The file “dna.seq” (on Blackboard) consists of several DNA sequences. Write a program that reads in the file “dna.seq” and counts the number of sequences with the following properties: • The total number of sequences in the file • The number of sequences that have the pattern CTATA • The number of sequences that have more than 1000 bases • The number of sequences that have over 50% GC composition • The number of sequences that have more than 2000 bases and more than 50% GC composition Use python
Q: Describe the key features and components of the macOS user interface, including the menu bar, Dock,…
A: The macOS user interface is renowned for its elegant design and user-friendly experience. Apple has…
Q: Assignment: Dice Rolling Program Objective: Create a Java program that rolls two dice and displays…
A: Step-1) First, creating a class for single die.Step-2) In this, simulate the rolling dice using…
Q: Compile and link testdydt.cpp into a program called testdydt. The program only needs to do the test…
A: In order to implement the given task in cpp, follow the steps mentioned in the algorithm provided in…
Q: Explain the concept of NAT (Network Address Translation) and its various forms (Static NAT, Dynamic…
A: In order to guarantee data integrity, dependability, and compatibility, network protocols are…
Q: Provide an overview of the functioning of SNMP (Simple Network Management Protocol) and its role in…
A: Administrators can monitor and control devices connected to networks using the commonly used SNMP,…
Q: Discuss the macOS file system hierarchy. What is the role of directories like /Applications,…
A: The macOS file system hierarchy is the organizational structure that governs how files and…
Q: What is DNS and how does it work in the context of network protocols?
A: DNS, or Domain Name System, serves as the backbone of the internet, translating human-readable…
Q: Dive into the technical architecture of macOS, including its Unix-based foundation and the use of…
A: macOS, Apple's operating system for its Macintosh computers, is renowned for its robust stability…
Q: Explore emerging technologies and trends in mouse control, such as haptic feedback, neural…
A: The administration and usage of a computer mouse, a pointing device used to connect with a graphical…
Q: How do mouse microswitches work, and why is their durability and actuation force important to users,…
A: Mouse microswitches are an essential component of computer mice and play a crucial role in…
Q: Explain the role of Internet Service Providers (ISPs) in connecting users to the Internet, and…
A: A business or organization that provides people, businesses, and other clients with Internet…
Q: How can advanced users utilize Terminal and shell commands in macOS for system administration and…
A: 1) Terminal is a command-line interface (CLI) application found in Unix-like operating systems,…
Q: Explain the significance of macOS file systems, such as HFS+ and APFS, in terms of data management…
A: macOS, Apple's operating system, has seen the evolution of its file systems over the years. Two…
Q: Discuss the various types of mouse grips (palm grip, claw grip, fingertip grip) and their…
A: The way you grip a computer mouse can significantly impact your comfort and control during extended…
Q: [Scheduling Algorithm Name:] [Arrival Times (only for PS algorithm)] [A textual presentation of the…
A: Import necessary Java libraries (ArrayList, Collections, List, and Random).Define a task class to…
Q: Discuss the importance of subnetting in IP addressing and provide an example of subnetting a…
A: Subnetting is the practice of dividing a large IP network into smaller, more manageable sub networks…
Q: What are macOS virtual desktops, and how can they enhance productivity and organization? Explain how…
A: MacOS virtual desktops, often referred to as "Spaces," are a feature that allows users to create and…
Q: Describe the process of establishing a secure SSL/TLS connection.
A: Establishing a secure SSL/TLS (Secure Sockets Layer/Transport Layer Security) connection is a…
Q: Describe the role of the Finder in file management and navigation on MacOS.
A: The Finder is a fundamental and integral component of the macOS operating system, designed to manage…
Q: Given an array A = [10, 7, 4, 2, 1], and target = 7, return the index of the target if found, else…
A: Yes, this problem can be solved in O(logN) time complexity using a binary search since the input…
Q: Describe the operation and significance of ARP (Address Resolution Protocol) in local networks. How…
A: A network protocol is a collection of guidelines that control the format, transmission, reception,…
Q: One of these can be solved using Djikstras algorithm Single source shortest path All source shortest…
A: Dijkstra's algorithm is defined as an algorithm to find the shortest paths between nodes or vertices…
Q: What is the OSI model, and how does it help in understanding network protocols? List the seven…
A: The Open Systems Interconnection (OSI) model is a conceptual model that describes how data is…
Q: Explore macOS server capabilities and services, including web hosting, file sharing, and remote…
A: macOS, Apple's operating system for Mac computers, is a versatile platform that can be used as a…
Q: Discuss the role of mouse acceleration and deceleration in fine-tuning cursor control.
A: In the field of computer science understanding mouse acceleration and deceleration is essential, for…
Q: Discuss the challenges and solutions related to network QoS (Quality of Service) and traffic…
A: In the area of networking, achieving a high level of Quality of Service (QoS) and effective traffic…
Q: Explain the concept of Quality of Service (QoS) in network protocols and how it impacts the…
A: In the realm of Computer Science and Networking, Quality of Service (QoS) plays a role. It…
Q: Discuss the challenges and advantages of implementing haptic feedback in computer mice.
A: Haptic feedback also called tactile feedback is a technology that supplies sensations through touch…
Q: Discuss the principles behind mouse input in the context of gaming and real-time applications.
A: Precision and responsive mouse input is critical in the fast-paced world of gaming and real-time…
Q: Explain the architecture and underlying technology of the macOS kernel, discussing how it manages…
A: In this question we have to understand about the architecture and underlying technology of the macOS…
Q: Match appropriate worst case time complexities Selection sort Merge sort Quick sort Binary search…
A: Worst-case time complexity is a measure of an algorithm's maximum running time under the least…
Q: Describe the core features and components of the macOS operating system.
A: macOS, the operating system developed by Apple Inc. for its Mac computers, is renowned for its…
Q: Discuss the role of polling rate in mouse control. How does a higher polling rate affect the…
A: 1) Polling rate, in the context of computer peripherals like mice, refers to the frequency at which…
Q: Describe the seven layers of the OSI model and provide a practical example for each layer's function
A: A computer network is a group of linked computers and other gadgets that may interact and share…
Q: Explain the significance of Gatekeeper in macOS for application security and how it works.
A: Gatekeeper is a crucial security feature in macOS designed to protect users from potentially harmful…
Q: Explore the role of customizable gaming mice in esports. How can advanced features like adjustable…
A: In computing, a mouse is an input or pointing device that is used to move a pointer on the screen to…
Q: How do different operating systems handle mouse input differently? Discuss the variations in mouse…
A: Operating systems, such as Windows, macOS, and Linux, each have unique ways of handling mouse input…
Q: Describe the DNS resolution process, including how a hostname is translated into an IP address, and…
A: Process for DNS Resolution:A distributed hierarchical system called the Domain Name System (DNS) is…
Q: Discuss the concept of "mouse polling rate" and its impact on precision and responsiveness. How can…
A: Precision: The accuracy and fine-grained control of the mouse cursor's motions are referred to as…
Q: Describe the role of ARP (Address Resolution Protocol) in a local network and how it works.
A: An IP (Internet Protocol) address is translated into a physical hardware address, often an Ethernet…
Q: Discuss the role of Gatekeeper in macOS and its importance in maintaining system security.
A: MacOS does not have a built-in component known as a "Gatekeeper" in the same way that, for example,…
Q: How does a touchpad on a laptop work, and what are the common gestures used for navigation?
A: Touchpads on laptops have become an essential element of our everyday computing experience,…
Q: What are the key components of a typical IT infrastructure, and how do they work together to support…
A: An organization’s IT infrastructure is a system made up of interconnected components that work…
Q: Discuss the role of ARP (Address Resolution Protocol) in networking and how it operates.
A: A network protocol is a collection of guidelines that control the format, transmission, reception,…
Q: Explain the role of the Finder in macOS and how users can effectively manage their files and…
A: In the macOS operating system, the Finder serves as the digital compass that guides users through…
Q: Discuss the evolution of mouse technology, from the ball-based mice to modern optical and wireless…
A: The evolution of mouse technology has played a role, in the development of computer…
Q: What is the role of a DHCP (Dynamic Host Configuration Protocol) server in a network, and how does…
A: The Dynamic Host Configuration Protocol (DHCP) is a network protocol that automates the process of…
Q: How does Time Machine work, and what is its purpose in macOS for backup and recovery?
A: Time Machine is a backup and recovery feature in macOS that is designed to provide users with an…
Q: Describe common network security protocols such as IPsec, SSL/TLS, and SSH. How do these protocols…
A: The process of putting safeguards in place to keep computer networks and data safe from intrusions,…
Q: Discuss the features and specifications that make a mouse suitable for gaming, including polling…
A: A mouse designed and optimized for gaming is known as a gaming mouse. It has a range of hardware and…
The file “dna.seq” (on Blackboard) consists of several DNA sequences. Write a program that reads in the file “dna.seq” and counts the number of sequences with the following properties:
• The total number of sequences in the file
• The number of sequences that have the pattern CTATA
• The number of sequences that have more than 1000 bases
• The number of sequences that have over 50% GC composition
• The number of sequences that have more than 2000 bases and more than 50% GC
composition
Use python
Step by step
Solved in 5 steps with 3 images
- PLEASE COMMENT CODE In a python program, create a new file and call it “ tracking”. Write to it four lines each contains information about an order like this: 1-00654-021 Dell charger Toronto-WEST 99-49-ZAD011-76540-022 ASUS battery Milton-EAST 34-56-CBH561-09239-026 HP HD Scarborough-NORTH 12-98-AZC451-12349-029 Mac FD North York-LAWRENCE 34-49-ZWL01Add the file two more lines: 1-34567-055 Lenovo SSD Milton-ON 34-09-MT04 1-90432-091 Lenovo battery Oakville-ON 78-KL98 Define a function that searches for a brand (e.g. Dell, ASUS, etc.). Test the function in your program.In Python Prompt the user for a text file that contains a list of student names, one on each line. Also prompt the user for a CSV file that contains scores for the students in the following order: homework1, homework2, midterm exam, final exam. Each line in the CSV has four scores, delimited by a comma. Each name in the text file has the corresponding scores in the CSV file. You will need to calculate the weighted final grade for each student as follows: 5% homework1 5% homework2 40% midterm exam 50% final exam Homework is scored out of 10 points and exams are scored out of 100 points. You need to create a program that will read the scores from the CSV file, calculate the weighted final grade, and display the resulting final grade, along with the student's name. Sample input files are attached. You can assume that the same number of lines will be in the input files, and that the order of the names and corresponding grades is the same in the two files. Display the name and final grade…In Java Oleae nust read a file A photographer is organizing a photo collection about the national parks in the US and would like to annotate the information about each of the photos into a separate set of files. Write a program that reads the name of a text file containing a list of photo file names. The program then reads the photo file names from the text file, replaces the "_photo.jpg" portion of the file names with "_info.txt", and outputs the modified file names. Assume the unchanged portion of the photo file names contains only letters and numbers, and the text file stores one photo file name per line. If the text file is empty, the program produces no output. Ex: If the input of the program is: ParkPhotos.txt and the contents of ParkPhotos.txt are: Acadia2003_photo.jpg AmericanSamoa1989_photo.jpg BlackCanyonoftheGunnison1983_photo.jpg CarlsbadCaverns2010_photo.jpg CraterLake1996_photo.jpg GrandCanyon1996_photo.jpg IndianaDunes1987_photo.jpg LakeClark2009_photo.jpg…
- Write a program that will read in a file of student academic credit data and create a list of students on academic warning. The list of students on warning will be written to a file. Each line of the input file will contain the student name (a single String with no spaces), the number of semester hours earned (an integer), the total quality points earned (a double). The following shows part of a typical data file: Smith 27 83.7 Jones 21 28.35 Walker 96 182.4 Doe 60 150 The program should compute the GPA (grade point or quality point average) for each student (the total quality points divided by the number of semester hours) then write the student information to the output file if that student should be put on academic warning. A student will be on warning if he/she has a GPA less than 1.5 for students with fewer than 30 semester hours credit, 1.75 for students with fewer than 60 semester hours credit, and 2.0 for all other students. The file Warning.java contains a skeleton of the…Write a program that will read in a file of student academic credit data and create a list of students on academic warning. The list of students on warning will be written to a file. Each line of the input file will contain the student name (a single String with no spaces), the number of semester hours earned (an integer), the total quality points earned (a double). The following shows part of a typical data file: Smith 27 83.7 Jones 21 28.35 Walker 96 182.4 Doe 60 150 The program should compute the GPA (grade point or quality point average) for each student (the total quality points divided by the number of semester hours) then write the student information to the output file if that student should be put on academic warning. A student will be on warning if he/she has a GPA less than 1.5 for students with fewer than 30 semester hours credit, 1.75 for students with fewer than 60 semester hours credit, and 2.0 for all other students. The file Warning.java contains a skeleton of the…PYTHON-Assume you have a file that has two columns separated by a comma. The first column contains gene accession numbers, and the second column contain their nucleotide sequence. For example: ABC123, AAGTCTTCCCTAAGCCC... KHJ456, TTCGGTCATACTATTC... NMG789, GCTACTCGATGCTA.... .... The file can contain any number of rows. Write a program that reads in this file (you can create one to test your code with, use TextEdit or Notepad) and creates a dictionary, where the keys are the accession numbers and the values are the sequences. Print out to the screen the dictionary pairs that you created.
- DataFile.txt contains the information of poker cards. 1. C: clubs (lowest), D: diamonds, H: hearts, S: spades (highest) 2. 2 (lowest), 3, 4, 5, 6, 7, 8, 9, 10, J, Q, K, A 3. No Joker cards 4. Any C cards are lower than any D cards. DataFile Content (You can write the file specification into your program.) : H4,C8,HJ,C9,D10,D5,DK,D2,S7,DJ,H3,H6,S10,HK,DQ,C2,CJ,C4,CQ,D8,C3,SA,S2,HQ,S8, C6,D9,S3,SQ,C5,S4,H5,SJ,D3,H8,CK,S6,D7,S9,H2,CA,C7,H7,DA,D4,H9,D6,HA,H10,S5,C10 H4, D5, HK, D2 H4, HK, SK C9,C10 1. Create a list by dynamic allocated array and set the size to 20 2. Read the first 20 cards in the first line of the file, the put them one by one into the list by implementing and using putItem(). The list must be kept sorted in ascending order. Then print out all the cards in the list in one line separating by commas. 3. Then delete the cards indicated in the second line of the file by using deleteItem() Then print out all the cards in the list in one line separating by commas. 4. Then put…Part 1: Write a C/C++ language program that creates an array of 10,000 random unsigned integers in the range 1 to 1,000,000. These integers are then stored in a text file called numbers.txt Part 2: Write a C/C++ language program that reads the file numbers.txt and checks each number for being a prime number. Only the prime numbers from these are then written to a text file prime.txt. Part 3: Modify the program of part 2 so that it takes an input argument num_jobs with a value between 1 and 8. E.g. if num_jobs is 3, it splits into 3 parallel processes using fork() function, and each process then calculates prime numbers from a subset of the input data. Together these 3 jobs find prime numbers from all the 10,000 input integers. The overall parent process then combines the results from its children into a single file prime.txt Part 4: Calculate the times taken by running the program of part 3, and make a table where the time taken for calculation is given for each value of num_jobs from…C++ text 284.12223.09579.12998.651237.84764.75395.65458.01670.353765.003842.10190.23335.35662.952719.253564.02193.23222.231457.2089.751323.65234.35789.89224.67663.95245.38 Write a program that reads from a text file named “sales.txt”, which contains the sales figures (double) of a store. Your program should: Display the average, the highest, and the lowest sales figures Remember to: Test the file open error Close the file at the end.
- The course records are shown below: Each student has 4 assignments. 108194 9 10 10 10 197526 10 10 10 10 197008 10 10 0 10 197746 10 10 9 10 108154 10 0 10 9 Create an input file ‘CSassignments.txt’ using an editor such as Notepad++ with a student number, then a space, then four assignment marks on one line. The assignment marks are whole numbers and are separated by a space. Your C++ program will read from the file ‘CSassignments.txt’ and write to a second file ‘CSgrades.txt’ which includes the average of the student’s four assignments. e.g. 108194 9 10 10 10 9.75 Your C++ program should work with any number of records in the ‘CSassignments.txt’ input file – that is – test your program with TWO records…In python The text file “studentMarks.txt” has been provided for you. Each line contains the Last Name, First Name and 8 marks separated by spaces of a single student. For each student in the file, adjust the file to include the average of their top 6 marks, rounded to 1 decimal place, at the end of the line. For example, in the file, the line may say: Mars, Bruno 82 82 85 94 65 79 81 90 Afterwards, it should be updated to say: Mars, Bruno 82 82 85 94 65 79 81 90 Top6Avg: 85.7 Your program must define a function to determine the average of the top 6 marks. You may define more functions as needed for your program.JAVA PROGRAM ASAP Please CREATE A program ASAP BECAUSE IT IS LAB ASSIGNMENT #2 so it passes all the test cases. The program must pass the test case when uploaded to Hypergrade. Chapter 9. PC #16. Morse Code Translator (modified *** Read carefully ***) Morse code is a code where each letter of the English alphabet, each digit, and various punctuation characters are represented by a series of dots and dashes. Write a program that asks the user to enter a file name containing morse code, and then converts that code to text and prints it on the screen. The Morse code table is given in a text file morse.txt. When printing resulting text, display one sentence on each line. There should be no extra spaces at the beginning and at the end of the output. Mose.txt 0 -----1 .----2 ..---3 ...--4 ....-5 .....6 -....7 --...8 ---..9 ----., --..--. .-.-.-? ..--..A .-B -...C -.-.D -..E .F ..-.G --.H ....I ..J .---K -.-L…