
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Solve it with Python language
2) Use map, filter, reduce and lambda functions to solve the problem 3.
3. Ahmed is into car renting business. He owns 10 cars of different models. He used to collect, organize and analyze the data pertaining his business. He is planning to expand the business with the inclusion of 15 more cars. To monitor the business, he needs to put more effort on analyzing the data. The following are the data he used to collect from the business.
Monthly business done by each car in OMR is
[450, 235, 300, 200, 150, 250, 120, 135, 185, 85, 345, 560, 210, 190, 76, 450, 235, 300, 200, 150, 250, 120, 135, 185, 85]
Monthly maintenance cost due to each car in OMR is
[45, 23.5, 30, 20, 15, 10, 12, 15, 25, 10, 30, 50, 10, 19, 10, 45, 23.5, 30, 20, 15, 10, 12, 15, 25, 10]
Monthly EMI on each car is 15% of the business done by them towards loan he used to repay.
You should design and implement a python app to help Ahmed in monitoring his business with ease.
a) Calculate and print the total business done by all the cars
b) Filter the list of maintenance cost and print the maintenance costs that are more than the average maintenance cost.
c) Filter the list of maintenance cost and print the maintenance costs that are more than 10 OMR
d) Calculate and print the list of EMI to be remitted from the list of monthly business done by the cars.
Use menu driven approach in your implementation.
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps with 4 images

Knowledge Booster
Similar questions
- Course: Introduction to matlab programming student number: 180505005arrow_forwardProgramming Language :- Carrow_forwardEvery data structure that we use in computer science has its weaknesses and strengthsHaving a full understanding of each will help make us better programmers!For this experiment, let's work with STL vectors and STL dequesFull requirements descriptions are found in the source code file Part 1Work with inserting elements at the front of a vector and a deque (30%) Part 2Work with inserting elements at the back of a vector and a deque (30%) Part 3Work with inserting elements in the middle, and removing elements from, a vector and a deque (40%) Please make sure to put your code specifically where it is asked for, and no where elseDo not modify any of the code you already see in the template file This C++ source code file is required to complete this problemarrow_forward
- MATLAB. write code for all partsarrow_forwardT The information in DNA is stored as a code made up of four chemical bases which are represented by four upper case letters A, T, G, C. An example DNA sequence could be: ATGAG An interesting phenomena here is that when two DNA sequences are attempted to combine, A can only pair with T whereas G can only pair with C. Two DNA sequences for example ATGC and TACG are considered 'fully complementary' because the bases (letters) in every index position can be paired to each other (see the image). ATGC ATGC ATGC XX TACG Fully Complementary TACC SNP TTCA CA Non Complementary Two DNA sequences for example ATGC and TACC are considered 'SNP type' because there is exactly one index position (last position in this case) in which the bases(letters) can not be paired. Two DNA sequences for example ATGC and TTCA are considered "non complementary' because there are more than one index position (second and fourth in this case) in which the bases can not be paired. Write a program that will ask the user…arrow_forwardStructural Verification Structural verification is, in this case, validating that a data structure is formed according to its specification. For this lab you are given an essentially arbitrary specification, but you could think of this being used to verify a data structure produced by a program that must have certain properties in order to be used correctly. For example, a list must not be circular, or an image file might require a particular header describing its contents. You must implement this function, which examines a matrix and ensures that it adheres to the following specification: bool verify_matrix(int x, int y, int **matrix); This function accepts an X dimension, a Y dimension, and a matrix of y rows and x columns; although it is declared as int **, this is the same type of matrix as returned by parse_life() in PA1, and you should access it as a two-dimensional array. Note that it is stored in Y-major orientation; that is, matrix ranges from matrix[0][0] to matrix[y 1][x -…arrow_forward
- *Data Structures and Algorithm (C Programming) In economics, arbitrage is the practice of taking advantage of a difference in prices in two or more markets; striking a combination of matching deals to capitalize on the difference, the profit being the difference between the market prices at which the unit is traded. Arbitrage can become a source of gain when applied to currency exchanges. Consider the fol- lowing currency exchange ratios as an example: 1 U.S. dollar buys 0.7292 euros, 1 euro buys 105.374 Japanese yen, 1 Japanese yen buys 0.3931 Russian rubles, 1 Russian ruble buys 0.0341 U.S. dollars. Then you could take 1 U.S. dollar and buy 0.7292 euros with it, with which you can buy 76.8387 yen (because 0.7292 * 105.374 = 76.8387). Then take the 76.8387 yen and buy 30.2053 rubles (because 76.8387 * 0.3931 = 30.2053), and finally take the 30.2053 rubles and buy 1.03 dollars (because 30.2053 * 0.0341 = 1.0300). Assume that you are given the pairwise trading ratios among n…arrow_forwardWhat do you think are the most significant benefits of arrays? This is the maximum number of dimensions that an array can have. The difference between a structure and an ordinary variable type is as follows: Use an intricate data structure to demonstrate its use.arrow_forwardGive an example of a function with two arguments and statements that are executed when the function is called. -Provide details about the return statement and the purpose of your function. -Provide an example of an array and a vector. -Describe your experience using GitHub, GitLab, Git, or other versional control software in general. Explain what aspects of the GitHub process you are comfortable with and what areas you need more practice or help.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY