Part I Assume that a N x M matrix is stored in a file. However, the file is corrupted somehow, and some numbers replaced with asterisk symbol (*). Write a method that reads given corrupted file and fills the missing data with the average of the column. For example, given matrix 1 2 3 4 7 8 10 11 12, missing data should be replaced with 2+8+11 = 7. Part II Assume that multiple messages are encrypted with Ceaser ciphering' and stored in a file. Write a method that deciphers the messages with given shift value. Note: Use English alphabet with only lower-case characters. Part III Assume that multiple arithmetic operations² are stored in a file. However, some of the results are wrong. Write a method that finds the operations which the results are wrong in given file. For example, given operations 1.0 + 2.0 4.0 %3D 2.5 + 2.5 5.0 3.0 / 2.0 1.0 %3D the method should return Oth and 2nd line strings. Note: Do not round the numbers in any step of the calculation.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Part I
Assume that a N x M matrix is stored in a file. However, the file is corrupted somehow,
and some numbers replaced with asterisk symbol (*).
Write a method that reads given corrupted file and fills the missing data with the average
of the column. For example, given matrix
1
3
4
6
7
8.
10
11
12,
missing data should be replaced with 2+8+11
= 7.
Part II
Assume that multiple messages are encrypted with Ceaser ciphering' and stored in a file.
Write a method that deciphers the messages with given shift value.
Note: Use English alphabet with only lower-case characters.
Part III
Assume that multiple arithmetic operations? are stored in a file. However, some of the
results are wrong. Write a method that finds the operations which the results are wrong in
given file. For example, given operations
1.0 + 2.0
4.0
2.5
+ 2.5
5.0
3.0 / 2.0
1.0
%D
the method should return 0th and 2nd line strings.
Note: Do not round the numbers in any step of the calculation.
Transcribed Image Text:Part I Assume that a N x M matrix is stored in a file. However, the file is corrupted somehow, and some numbers replaced with asterisk symbol (*). Write a method that reads given corrupted file and fills the missing data with the average of the column. For example, given matrix 1 3 4 6 7 8. 10 11 12, missing data should be replaced with 2+8+11 = 7. Part II Assume that multiple messages are encrypted with Ceaser ciphering' and stored in a file. Write a method that deciphers the messages with given shift value. Note: Use English alphabet with only lower-case characters. Part III Assume that multiple arithmetic operations? are stored in a file. However, some of the results are wrong. Write a method that finds the operations which the results are wrong in given file. For example, given operations 1.0 + 2.0 4.0 2.5 + 2.5 5.0 3.0 / 2.0 1.0 %D the method should return 0th and 2nd line strings. Note: Do not round the numbers in any step of the calculation.
Expert Solution
steps

Step by step

Solved in 4 steps with 3 images

Blurred answer
Knowledge Booster
Files and Directory
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education