Create a file called toJSON that reads a .txt file from the command line. This file should always contain at least three lines: • line 1: is a first name (1 word) • line 2: is a last name (1 word) • line 3: is a location (1 word) • lines 4-n: can be string(s) (n # of word(s)) Your job is to take this data and out a clean JSON object in the following format: fname: linel fname, lname: line2 lname, location: line_3, other: lines 4-lines_n The only edge cases that need to be considered are:
Q: Describe how the system is safeguarded from a never-ending loop.
A:
Q: H.W Find the inverse to the following matrices by using adjoint method. 21 c. A = 3 4 1 4 3. 3. 4. 2...
A:
Q: What are the requirements for CPU scheduling? Explain in detail 2 in terms of the optimization issue...
A: CPU Scheduling When a processor switches between one state to another state, the processor will be ...
Q: |Consider the formula C = 3x Vy.p(x,y) → q(y). For each of the following nterpretations, determine i...
A: Hey there, I am writing the required solution for the above stated question.
Q: What exactly is ISO 27001? What distinguishes it from the NIST Cybersecurity Framework?
A: Introduction: ISO 27001:2005: We employ ISO 27001, an internationally recognised standard, to examin...
Q: Do we need to worry about overfitting with Bayesian learning? Why?
A: Bayesian learning uses Bayes theorem to determine the conditional probability of a hypotheses given ...
Q: How would you define three
A: A server is a computer or framework that gives resources, information, servicess, or programs to dif...
Q: Define the term "UNIX." What are five UNIX characteristics that you can list and explain?
A: let's see the solution
Q: Explain how the TCP/IP and OSI models are utilised in the communication process to enable standardis...
A: The TCP/IP model and OSI model are used to facilitate standardization in the communication process -
Q: 4. Let A (Q, E, 8, qo, F) be the DFA given by the state diagram:
A: ANS: NFA: Non deterministic finite automata: For each input symbol at each transition state their ca...
Q: What are the benefits of networking software that allows teachers and students to communicate with o...
A: The networking software where instructors and fellow students are communicating are Google Meets, Go...
Q: Question 6 Which of the following have to be true for a collision resistant hash function? O difficu...
A: The correct option will be (a) and (d) Explanation:- Option(a) Collision resistant is a property of...
Q: What is the difference between the Internet and the World Wide Web?
A: Internet is the interconnection of networks which is globally connected network system which facilit...
Q: What is the relationship between infrastructure protection (ensuring the security of utility service...
A: To define:- infrastructure protection (assuring the security of utility services) related to inform...
Q: What do the Execute Reader, Scaler, and ExecuteNonQuery methods mean? With the assistance of a code ...
A: Execute Reader ExecuteReader Method:- Execute Reader is used for getting the query results as a Dat...
Q: What is a data warehouse, and what does it do? What, furthermore, is the aim of a data warehouse?
A: Intro As we know that data warehouse is very important in business analytics. It is the future. But ...
Q: heir apps in m
A: Machine Language: Machine language, also known as machine code or object code, is a set of binary n...
Q: In terms of cloud security, what is the shared responsibility paradigm?
A: Introduction: A shared responsibility model is a cloud security architecture that spells out a cloud...
Q: What exactly is the distinction between abstraction and polymorphism?
A: answer is
Q: A small research company in Pittsburgh is working to develop a new method of mass storage to replace...
A: The answer is as follows:-
Q: Write a script named copyfile.py. This script should prompt the user for the names of two text files...
A: # get the name of both files file1 = input("Enter file1: ") file2 = input("Enter file2: ") # now o...
Q: Discussion of the relationship between the four roles of an information system, as well as the desig...
A: Introduction: Computers, tablets, cellphones, and disc drives are all examples of information system...
Q: What happens if the cache isn't big enough to contain the program's working set?
A: Introduction: cache size is important to our application because if it is set to small of a value, y...
Q: How can I complete Point.java by using parts of codes in the Unused box on the left?
A: Required code to make toString() method to complete Point.java is: public String toString() { St...
Q: Computer Science What are the different risk treatment options and provide an example how one of the...
A: Risk Treatment is the process of selecting and implementing of measures to modify the risk. Risk tre...
Q: Computer science When it comes to whole-disk encryption, what function does a TPM play?
A: Introduction: Full disc encryption is the process of encrypting all of the data on a disc. The data ...
Q: Make two suggestions for enhancements to the IP packet PDU structure.
A: IP also known as Internet Protocol. IP packets: They are the most critical and fundamental component...
Q: Write a bash script that will create another bash script and run it, the newly generated bash script...
A: Here as like you asked i am only creating a bash script that will create another bash script
Q: What is the distinction between computer science and software engineering, as well as computer scien...
A: computer science Vs software engineering Vs computer science engineering
Q: Write a program that uses a while loop to determine how long it takes for an investment to double at...
A: Python program is coded in the next step using the while loop.
Q: Here are a few examples of how a centrally managed IP-based building security system might help you ...
A: Introduction: Cisco security and safety operations workers monitor and respond to alarm events throu...
Q: Answer the following: a) Rewrite the given IPv4 address using dotted-decimal notation and find the c...
A: Due to company policies I am compelled to solve only one question and that is the first question. Pl...
Q: Give at least 2 reasons that modern operating systems switch from user to kernel mode to perform I/O...
A: The system is in user mode when the operating system is running a user application such as handling ...
Q: Write a loop to request integer values as long as a multiple of 3 is entered. C++
A: 1) Below is C++ Program to Write a loop to request integer values as long as a multiple of 3 is ente...
Q: Why is it importa to avoid type 1 errors?
A: Your answer is given below in detail. Introduction :- A Type I error in statistical hypothesis tes...
Q: Discuss software maintenance techniques with examples
A: let's see the solution
Q: Given the following numbers that represent given course, find the following: 90, 85, 75, 45, 95, 66,...
A:
Q: Why is payroll seen to be an excellent application for batch processing using magnetic tape storage ...
A: Introduction: The batch processing utility takes the input data in bulk, checks its specifications, ...
Q: In your own words, describe the learning process of a switch table for five nodes coupled to one swi...
A: Intro Switch in networking In networking, switching is used for forwarding packets and filtering th...
Q: Write a program which enter the number of units and display the cost.
A: Code : def bill_cal(unit): #Our function if(unit <=500): ...
Q: How can Bangladesh's cybercrime and e-commerce development be accelerated? Information on the materi...
A: Introduction: Since the mid-2000s, when Bangladesh needed a broad internet connection or a dependabl...
Q: How may a literature review be used to develop an information system's phase-by-phase strategy?
A: Literature reviews are crucial as a foundation for all types of research. They may serve as a basis ...
Q: Directions: Implement the following in C++ and show the output of your code for at least two instanc...
A: - I can solve the first problem only. This is our restrictions. - Solving the prime number problem. ...
Q: What is the best way for a company to handle password documentation?
A: Introduction: We need to describe how businesses manage password documents.
Q: • Create an interface named Movable with the following methods: moveForward, moveBackward, moveUp, m...
A: Given data, 1. Create an interface named Movable with the following methods: moveForward, moveBackwa...
Q: What benefits will you get from learning assembly language in terms of your grasp of operating syste...
A: What is assembly language? Assembly language is a low-level programming language designed for code ...
Q: H.W Find the inverse to the following matrices by using adjoint method.
A: Task : Given the matrix. The task is to find the inverse of a matrix using the adjoint method.
Q: Describe the procedures needed in acquiring data from a certain website's web service API calls. con...
A: APIs are composed of three components: A user is the one who submits a request. The client is the co...
Q: a) In a bus CSMA/CD network with a data rate of 10 Mbps, a collision occurs 20 µs after the first bi...
A: a) In this question it is required to find the length of the frame in a CSMA/CD network that will en...
Q: How does a computer save the following information? picture, audio, video, and word document?
A: All of this is stored on computers in digital format, which is understandable by machine alone in co...
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 1 images
- In Java Write a program that reads the student information from a tab separated values (tsv) file and creates a text file that contains student information together with the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20. The program performs the following tasks: A: 90 =< x B: 80 =< x < 90 C: 70 =< x < 80 D: 60 =< x < 70 F: x < 60 Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt. Output one student per row and separate the values with a tab character. Ex: If the input of the program is: StudentInfo.tsv and the contents of StudentInfo.tsv are: Barrett Edan 70 45 59 Bradshaw Reagan 96 97 88 Charlton Caius 73 94 80 Mayo Tyrese 88 61 36 Stern Brenda 90 86 45…In this laboratory work, you are expected to write a c# console application to make some operations about the customers. Operations and required featurest that you need to cover in your program are following: • Add: This function adds a new person to json file. You need to get inputs from user and adds the new one into json file. • Display: This function displays all people in your json file. • Search: This function let you search with the user id. • Create Password: This function will create a random password for the user and user may choose the length of the password. Password may include numbers and characters. • Exceptions: You need to handle exceptions as well. You should at least handle 3 of exceptional cases. For the case that file can not be found, It is mandatory to catch the exception. Sample json string: "FirstName": "Kaan", "LastName": "OZAYDIN", "EmployeeId": 101, "Email": "", "Password": "Address": ( "ZipCode": "06460", "State": "Ankara", "Country": "Turkey" "FirstName":…Write a program that opens a specified text file then displays a list of all the unique words found in the file. Hint: Store each word as an element of a set. 5. Word Frequency Write a program that reads the contents of a text file. The program should create a dictio- nary in which the keys are the individual words found in the file and the values are the number of times each word appears. For example, if the word "the" appears 128 times, the dictionary would contain an element with 'the' as the key and 128 as the value. The
- Directions: Use a file city.txt for answering the questions that follow each scheduling algorithm. This file has three columns (comma separated): the first column contains the job Id, the second column indicates the CPU burst, and column three is the arrival time of the corresponding job. Parallel Programming It is vaccine season! COVID19 vaccines are out, and everyone is rushing to get one. Vaccines are available from six different brands and you have been entrusted to write a program to count the total number of vaccines of each brand administered across 21 cities in the state. Write a multithreaded program (in the file vaccines.cpp) that counts the number of vaccines in 21 different files of numbers. Each line in each of the files will contain either one of the following brand names: v1, v2, v3. Your program must count the number of units for each vaccine brand administered, across all 21 cities, and display the total number of units for each brand. The files are named…Directions: Use a file city.txt for answering the questions that follow each scheduling algorithm. This file has three columns (comma separated): the first column contains the job Id, the second column indicates the CPU burst, and column three is the arrival time of the corresponding job. Parallel Programming It is vaccine season! COVID19 vaccines are out, and everyone is rushing to get one. Vaccines are available from six different brands and you have been entrusted to write a program to count the total number of vaccines of each brand administered across 21 cities in the state. Write a multithreaded program (in the file vaccines.cpp) that counts the number of vaccines in 21 different files of numbers. Each line in each of the files will contain either one of the following brand names: v1, v2, v3. Your program must count the number of units for each vaccine brand administered, across all 21 cities, and display the total number of units for each brand. The files are named "city1.txt",…Write a program that receives a filename as user input. The file is structured as multiple lines containing numbers separated by a single space.For example, this would be an acceptable file: 1 2 3 4 5 6 7 2 Your program should open this file and: print all its contents; write the median of all numbers to a new file called result.txt. IMPORTANT NOTES: the median is the element in the middle when you sort the values; the median of values (2, 1, 3) is 2, because when you sort them, you get 1, 2, 3, and 2 is the value in the middle. you can assume there will be no empty lines; there might be any arbitrary number lines in the file; there might be any arbitrary number of elements in a single line; you can assume there will always be an odd number of elements. Example 1: If input is: file1.txt and the contents of file1.txt are: 1 2 2 you should first print the content, and then write 2 to result.txt. Example 2: If input is: file2.txt and the contents of file2.txt are: 1 2 3 4 5 1 7 you…
- reads in a file of student academic credit data. Each line of the input filewill contain the student name (a single String with no spaces), the number of semester hours earned (an integer),the total quality points earned (a double).Here is the students.dat data file:students.dat Smith 27 83.7Jones 21 28.35Walker 96 182.4Doe 60 150Wood 100 400Street 33 57.4Taylor 83 190Davis 110 198Smart 75 292.5Bird 84 168Summers 52 83.2 My question is how can I create the <<students.dat>> I already have the code but I just need help to create the students.datIn Java Oleae nust read a file A photographer is organizing a photo collection about the national parks in the US and would like to annotate the information about each of the photos into a separate set of files. Write a program that reads the name of a text file containing a list of photo file names. The program then reads the photo file names from the text file, replaces the "_photo.jpg" portion of the file names with "_info.txt", and outputs the modified file names. Assume the unchanged portion of the photo file names contains only letters and numbers, and the text file stores one photo file name per line. If the text file is empty, the program produces no output. Ex: If the input of the program is: ParkPhotos.txt and the contents of ParkPhotos.txt are: Acadia2003_photo.jpg AmericanSamoa1989_photo.jpg BlackCanyonoftheGunnison1983_photo.jpg CarlsbadCaverns2010_photo.jpg CraterLake1996_photo.jpg GrandCanyon1996_photo.jpg IndianaDunes1987_photo.jpg LakeClark2009_photo.jpg…in java 8.8 LAB: Course Grade Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20. Assume also the last names and first names do not contain whitespaces. The program performs the following tasks: Read the file name of the tsv file from the user. Open the tsv file and read the student information. Compute the average exam score of each student. Assign a letter grade to each student based on the average exam score in the following scale: A: 90 =< x B: 80 =< x < 90 C: 70 =< x < 80 D: 60 =< x < 70 F: x < 60 Compute the average of each exam. Output the last names, first names, exam…
- Java : Create a .txt file with 3 rows of various movies data of your choice in the following table format: Movie ID number of viewers rating release year Movie name 0000012211 174 8.4 2017 "Star Wars: The Last Jedi" 0000122110 369 7.9 2017 "Thor: Ragnarok" 1. Create a class Movie which instantiates variables corresponds to the table columns. Implement getters, setters, constructors and toString. 2. Implement 2 readData() methods : the first one will return an array of Movies and the second one will return a List of movies . 3. Implement two search methods to search Movies by their rating from unsorted array and by year (first) and a rating (second) from unsorted List.4. Implement two MovieComparators to compare movies by their rating from unsorted array and by year (first) and a rating (second) from unsorted List.Create a text file of names, (3 names per line, 5 lines in total) followed by an age for each name. Go through the file and sum the ages. Create an output file with each persons name followed by age and then a line at the end of the output file that says “sum of all ages is: x”. Simple Java programming. Should include things like bufferedReader, fileReader, printWriter, fileWriter, file close, try-with-resources, Scanner, catch/try, etc. Include Java file and txt file. Thank you.IN JAVA ONLY PLEASE. POSITIVE REVIEW WILL BE LEFT FOR CORRECT LANGUAGE ONLY AND NOT COPY PASTE FROM INCORRECT ANSWER A photographer is organizing a photo collection about the national parks in the US and would like to annotate the information about each of the photos into a separate set of files. Write a program that reads the name of a text file containing a list of photo file names. The program then reads the photo file names from the text file, replaces the "_photo.jpg" portion of the file names with "_info.txt", and outputs the modified file names. Assume the unchanged portion of the photo file names contains only letters and numbers, and the text file stores one photo file name per line. If the text file is empty, the program produces no output. Ex: If the input of the program is: ParkPhotos.txt and the contents of ParkPhotos.txt are: Acadia2003_photo.jpg AmericanSamoa1989_photo.jpg BlackCanyonoftheGunnison1983_photo.jpg CarlsbadCaverns2010_photo.jpg CraterLake1996_photo.jpg…