will read data from the provided CSV file into a DataFrame. The data file has 6 columns: A, B, C, D, E, and F, where A and B are categorical, and the rest are numeric. Write functions to normalize the data in each columnusing the following methods. Apply these functions on column C.(a) Min-max normalization that transforms the values onto a given range, forexample, [−1.0, 1.0].(b) Z-score normalization.(c) Decimal scaling normalization.Write a program that receives a coded message file(Lab3ExtraCreditCT.txt) from your local espionage agent and decodes it into a file using standard English. The problem is your agent forgot to tell you the key used to decode the message. Fortunately, this is a simple substitution code consistently using 1 alphanumeric character to represent another, this is case sensitive. All other characters are not substituted, so a space will always be a space, a – will always be a –, a @ will always be a @, etcetera. You may use the following table to help you, it contains the most common letters used in the English language in descending order. E A R I O T N S L C U D P M H G B F Y W K V X Z J Q 0 5 3 2 4 6 8 1 9 7 Using the following key to convert plaintext to coded text: Plaintext = Now is the time for all good men to come to the aid of their country. Key = THEQUICKBROWNFXJMPSVLAZYDG The file your program outputs should look like this: Coded Text = Fxz bs vku vbnu ixp tww…
- Write a C Program that takes an input (2 text.txt) files, and counts the number of times the elements of File 1, appear in File 2, and print the result as shown. Please read the example below: Example: File A: BarcelonaDublinLas VegasLisbonLondonMadridNew YorkRioSan FransiscoShanghaiToronto File B: BarcalonaMadridMadridMadridMadridSan FransiscoTorontoVancouver Output after running the C Program using Binary Search Algorithm is: Barcelona is present 1 time/sDublin is present 0 time/sLas Vegas is present 0 time/sLisbon is present 0 time/sLondon is present 0 time/sMadrid is present 4 time/sNew York is present 0 time/sRio is present 0 time/sSan Fransisco is present 1 time/sShanghai is present 0 time/sToronto is present 1 time/sPlease do this in PYTHON PROGRAMMING Write an address book program that stores your contacts' names and their email addresses. The names and email addresses are originally stored in a file called phonebook.in, in the format:Harry P..d@hogwarts.eduHermione G..h@hogwarts.eduRon W..b@hogwarts.eduDraco M..s@hogwarts.eduSeverus S..e@hogwarts.eduAlbus D..x@hogwarts.eduYour program should read from the file, storing the names and corresponding email addresses in a dictionary as key-value pairs. Then, the program should display a menu that lets the user enter the numbers 1 through 5, each corresponding to a different menu item:1) look up an email address2) add a new name and email address3) change an email address4) delete a name and email address5) save address book and exitWhen the user enters 1, the program should prompt them for a name, and then print the corresponding email address. If there is no dictionary entry under that name, the program should print, "Sorry, no contact exists…Write a Python program stored in a file q1.py that calculates what day of the week a certain date will be in a given month. The user will first start by entering the first day of the month (i.e. Monday) and then enter a number from 1 to 30. In this problem, we assume that all months have 30 days. The program will output what day the number corresponds to. Users can enter days by the first three letters of the day, the whole name for the day, or the single letter abbreviation (U-Sunday, M-Monday, T-Tuesday, W-Wednesday, R-Thursday, F-Friday, S-Saturday). Example: Enter the first day of the month: M Enter a date: 19 The 19th is a Friday.
- Write a code (in the most basic Python) that finds the two emissions called PM2.5-Attributable Respiratory Hospitalizations (Adults 20 Yrs and Older) and PM2.5-Attributable Respiratory Hospitalizations (Adults 40 Yrs and Older)within the csv file Air_Quality.csv and column ('Name') and prints out which city has the highest value respiratory hospitalizations for both 20 years and older and 40 years and older based on a column called 'Data Value'.Write a JAVA program to read in a list of electric vehicles. Print out the vehicle with the longest range. Data is stored in the following format: <automobile name><newline><list price><space><range> Here is a sample datafile. File: cars.txt Ford Focus Electric 32103 185 Nissan Leaf S 36398 241 Tesla Model S 97600 536 Kia Soul EV 35895 179 The following is a sample run, user input is shown in bold underline: Enter the input filename: c:/temp/cars.txt Car with the longest range = Tesla Model S Price $97600.00 Range = 536You are required to write a C++ program that reads several hundreds of movie ratings from an input file, and output a list of Number of times rated (#Rated), sum of ratings (Total Ratings) and average ratings of the movies.The application program reads in several hundreds of movie ratings from an input file “Rating_list.txt”. Each line in the input file represents one review, indicating the title of the movie and a rating (between 0 and 5) separated by a space. Sample lines from the input file is shown below. Titanic 5 The_Full_Monty 3 Liar_Liar 4 Apollo_13 3 Liar_Liar 3 Titanic 4 The_Silence_of_the_Lambs 2 Star_Wars 1 Men_in_Black 4 Dead_Man_Walking 2 Toy_Story…