Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Bartleby Related Questions Icon
Related questions
Question
Transcribed Image Text:LAB ASSIGNMENTS, CONT.
2) Write a program called data_collection.py
to accept input from the user and create
a .csv file that holds the name, email, and
phone number for each contact.
COMMAND MENU
view - View contact file
add - Add contact to the file
exit - Exit program
Command: view
Name
Email
Phone
The add function collects data for one person
at a time in this format: name,email,phone.
Then it writes the data to a .csv file
Command: add
Enter a contact in this format: name,email,phone: Mickey Mouse,mmouse@gmail.com,123-456-7890
Command: add
Enter a contact in this format: name,email,phone: Donald Duck,dduck@gmail.com,456-789-0123
08
Command: add
Enter a contact in this format: name,email,phone: Road Runner,rrunner@gmail.com,789-012-3456
The view function reads from the .csv file
and displays the data in columns, with
appropriate headings.
Command: view
Name
Email
Phone
Mickey Mouse
mmouse@gmail.com
123-456-7890
Donald Duck
dduck@gmail.com
rrunner@gmail.com
456-789-0123
Road Runner
789-012-3456
NOTE: you don't have to upload your .csv file,
since it can be re-created when running.
The program creates a .csv file. The add function allows you to
add to it, and the view function reads from it – in columns
3
Expert Solution
Check MarkThis question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
bartleby
This is a popular solution
bartleby
Trending nowThis is a popular solution!
bartleby
Step by stepSolved in 3 steps with 3 images
Knowledge Booster
Background pattern image
Similar questions
- Code in C language. Please provide code for 3 different files. One header file and two .C files. I need the code for each file. Please provide photos of the output and source code for each file (3). Please follow All instructions in the photo provided. Use the provided input.txt file provided below. A1, A2 20294 Lorenzana Dr Woodland Hills, CA 91364 B1, B2 19831 Henshaw St Culver City, CA 94023 C1, C2 5142 Dumont Pl Azusa, CA 91112 D1, D2 20636 De Forest St Woodland Hills, CA 91364 A1, A2 20294 Lorenzana Dr Woodland Hills, CA 91364 E1, E2 4851 Poe Ave Woodland Hills, CA 91364 F1, F2 20225 Lorenzana Dr Los Angeles, CA 91111 G1, G2 20253 Lorenzana Dr Los Angeles, CA 90005 H1, H2 5241 Del Moreno Dr Los Angeles, CA 91110 I1, I2 5332 Felice Pl Stevenson Ranch, CA 94135 J1, J2 5135 Quakertown Ave Thousand Oaks, CA 91362 K1, K2 720 Eucalyptus Ave 105 Inglewood, CA 89030 L1, L2 5021 Dumont Pl Woodland Hills, CA 91364 M1, M2 4819 Quedo Pl Westlake Village, CA 91362 I1, I2 5332 Felice Pl...arrow_forwardWhen we use NUL> to create a file (e.g. NUL > file1.txt), there is no data (value) in the file1.txt file after creation. Group of answer choices True Falsearrow_forwardFile Edit View Sign Window Help ECS401U_210571675.pdf ECS401U_210571... x 16 / 29 125% 罗ア白 ,班 a) Compare and contrast in your own words the way reading from a file using a File Reader is done in Java with keyboard input using a scanner illustrating your answer using the following example code fragments. Note you are not being asked to explain line by line what the code does but use it to help explain the points made in your answer. public static void keyboardInput () } new Scanner(System.in); Scanner scanner String s; System.out.println("Please input the data"); s = scanner.nextLine(); System.out.println(s ); return; { public static void fileRead () throws IOException BufferedReader inputStream new BufferedReader (new FileReader("data.csv")); inputStream.readLine(); String s = System.out.println(s); inputStream.close(); return; {arrow_forward
- A student wants to write into a file called myfile, without deleting its existing content. Which one of the following functions should he or she use? f = open('myfile', 'r') f = open('myfile', 'w+b') f = open('myfile', '+') f = open('myfile', 'a')arrow_forward8-15. Printing Models: Put the functions for the example printing_models.py in a separate file called printing_functions.py. Write an import statement at the top of printing_models.py, and modify the file to use the imported functions.arrow_forwardA bucket list is a collection of goals, dreams, and aspirations that you would like to accomplish within your lifetime. The purpose of this assignment is to develop a program that allows the user to manage their personal bucket list and save it to an XML file bucketlist.xml. For full credit, run the program and create a file with at least three entry elements. Submit a document containing a copy of the source file, a screenshot of the program in action, and the contents of the XML file. File Structure Below is the basic structure (i.e. schema) for the XML file. You may add additional elements. <bucketList> <entry> <rank></rank> <description></description> <status></status> </entry> </bucketList> Note: Before running the program, manually create an XML input file with at least one entry element that contains values in each child element. GUI Requirements At a minimum, your GUI must meet the below requirements. No minimize...arrow_forward
- The given text files represent a list of account numbers and associated balances. Balances change over time. If a balance is later in the file, then this implies the balance for that customer is more recent. Ask the user for a file name then display the most recent balance along with the high and low balance. balances-0.txt customer id balance1 93ドル.831 805ドル.242 866ドル.454 943ドル.283 764ドル.121 798ドル.004 395ドル.595 644ドル.264 18ドル.314 814ドル.97arrow_forwardThe header record of a batch file contains totals of items in the file. Each time the file is processed, the totals are also updated. Nightly, after the batch processes, the relevant data fields are summed and compared with the totals. Unbalanced conditions are reported and corrected. This example describes: a) Segregation of duties b) Application output control c) Application edit check d) Applicaiton input controlarrow_forwardCodearrow_forward
- Requirements: You are to ask the user: 1) For the name of the input file (CTIM375-Input.dat; a downloadable file), 2) Read the file into an array, 3) Sort the array in ascending order using the name field, 4) Add a field at the end of the records that will contain the average of all the amount fields within the record, and 5) Produce a comma-separated value (.CSV) file called "CTIM375-Output.csv".arrow_forwardCreate a datafile that contains the first name, last name, gender, age, height, smoking preference, eye color and phone number. Add a variety of records to the file. A sample file looks like:  Write a program that opens the file and reads the records one by one. The program will skip any records where the gender preference is not a match. Of those records that match the gender preference, check to see if the age and height are between the maximum and minum preferences. Then check to see if the smoking preference and eye color are also a match. If at least 3 of the remaining fields match, consider the record a partial match, and print it in the report. If all 4 of the remaining fields match, the record is a perfect match and print it in the report with an asterisk next to it. At the end of the program, close the file and report how many total records there were of the specified gender, how many were a partial match, and how many were a perfect match.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Text book imageComputer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONText book imageComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceText book imageNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Text book imageConcepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningText book imagePrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationText book imageSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY