Make a function to crawl through the current directory and display all the available files with .txt extension.
Q: The portion of a machine language instruction that defines object (or target) of a mathematical or…
A: We are going to learn what portion of machine instruction defines object (or target) of a…
Q: What is it about information system design that makes it so susceptible to scope creep in the first…
A: Introduction: The suggestions of clients and other stakeholders are a significant cause of scope…
Q: Write an application that stores nine integers in an array. Display the integers from first to last,…
A: HI THEREI AM ADDING C CODE AS PER REQUIREMENT BELOWPLEASE GO THROUGH IT THANK YOU
Q: What exactly are memory leaks?
A: Memory Leak: Memory leak means whenever programmers will create a memory in heap and whey they…
Q: What role does a processor's register play? Explain what an Interrupt Service Routine (ISR) is and…
A: Explanation: Registers in a processorRegisters are a sort of computer memory that allows the CPU to…
Q: What level of security was standard when computers were initially introduced? Explain
A: INITIATION: In 1822, Charles Babbage invented the first mechanical computer, which did not resemble…
Q: What sort of tree does the Java Standard Library create for ordered data?
A: Introduction: Ordered Data in a Tree: The Tree Set interface of the collections in Java may be used…
Q: make a text-based wordle game in python with 4 to 6 letter words and you have 7 guesses to guess the…
A: Text-based wordle game in python with 4 to 6 letter words and you have 7 guesses to guess the word…
Q: Do you agree with Dr. Ferrucci that one day all computers will be like Watson? What would you do if…
A: Introduction: Watson is the data required by technical support staff to diagnose a software fault on…
Q: Programming in C# write a gui application that prints out all numbers in the range 1 - 100…
A: Algorithm: Start Create a label with name label Initialize s and s1 to empty string Iterate through…
Q: Consider the 00 1E A3 10 UDP header 12 03 00. HOW LONG DOES THE UDP TAKE IN TOTAL?
A: Introduction: In the TCP/IP paradigm, the User Datagram Protocol (UDP) is a transport layer…
Q: Differentiate between the many types of computer networks (based on scale)?
A: Answer:
Q: 5 Six digital media channels are introduced in this chapter. What are they and how do they work to…
A: Exаmрles оf digitаl mediа inсlude sоftwаre, digitаl imаges, digitаl videо, videо gаmes,…
Q: 1. Which regular expression generates the language of ALL alternating strings over E = {a, b},…
A: As per our guidelines only 3 mcqs are answered. So, please repost the remaining questions…
Q: Discuss the networking aspects that impact your Google Meet connection positively and what you can…
A: To provide high-quality video meetings with Google Meet, you must design your network so that Meet…
Q: 1.Consider a complete graph G with 4 vertices. The graph G has. ---- spanning trees. 2. Consider a…
A: 1. The graph can have many cross trees. And a complete graph with n vertices has n (n-2) expandable…
Q: Problem 4.2: Following is a 9 by 9 matrix. 1 represents the obstacle and 0 represents the path. Find…
A: Sample Screenshot:
Q: How would i use python the create a function to display the different stores that made a sale in…
A: The first thing to be done is to copy the csv file in the root folder where python files are…
Q: FUNCTION AND ARRAY ( C++ LANGUAGE) Create a sequence program that will input names to the arrayName…
A: PROGRAM INTRODUCTION: Include the required header files. Declare the required global variable.…
Q: The size of the memory could be given as:
A: The answer is
Q: Kindly draw the Data Flow Diagram (DFG) for code. function parseString(str, a, b) { var cb, options;…
A: The DFD for the given program is as follows.
Q: Where necessary, use correct syntax to define the following notions. Also, explain why these terms…
A: Introduction: Because there are several questions, the first three will be addressed. Please submit…
Q: Make an SRS document for the whole enrollment process.
A: There are specific characteristics that every SRS should have. By reviewing this list and comparing…
Q: • Define a void function called myFunc that takes a 2-by-3 integer array as an argument and performs…
A: The question does not state any particular programming language for the solution to be in. We have…
Q: Explain the characteristics of JavaScript programming language
A: Characteristics of JavaScript programming language: -> It is an open source scripting language…
Q: Convert the code into compiled RISC-V code in simplified solution : for(i=0;i< size;i++) If(B[i]…
A: The solution to the given question is: RISC-V code: f(int*, int*): # @f(int*, int*) addisp, sp, -32…
Q: What are the principles behind cyclic redundancy checks?
A: CRC is an error-detection technique commonly used in digital networks and storage devices to detect…
Q: Explain what a system model is and what it is used for. What considerations should be taken into…
A: Instigation: In the systems modelling framework, the informal flow of information between modules is…
Q: able 1: An alignment and span- Table 2: Another exercise for align- ng exercise for tabular data.…
A: Two tables are made:- Table 1 :- It has four rows And colspan =2 in row 2nd and 3rd is used and…
Q: Describe the circumstances that lead to a system's stalemate.
A: The following conditions cause deadlocks in the system: - Circular Wait Condition Hold and Wait…
Q: What is the logical basis of direct proof and indirect proof?
A: The logical basis of direct proof and indirect proof A statement is any sentence that is either true…
Q: dentitv and describe the eight essential comnonents of communication.
A: Eight essential components of communication are:
Q: Learn about a methodical approach to increasing the security of a Linux machine. Discussion topics…
A: Start: SECURITY FEATURES THAT ARE COMMONLY USED. Linux provides password authentication, file…
Q: What are the three primary cloud computing platforms?
A: Cloud computing is the on-request accessibility of PC system resources, particularly data storage…
Q: Why is it important to balance both organizational needs and human needs in designing software?
A: Software design is a process to transform user requirements into some suitable form, software design…
Q: What are the definitions of database users and what are the functions of a database administrator?…
A: A database management system is a collection of related data which represents some aspect of the…
Q: Analyze a backup plan's components What is the difference between a mobile and PC backup plan?
A: components of a backup plan: A backup plan's components Secure, encrypted offsite backup is one of…
Q: JavaScript 3. How does this programming language differ than other programming languages? 4.…
A:
Q: In the language of your choice, give one example of orthogonality, generality, and uniformity
A: Orthogonality: It is something like when a value is being changed without affecting others For…
Q: Write the SQL code that will create the tables structures for the tables named Books, and Users.…
A: HI THERE I AM ADDING REQUIRED CODE BELOWPLEASE GO THROUGH IT THANK YOU
Q: Which Internet of Things wireless standard is used to connect data from a smartwatch, bike computer,…
A: The answer is ANT+. ANT+ stands for interoperability which implies that ANT+ products from a couple…
Q: Assume that the Ready Queue contains several Processes with varying burst times. If the scheduling…
A: Almost all programmes have a few alternating Processor number loops that are busy crunching numbers…
Q: What exactly are memory leaks?
A: Justification: Memory leaks are a form of resource leak that happens when a computer software poorly…
Q: The receiver corrects errors without requesting retransmission. a. CRC b. FAC c. FEC d. NTC
A: The receiver corrects errors without requesting retransmission.
Q: Reduce the following Boolean expressions to their simplest form *: F = abc + (a + c) + bc (number of…
A: Please refer below for your reference: I have solved the question using two methods by…
Q: In the language of your choice, give one example of orthogonality, generality, and uniformity.
A: Orthogonality: Smalltalk is an example of this. All values are considered objects in Smalltalk, and…
Q: HW1: Write a CPP program that reads items names and items prices of 50 items from KB and stores them…
A: reads items names and items prices of 50 items from KB and stores them in a file (prices.txt)…
Q: Write at least one justification for operating an application in the cloud, which may encounter a…
A: Cloud Computing: The term "cloud computing" refers to the use of the internet to store and process…
Q: Give your thoughts on why parallel processing is required in any computer.
A: In computing, a method of running two or more processors i.e CPUs to handle different/ separate…
Q: Explain why para-virtualization might outperform HW virtualization, which frequently uses system…
A: Those in the computer science sector are frequently required to integrate programs on different…
10
This task is from shell scripting
Step by step
Solved in 2 steps
- CODE IN PYTHON PLEASE The objective is to create a code in Python that can extract the columns highlighted in blue (Column T and AB3) and output them to a .txt file. The code should be able to generate the text file with the columns that are highlighted in blue and store them on a separate folder. Below shows how the Test.xlsm file looks like as well as how the text file should look like when the code extracts and outputs it. Google drive to access Test.xlsm file: https://drive.google.com/drive/folders/16utzb5_h7yMCN8_13E_JqasfcpykZOYr?usp=sharing What my code outputs is shown in the picture (O1.png) What I would like for my code to output is the columns next to each other (Right Example.png) The current code is able to output Columns T and AB3 but I am not able to output them next to each other as shown above. We would also like for the code to be capable of storing the text file to a separate folder. Below is the code I have been working on. #package to read xlsm file import openpyxl…Unix assignment Purpose: The purpose of this assignment is to use various concepts of the C Shell. 0. Change your default login shell to the C Shell. 1. Create a .cshrc file in your home directory that will do the following: * Create the alias (lsall) that will do all of the following: display the date, and a recursive long list of all files in a directory. * Create the alias (whoson) that will display the date and a sorted list of users logged in. * Declare the LOCAL variable that controls the size of your history list to the value 200. * Declare the shell variable that will cause the C Shell to send a message to your terminal whenever one of your background commands complete. 2. Create a .login file in your home directory to do the following. * Declare the GLOBAL Terminal Type variable to the value vt100. Display the value of the variable. Logout and log back in to make sure your .cshrc and .login files are automatically executed. Create a lab8.scr…CODE IN PYTHON PLEASE The objective is to create a code in Python that can extract the columns highlighted in blue (Column T and AB3) and output them to a .txt file. The code should be able to generate the text file with the columns that are highlighted in blue and store them on a separate folder. Below shows how the Test.xlsm file looks like as well as how the text file should look like when the code extracts and outputs it. Google drive to access Test.xlsm file: https://drive.google.com/drive/folders/16utzb5_h7yMCN8_13E_JqasfcpykZOYr?usp=sharing What my code outputs is shown in the picture (O1.png) What I would like for my code to output is the columns next to each other (Right Example.png) The current code is able to output Columns T and AB3 but I am not able to output them next to each other as shown above. We would also like for the code to be capable of storing the text file to a separate folder. Below is the code I have been working on. #package to read xlsm file import openpyxl…
- BASH FLOW CHART: Create a flow chart to describe an algorithm that takes a text file with format ID,FirstName,Last Name,Street,City and appends a user ID field consisting of a C followed by theemployee ID. For example, the first entries in Lab 2's employees.txt are:0,Douglas L,Eberhard,Addenda Circle,Cornwall1,Elizabeth Sua,Hemauer,Wyatt Way,Peterborough2,Bailey Rae,Lopez,Turnagain Street,Sault Ste. MarieAfter processing, the entries should be:0,Douglas L,Eberhard,Addenda Circle,Cornwall,C01,Elizabeth Sua,Hemauer,Wyatt Way,Peterborough,C12,Bailey Rae,Lopez,Turnagain Street,Sault Ste. Marie,C2Python - Next Birthdate In this task, we will write a program that reads birthdate data from a given CSV file, and given the current date, determines which person's birthday will be celebrated next. Create a function with the following signature: nextBirthdate(filename, date) filename: parameter, which represents the CSV filename. date: parameter, which represents the current date. The function should open the CSV file, read the birthdate data, and determine which person's birthday will be celebrated next, given the current date. The name of the person should be returned. In other words, given a date, find the person whose birthday is next. Sample Run birthdates.csv Draven Brock, 01/21/1952 Easton Mclean, 09/02/1954 Destiny Pacheco, 10/10/1958 Ariella Wood, 12/20/1961 Keely Sanders, 08/03/1985 Bryan Sloan,04/06/1986 Shannon Brewer, 05/11/1986 Julianne Farrell,01/29/2000 Makhi Weeks, 03/20/2000 Lucian Fields, 08/02/2018 Function Call nextBirthdate("birthdates.csv", "01/01/2022") Output…Write the code in python Create an application that can create, display, search and maintain the book information for a bookstore. Requirements: 1) you need to use functions to write code for each menu item. 2) Information of books will be saved in a file, e.g,, books.txt. 3)User can add any number of books to the booklist. There can be 5 books or 500 books. In order for your program to handle it without any changes in the code, you cannot hardcode the number of books in your program.
- Task: Loading data from files This exercise will require you to load some information from files and use it in your program. scene.txt contains a description of a series of shapes and colours to draw. You need to write code to read in the file data and draw the requested shapes in the correct colour. Each line in scene.txt will contain one of the following starting keywords followed by some data: COLOUR followed by 3 values: R, G, B CIRCLE followed by 3 values: X, Y, RADIUS RECT Followed by 4 values: X, Y, W, H LINE Followed by 4 values: X1, Y1, X2, Y2 CIRCLES are defined from the center. RECT's are defined from the top left. All values are space separated, and you can assume all input is correct (no errors). Please solve this program to draw the scene. I can't upload the file scene.txt, so I decide to screenshot a file for you. Subject: Java Programminga) Create a folder a07 and go to it . b) Using the class text type in the following files as listed. • mergesort.h from pages 263 merge.c from page 264 mergesort.c from page 266 main.c from page 269 wrt.c from page 269 c) To each file add the appropriate heading information using the template below as an example: /* * main.c ← code name from the book entered by your name October 22, 2014 the date entered * ★ ★ Program Assignment: A07 ★ * * * + due date from class web site From A Book on C, Page 269 + Indicate the page or pages Part of 6.9 An Example: of Merge and Merge Sort - Pages 263-269 Due Date: October 26, 2014 */ d) Add to the code appropriate comments as per CIS158 standards e) Create an appropriate makefile to compile the program calling the binary sort158 f) Using make, create sort158 Indicate the output on the screen from the make. g) Execute sort158. Indicate the output on the screen from sort158 h) Go to main.c and remove the first 4 element from key[] i) Using make, create…PHONE DIRECTORYDescription: Create a phonebook directory that will store the contact numbers of N persons. Your program should allow the user to add, view, delete, and update the contacts in the phonebook. Note that one person can have multiple contact numbers. The program will stop when the user command is ‘X’. Program command and entry should not be case-sensitive. That means commands ‘I’ or ‘i’ and the name “Jacky” or “JACKY” are the same. Each contact number can be 7 digits or 11 digits only. The user should input a string containing the command, name, and contact number(s) (Limit the contact number of each person to three). This string should be broken down into fields in order to separate the different values and store them in their appropriate variables. Use linked list in the implementation. Your node must declare at least four instance variables. Program flow: Command> I Jacky 09211234567 Remarks: New contact has been added. Command> V Jacky Contact…
- Directions: Use a file city.txt for answering the questions that follow each scheduling algorithm. This file has three columns (comma separated): the first column contains the job Id, the second column indicates the CPU burst, and column three is the arrival time of the corresponding job. Parallel Programming It is vaccine season! COVID19 vaccines are out, and everyone is rushing to get one. Vaccines are available from six different brands and you have been entrusted to write a program to count the total number of vaccines of each brand administered across 21 cities in the state. Write a multithreaded program (in the file vaccines.cpp) that counts the number of vaccines in 21 different files of numbers. Each line in each of the files will contain either one of the following brand names: v1, v2, v3. Your program must count the number of units for each vaccine brand administered, across all 21 cities, and display the total number of units for each brand. The files are named "city1.txt",…Directions: Use a file city.txt for answering the questions that follow each scheduling algorithm. This file has three columns (comma separated): the first column contains the job Id, the second column indicates the CPU burst, and column three is the arrival time of the corresponding job. Parallel Programming It is vaccine season! COVID19 vaccines are out, and everyone is rushing to get one. Vaccines are available from six different brands and you have been entrusted to write a program to count the total number of vaccines of each brand administered across 21 cities in the state. Write a multithreaded program (in the file vaccines.cpp) that counts the number of vaccines in 21 different files of numbers. Each line in each of the files will contain either one of the following brand names: v1, v2, v3. Your program must count the number of units for each vaccine brand administered, across all 21 cities, and display the total number of units for each brand. The files are named…This question comes from the textbook:Starting out with Visual C# 5th Edition - Chapter 14 Programming Problem 2 Create an application that reads the contents of two text files and uses LINQ extension methods to perform the following: • It should display a list of all the unique words contained in both files.• It should display a list of the words that appear in both files.• It should display a list of the words that appear in the first file but not the second.• It should display a list of the words that appear in the second file but not the first.• It should display a list of the words that appear in either the first or second file but not both. Hint: Use set operations to perform these analyses. Also, see Chapter 8 for a discussion of string tokenizing.