Using the following information, make a Python dictionary called "Contacts" that can print out all the phone numbers with the names of the people who own them: Nana – 0905678999 Mikael - 0922321 Zara – 09994567890 Allan - 09556211 Output should be like: {'Nana': 0905678999, 'Mikael': 0922321, 'Zara': 09994567890, 'Allan': 09556211}
Q: What does the Property process include exactly?
A: Property management An array of Visual Basic lines called a property procedure are used to alter a…
Q: What is the job of TMOD register?
A: Timers on an 8051 microcontroller are started or stopped using the Timer Control or TCON Register.…
Q: Which of the three categories of crucial database events would initiate the recovery process? Give a…
A: Method for recovering databases: Restoring an incoherent archive is a kind of recovery that may be…
Q: What is switching and what does it mean to swap?
A: Mean to Swap Switch denotes "change," whereas swap indicates "exchange." Swapping involves…
Q: What makes embedded systems different from general-purpose computers
A: Computer System: It is a group of things (hardware, software, and liveware) made to accept, manage,…
Q: Talk about the many graphic and image editing software programs that are available.
A: In our digital era, photo editing software has become widespread. Whether you're making a web…
Q: When is it appropriate to split up complex computer programs and processes into smaller units, and…
A: The operating environment where the system arranges work flow and resource consumption is known as a…
Q: Can you explain why, in certain instances, automated transactions utilizing credit card numbers may…
A: Given: Due to the widespread use of internet-based banking and shopping, electronic payment methods…
Q: When should Brouter be installed on your network?
A: A brouter is a term that was created by fusing the words "bridge" and "router." Both the bridge…
Q: Showcase the benefits of a data-driven website for business?
A: Answer is in next step.
Q: What is the difference between publishing and deploying an application when using the C# programming…
A: Clarification on the distinction between deploying and publishing a C# application. Deployment: It…
Q: In the first five minutes, describe the Named Entity Recognition program and what it is intended to…
A: Employers have the option of recognising: Their employees for their positive contributions to the…
Q: Are different security risks possible to affect computer systems?
A: INTRODUCTION: A computer system risk is anything that results in data loss or corruption, as well as…
Q: Give a brief explanation of what an application programming interface is (API)
A: Interface for Application Programming (API) An API is a collection of procedures, protocols, and…
Q: a group of qualities There are many different types of user-friendly output devices available in a…
A: Having said that: a collection of characteristics There are many different kinds of output devices…
Q: Which microorganisms will be the most well-liked in the future? Do you favor the metric approach,…
A: Technology for biometrics: The term metrics implies to compute or measure anything, while the word…
Q: What information sharing policies does a corporation have in place for information security incident…
A: Answer: A thorough plan or course of action is called a blueprint. When considering a network…
Q: There are two ways to find data in memory: sequential access and direct access. In today's…
A: There are two different ways to locate data in memory: sequential access and direct access. The…
Q: The results of the research on patient travel time showed that compared to the general population,…
A: Information disclosed: An app called Doctor on Demand gives patients who don't want to go to the…
Q: In the first five minutes, describe the Named Entity Recognition program and what it is intended to…
A: Introduction: Through recognition software, employers can give their employees bonuses for…
Q: TCP requires the integrity of all parties, or more specifically, the integrity of all endpoint…
A: Definition: Compared to other endpoints, the Transmission Control Protocol (TCP) instance benefits…
Q: Which features appear often in network diagrams?
A: The answer of the question is given below
Q: What is the process by which the Whetstone, Dhrystone, and Linpack tests' weaknesses are fixed by…
A: The SPEC CPU test addresses deficits in the Dhrystone, Whetstone, and Linpack benchmarks. Whetstone…
Q: Are different security risks possible to affect computer systems?
A: Yes there are various security risk that can affect your computer system that are, let's discuss…
Q: What are the practical uses of hashing or graphing in terms of data structures and algorithms?
A: Data Structure and Alogorithms: A data structure is a named area that can be utilized to store and…
Q: There are two ways to find data in memory: sequential access and direct access. In today's…
A: Given: There are two ways to find data in memory: sequential access and direct access. How to get…
Q: What is the Cybercrime Conceptual Framework? Do you have any sources to support your assertions?
A: Definition: Theorists of the internet concur that cyberspace enables near-instantaneous contacts…
Q: Describe the main activities in the software design process and the outputs of these activities.…
A: The software design phase occurs between the requirements definition and the integration phases. The…
Q: What precisely does an operating system do?
A: Introduction To be determined: An operating system's function
Q: How many tests we have to use in the simple approach? A:6 B:7 C:8 D:9
A: How many tests we have to use in the simple approach? A:6 B:7 C:8 D:9
Q: What do you mean by wireless communication?
A: Based on the media of the transmission, there are two types of communications. That are: Wired…
Q: Explain GUI Architecture of android.
A: in the following section we will be discussing about the GUI Architecture of android.
Q: When should a subquery be nested inside of a HAVING clause?
A: Introduction: Nesting of a subquery inside a HAVING clauseIt is possible to filter groups of rows…
Q: Which firewall management options do you consider to be the most successful? Explain?
A: let us see the answer:- Introduction:- Your most important security instrument, a network firewall,…
Q: When should Brouter be installed on your network?
A: Introduction: Router: A router is a device that shares a single internet connection with multiple…
Q: What is the Cybercrime Conceptual Framework? Do you have any sources to support your assertions?
A: Theorists of the internet agree that cyberspace enables near-instantaneous contact between…
Q: Make a case for the use of deep access over shallow access from the viewpoint of a programmer;…
A: Deep Access: The goal is to maintain a stack of currently used variables. Use control links rather…
Q: There are differences made between the following modelling and simulation techniques once they have…
A: Agent-Based Simulation - expert-built Simulation displaying centres on the individual dynamic…
Q: (You cannot use arrays for this assignment) Assume you are working for the Kean University and given…
A: Steps: 1. Since we can't use arrays. We are going to use a string as a database that stores all the…
Q: Describe the possibility of a new system supporting a function of a legacy operating system (such as…
A: UNIX: The architecture and capabilities of Multics have had a significant influence on the Unix OS.…
Q: In the first five minutes, describe the Named Entity Recognition program and what it is intended to…
A: Given: Through recognition software, employers may give their employees bonuses for doing well in…
Q: Attacks by a man-in-the-middle (MITM) may be prevented in a number of ways. Is it feasible to…
A: What is a man in the middle (MiTM) attack : Man-in-the-middle attacks (MITM) are a frequent kind of…
Q: What are the duties of data link layer?
A: Introduction Data-link layer: Second layer/layer 2 of OSI model/design Deal with data/frame…
Q: TCP requires the integrity of all parties, or more specifically, the integrity of all endpoint…
A: Given: Instances of the Transmission Control Protocol (TCP) that are advantageous in comparison to…
Q: What part do permits and password security play in maintaining regulations?
A: In this question we need to explain the role of password security in maintaining regulations.
Q: Bootstrapping procedure to achieve initial feasibility of a convex constrained region. INPUTS:…
A: INPUTS: NotSat: the set of inequality constraints having convex region effects:-
Q: How does availability change when mean time between failures (MTTR) gets closer to zero? Is it…
A: Introduction: Availability when MTTR gets close to zeroMean Time To Repair (MTTR) is a fundamental…
Q: How would you manage the data flow between client and server apps when creating a multimedia…
A: Here is the justification for what follows: INTRODUCTION A predetermined order has been created. In…
Q: Think about how wireless networks are used in developing nations. Why certain sites choose wifi over…
A: Introduction: The network nodes in a wireless network transmit and receive data wirelessly. Cell…
Q: Could you, if possible, explain the metrics used in the software development process? Is it not…
A: What are software metrics : Software metrics are measurements of quantifiable or countable software…
Using the following information, make a Python dictionary called "Contacts" that can print out all the phone numbers with the names of the people who own them: Nana – 0905678999 Mikael - 0922321 Zara – 09994567890 Allan - 09556211 Output should be like: {'Nana': 0905678999, 'Mikael': 0922321, 'Zara': 09994567890, 'Allan': 09556211}
Step by step
Solved in 4 steps with 2 images
- For this problem, you will write part of a Python program that will tell the user when to plant certain edible plants in their garden. The plants and their planting seasons are shown in the table below: Plant Season blueberry fall or spring tomato spring pumpkin late spring cabbage spring or late summer strawberry early spring Your code should: Store the plants words and their planting seasons in a dictionary Prompt the user to enter the name of a plant they want to look up. If the plant exists in the dictionary, print its planting season. Your program should be case insensitive e.g. both "cabbage" and "CABBAGE" should print "spring or late summer". If the word does not exist in the dictionary, print a message telling the user that you don't have the information they're looking for. Continue to prompt the user to enter a plant name to look up until they enter "q" to quit the program. Example input / output (User input in blue) Enter a plant name: Pumpkinlate…A Python dictionary that returns a list of values for each key. The dictionary will contain information about my favorite books, including the title, author, and year of publication. The key will be the title of the book, and the values will be a list containing the author and the year of publication. favorite_books = { "The Great Gatsby": ["F. Scott Fitzgerald", 1925], "To Kill a Mockingbird": ["Harper Lee", 1960], "1984": ["George Orwell", 1949]} NOTE: You can replace the book details as your need in above code. Next, modify the invert_dict function from Section 11.5 of "Think Python" to invert my dictionary. The modified function will need to turn each of the list items into separate keys in the inverted dictionary. def invert_dict(d): inverse = dict() for key in d: vals = d[key] for val in vals: if val not in inverse: inverse[val] = [key] else: inverse[val].append(key) return inverse Here, the…A python dictionary, Bank, is created to keep track of the Current Account and the Savings Account for each client in a bank. While the first item in the list is for the current account, the second item is for the savings account. The client’s name acts as the key for this dictionary.Bank = {"Apple":[100.0, 1500.0],"Bobby":[200.0, 4000.0],"Cathy":[150.0, 3500.0],"David":[300.0, 2500.0]}Write the following functions for the dictionary Bank to maintain the clients’ current and savings accounts.1. Function printBank( ): print out the contents of the dictionary Bank2. Function deposit(Name, account_type, amount): deposit the amount of money to the account specified by the account_type under the client’s name.3. Function withdraw(Name, account_type, amount): withdraw the amount of moneyfrom the account specified by the account_type under the client’s name.4. Function creatAccount(Name): create a new entry in the dictionary and initialize both the current and savings accounts to 0.0 under…
- you have the following dictionary. Just copy the dictionary from the question to your editor sitcom={ 'friends': ['joey', 'rachel'], 'BBT': ['sheldon', 'leonard'], 'brooklyn 99': ['amy', 'rosa']} Write a python function that will take the dictionary as a parameter and also an integer that will be given by the user. Then you have to find out which key’s corresponding values have the length same as the user input. Then print the following. NB: Your code needs to be worked if the given dictionary is changed. (You can not use the len(), count() functions) Sample Input 1: 14 function call 1: sitcom_calc(sitcom,value) Sample Output 1: sheldon leonard are the bestest friends ever Explanation: Here, the user input is 14. When the key is ‘friends’, the length of its corresponding values are 4 (joey)+ 6 (rachel) =10. So, they don't match. Now, when the key is ‘BBT’ the length of its corresponding values are 7 (sheldon)+ 7 (leonard) =14. So, match! That’s why, sheldon leonard…Simple login system PYTHON Create a static dictionary with a number of users and with the following values: First name Last name Email address Password Ask the user for: 5. Email address 6. Password Loop (for()) through the dictionary and if (if()) the user is found print the following: 7. Hello, first name last name you have successfully logged in 8. Notify the user if the password and email address are wrong 9. Additional challenge: if you want the program to keep asking for a username and password when the combination is wrong, you will need a while() loop.Suppose there is a dictionary named exam_marks as given below. exam_marks = {'Cierra Vega': 175, 'Alden Cantrell': 200, 'Kierra Gentry': 165, 'Pierre Cox': 190} Write a Python program that takes an input from the user and creates a new dictionary with only those elements from 'exam_marks' whose keys have values higher than the user input (inclusive). =================================================================== Sample Input 1: 170 Sample Output 1: {'Cierra Vega': 175, 'Alden Cantrell': 200, 'Pierre Cox': 190} =================================================================== Sample Input 2: 190 Sample Output 2: {'Alden Cantrell': 200, 'Pierre Cox': 190} ===================================================================
- In python: student_dict is a dictionary with students' name and pedometer reading pairs. A new student is read from input and added into student_dict. For each student in student_dict, output the student's name, followed by "'s pedometer reading: ", and the student's pedometer reading. Then, assign average_value with the average of all the pedometer readings in student_dict..#program should be written in python with comments. Write a program that uses a dictionary to assign “codes” to each letter of the alphabet. For example:codes = { ‘A’ : ‘%’, ‘a’ : ‘9’, ‘B’ : ‘@’, ‘b’ : ‘#’, etc . . .}Using this example, the letter A would be assigned the symbol %, the letter a would be assigned the number 9, the letter B would be assigned the symbol @, and so forth. The program should open a specified text file, read its contents, then use the dictionary to write an encrypted version of the file’s contents to a second file. Each character in the second file should contain the code for the corresponding character in the first file. Write a second program that opens an encrypted file and displays its decrypted contents on the screen.write a python program for this question. You will be given a dictionary, where the name of a student will be the key and a list of courses will be the value.Now, you have to take a course name as input until the user gives 'STOP' in the input. Your task is to display the list of the students taken that course after each input.Given Dictionary{ 'Mike' : ['CSE110','ENG101','MAT110'],'Simon' : ['CSE111','PHY111','MAT110', 'CSE230'], 'Shawn' : ['CSE110','ENG101','MAT120','CSE230'], 'Alice' : ['CSE110','ENG091','MAT092'] }================================================Sample Input 1CSE110MAT110CSE260STOPSample Output 1[ 'Mike', 'Shawn', 'Alice' ][ 'Mike', 'Simon'][ ]Explanation 1:Mike, Shawn and Alice are doing CSE110Mike and Simon are doing MAT110No student is doing CSE260
- Write a program in python that creates an empty dictionary and fills it with information about a person (for example, name, age, gender, telephone number, email, etc.) that the user is prompted. Every time you add a new data the contents of the dictionary should be printed.Write a python code that will make a dictionary from the given list of Student IDs based on the department and admitted year. ID explanation: First 2 digits: Year 4th and 5th digit: Department 01 = CSE, 41=CS, 21=EEE, Any other digits = Other For example, ID: 21121347, in this ID, the first 2 digits are 21. So the year is 2021. The 4th and 5th digit are 21. So the department in EEE. Given List [Your code should work for all types of similar IDs if the given List is changed.]: IDs = ['20201199','21121347','20141052','20341121','21241369','21272199','19241187','19101007','20101035', '21121875', '19141534', '19301552', '21141135', '21365001'] Sample Output (You have to print the resultant dictionary only) { 2020:{ 'CSE': ['20201199', '20101035'], 'CS': ['20141052', '20341121'] }, 2021:{ 'EEE': ['21121347', '21121875'], 'CS': ['21241369', '21141135'], 'Other':…In Python use import sys Use the following dictionary to complete this assignment: {'A':4.0, 'A-':3.66, 'B+':3.33, 'B':3.0, 'B-':2.66, 'C+':2.33, 'C':2.0, 'C-':1.66, 'D+':1.33, 'D':1.00, 'D-':.66, 'F':0.00} Create a program that takes four letter grade arguments and prints out the corresponding GPA, to two decimals. Your program should work both in arguments are upper-case and lower-case. Your program should print in the form: My GPA is x Where x is equal to the GPA calculation