Write a program that calculates the average rainfall for three months. The program should ask the user to enter the name of a data file that that contains rainfall data for three months. The file consists of three lines, each with the name of a month, followed by one or more spaces, followed by the rainfall for that month. The program opens the file, reads its contents and then displays a message like:

Answers

Answer 1

Answer:

Explanation:

The following Python program reads the file called text.txt and loops through each line, removing whitespace and seperating the month and rainfall. Then it prints each Month with its corresponding rainfall amount. Finally it calculates the average rainfall and outputs that.

file = open('text.txt', 'r')

total_rainfall = 0

for line in file:

   line = line.replace('\n', '')

   info = line.split(' ')

   info = [i for i in info if i != '']

   print(info[0] + " will have a total of " + info[1] + " inches of rainfall.")

   total_rainfall += int(info[1])

average = total_rainfall / 3

print("Average Rainfall will be " + str(average) + " inches")

Write A Program That Calculates The Average Rainfall For Three Months. The Program Should Ask The User

Related Questions

1) Create a method Sum to include a FOR loop. Get a scanner and input a number form the keyboard in main(). The method will take one parameter and calculate the sum up to that number. For example, if you pass 5, it it will calculate 1+2+3+4+5 and will return it back to main() method. Main method should call the method, get the sum back, and print a sum. You call the method from main() and get the result back to main() 2) Create another method: Factorial that calculates a Product of same numbers, that Sum does for summing them up. Make sure you use FOR loop in it. 3) Make a switch that Calls either sum(...) method OR factorial(...) method, depending on what user of the program wants. Ask the user to enter a selection, after the number is entered, such as "do sum" or "do factorial", read it with the Scanner next(), then call the appropriate method in a switch.

Answers

Answer:

Explanation:

The following Java code creates both methods using a for loop. Asks the user for the value and choice of method within the main() and uses a switch statement to call the correct method.

import java.util.Scanner;

class Brainly {

   static Scanner in = new Scanner(System.in);

   public static void main(String[] args) {

      System.out.println("Enter a value: ");

      int userValue = in.nextInt();

      System.out.println("Enter a Choice: \ns = do Sum\nf = do Factorial");

      String choice = in.next();

      switch (choice.charAt(0)) {

          case 's': System.out.println("Sum of up to this number is: " + sum(userValue));

              break;

          case 'f': System.out.println("Factorial of up to this number is: " + factorial(userValue));

              break;

          default: System.out.println("Unavailable Choice");

      }

   }

   public static int sum(int userValue) {

       int sum = 0;

       for (int x = 1; x <= userValue; x++) {

           sum += x;

       }

       return sum;

   }

   public static int factorial(int userValue) {

       int factorial = 1;

       for (int x = 1; x <= userValue; x++) {

           factorial *= x;

       }

       return factorial;

   }

}

Do the same exercise but this time use the value returning function. Here is the skeleton of the main function. Write functions definition according to the function call. Note: Do not change the main(). Copy it as it is. Must define the function after the main(). Make sure you write the function prototype before main(). // function prototype.

Answers

Answer:

The function prototypes are as follows:

int findSum(int fn, int sn, int tn);

int findMin(int fn, int sn, int tn);

int findMax(int fn, int sn, int tn);

The functions are as follows:

int findSum(int fn, int sn, int tn){

   return fn+sn+tn;}

int findMin(int fn, int sn, int tn){

   int min = fn;

   if(sn<=min && sn<=tn){

       min = sn;    }

   if(tn <= min && tn <= sn){

       min = tn;    }

   return min;}

int findMax(int fn, int sn, int tn){

   int max = fn;

   if(sn>=max && sn>=tn){

       max = sn;    }

   if(tn>=max && tn>=sn){

       max = tn;    }

   return max;}

Explanation:

Given

See attachment 1 for the main function

Required

Write the following functions

findSumfind MinfindMax.

The following represents the function prototypes

int findSum(int fn, int sn, int tn);

int findMin(int fn, int sn, int tn);

int findMax(int fn, int sn, int tn);

This declares the findSum function

int findSum(int fn, int sn, int tn){

This returns the sum of the three numbers

   return fn+sn+tn;}

This declares the findMin function

int findMin(int fn, int sn, int tn){

This initialzes min (i.e. minumum) to fn

   int min = fn;

This checks if sn is the minimum

   if(sn<=min && sn<=tn){

       min = sn;    }

This checks if tn is the minimum

   if(tn <= min && tn <= sn){

       min = tn;    }

This returns the minimum of the three numbers

   return min;}

This declares the findMax function

int findMax(int fn, int sn, int tn){

This initialzes max (i.e. maximum) to fn

   int max = fn;

This checks if sn is the maximum

   if(sn>=max && sn>=tn){

       max = sn;    }

This checks if tn is the maximum

   if(tn>=max && tn>=sn){

       max = tn;    }

This returns the maximum of the three numbers

   return max;}

See cpp attachment for complete program which includes the main

What are the important points
concerning critical thinking?
(Select all that apply.)
You must evaluate information.
You should use your feelings.
You need to practice the right skills
You need to be well-spoken
You can learn it quickly
You need to use logic and reason
You need to be unbiased and unemotional

Answers

Answer:

You must evaluate information

Explanation:

The first step to thinking critically is to accept information only after evaluating it. Whether it's something read or heard, critical thinkers strive to find the objective truth. In doing this, these employees evaluate by considering possible challenges and solutions. This process of vetting new information and considering outcomes is called evaluation.

You have been given an encrypted copy of the Final exam study guide here, but how do you decrypt and read it???

Along with the encrypted copy, some mysterious person has also given you the following documents:

helloworld.txt -- Maybe this file decrypts to say "Hello world!". Hmmm.

hints.txt -- Seems important.

In a file called pa11.py write a method called decode(inputfile,outputfile). Decode should take two parameters - both of which are strings. The first should be the name of an encoded file (either helloworld.txt or superdupertopsecretstudyguide.txt or yet another file that I might use to test your code). The second should be the name of a file that you will use as an output file. For example:

decode("superDuperTopSecretStudyGuide.txt" , "translatedguide.txt")

Your method should read in the contents of the inputfile and, using the scheme described in the hints.txt file above, decode the hidden message, writing to the outputfile as it goes (or all at once when it is done depending on what you decide to use).

Hint: The penny math lecture is here.

Another hint: Don't forget about while loops...

Mac hint: use encoding="utf-8" in your file open functions, like this:

Mac hint: use encoding="ascii" in your file open functions, like this:

fin = open(input_file,"r",encoding="ascii")

Answers

Answer:

You use a decoder

Explanation:

You can find one on an internet browser

//Precondition: pLeft is the address of a MY_STRING handle // containing a valid MY_STRING object address OR NULL. // The value of Right must be the handle of a valid MY_STRING object //Postcondition: On Success pLeft will contain the address of a handle // to a valid MY_STRING object that is a deep copy of the object indicated // by Right. If the value of the handle at the address indicated by // pLeft is originally NULL then the function will attempt to initialize // a new object that is a deep copy of the object indicated by Right, // otherwise the object indicated by the handle at the address pLeft will // attempt to resize to hold the data in Right. On failure pLeft will be // left as NULL and any memory that may have been used by a potential // object indicated by pLeft will be returned to the freestore. void my_string_assignment(Item* pLeft, Item Right);

Answers

Answer:this is an answer i dont know :

Explanation:

Sheeeeeesssssssshhhhhhhhhhhh

2. A rectangular water tank is being filled at the
constant rate of 10lt/s. The base of the tank has
width, w= 10m and length, 1 = 15m. If the volume
of the tank is given by V = wxlxh where h repre-
sents the height of the tank, what is the rate of
change of the height of water in the tank?.​

Answers

Answer:

Explanation:

1 [tex]meter^{3}[/tex] = 1000 liters

150 meter base

150 * 1000 = 150,000 liters to go up one meter

150,000 / 10 liters per second = 15,000 seconds to go up one meter

or

6 [tex]\frac{2}{3}[/tex] * [tex]10^{-7}[/tex] meters  [tex]sec^{-1}[/tex]   :/   not too much huh

What vieo editor is best for beginner? I have heard that TunesKit Acemovi and Adobe Premier is good, but i'm not sure wich one is better for me.I just use the video editor to organize my photo and vlog snippets. Can you tell me more about them? Thanks.

Answers

Answer:

Depends on what system you are on. I think Apple has a lot of decent free editing software for their devices, but on windows you are limited to windows movie maker... or paying for adobe or Sony Vegas (if people still use that...). Don't know anything about TunesKit Acemovi.

What is the size of type int on 64 bit system

(1/1 Point)


4 byte


8 byte


16 byte


None of the given

Answers

The answer is none of the given

Do my Twitter posts count as opinions or facts?

Answers

They count as opinions

Write a superclass encapsulating a rectangle. A rectangle has two attributes representing the width and the height of the rectangle. It has methods returning the perimeter and the area of the rectangle. This class has a subclass, encapsulating a parallelepiped, or box. A parallelepiped has a rectangle as its base, and another attribute, its length; it has two methods that calculate and return its area and volume. You also need to include a client class to test these two classes.

Answers

That’s how you do it times the box and the rectangle to have a parallelepiped

Which symbol is used for an assignment statement in a flowchart?

Answers

Equal symbol

equal symbol

Within most programming languages the symbol used for assignment is the equal symbol.

With the aid of a diagram,explain CDMA spread spectrum

Answers

Answer: This is when the input- source coding- modulation

output- source decoding- channel- demodulation

Explanation:

Given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a VendingMachine object that performs the following operations:

Purchases input number of drinks Restocks input number of bottles.
Reports inventory Review the definition of "VendingMachine.cpp" by clicking on the orange arrow.
A VendingMachine's initial inventory is 20 drinks.

Ex: If the input is: 5 2
the output is: Inventory: 17 bottles

Answers

Answer:

In C++:

#include <iostream>

using namespace std;

class VendingMachine {

 public:

   int initial = 20;};

int main() {

 VendingMachine myMachine;

   int purchase, restock;

   cout<<"Purchase: ";  cin>>purchase;

   cout<<"Restock: ";  cin>>restock;

   myMachine.initial-=(purchase-restock);

   cout << "Inventory: "<<myMachine.initial<<" bottles";  

   return 0;}

Explanation:

This question is incomplete, as the original source file is not given; so, I write another from scratch.

This creates the VendingMachine class

class VendingMachine {

This represents the access specifier

 public:

This initializes the inventory to 20

   int initial = 20;};

The main begins here

int main() {

This creates the object of the VendingMachine class

 VendingMachine myMachine;

This declares the purchase and the restock

   int purchase, restock;

This gets input for purchase

   cout<<"Purchase: ";  cin>>purchase;

This gets input for restock

   cout<<"Restock: ";  cin>>restock;

This calculates the new inventory

   myMachine.initial-=(purchase-restock);

This prints the new inventory

   cout << "Inventory: "<<myMachine.initial<<" bottles";  

   return 0;}

Use the drop-down tool to select the word or phrase that completes each sentence.

The manipulation of data files on a computer using a file browser is
.

A
is a computer program that allows a user to manipulate files.

A
is anything that puts computer information at risk.

Errors, flaws, mistakes, failures, or problems in a software program are called
.

Software programs that can spread from one computer to another are called
.

Answers

Answer:

file management file manager security threat bugs virus

Explanation:

Which of the following statements is true?

Group of answer choices

A.Only products made from plastic damage the environment

B.Products mostly of metal do the most damage to the environment

C.All products have some effect on the environment

D.Reducing the enciroment impact of products can be both dangerous and frustrating for users

Answers

Answer:

It due to the dirt subsatnces that get wired polluted and the chloroflurocarbons that destroy the ozone layer

Explanation:

Multiple security concerns regarding biotechnology and animal research, or
pathogens and toxins are applicable to which two areas of specialized security?

Answers

Answer:

Pathogens are ubiquitous, found in hospital and research laboratories, scientific culture collections, infected people and animals, and the environment. The skills and equipment applied to solving challenges in medicine, ...

Research Centre for Emerging Pathogens with High Infectious Risk, Pasteur Institute. Côte d'Ivoire . ... independent laboratories areas and two animal suites, in addition to 20 BSL-2 and two BSL-3 laboratories.

What does running the “sudo” command do?
Restarts the computer
Saves files permanently to the desktop
Elevates rights to what you can access
Opens a different directory

Answers

Answer:

Elevates rights to what you can access

How to do a row of circles on python , with the commands , picture is with it .

Answers

Answer:

o.o

Explanation:

In the formula =C5*$B$3, C5 is what type of cell reference?

relative
absolute
mixed
obscure

Answers

Answer:

relative

Explanation:

i just got a 100 and it says its right on odsyware

In which link-building opportunity are you directly competing with another website in a ""win-win"" situation

Answers

Answer:

I'm kind of sorta am now with aboutblank.com but it doesn't matter now

Explanation:

is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?

Answers

Answer:

An algorithm is defined as a well-defined sequence of steps that provides a solution for a given problem, whereas a pseudocode is one of the methods that can be used to represent an algorithm.

hope this gives you at least an idea of the answer:)

Hi guys, I am in need of help. I have an HTML assignment due today at 11:59 PM and I have to work with video and animation. I am having trouble with working on keyframes because when I run my program, my video remains the same size. I do not know what I am doing wrong. I have attached a picture of my code. Please help me ASAP.

Answers

Answer:

Nothing much is wrong

Explanation:

Nothing much is wrong with it but then again I'm a full on computer geek, I assume you need to go back and re-read it and edit whatever you feel is wrong or incorrect it's like a gut feeling and you will have doubts on certain parts of what you are doing

Write a loop to print 56 to 70 inclusive (this means it should include both the 56 and 70). The output should all be written out on the same line.

Sample Run
56 57 58 59 60 61 62 63 64 65 66 67 68 69 70

Answers

for i in range(56,71):
print(i, end = “ “)

Write a class called MonetaryCoin that is derived from the Coin class presented in Chapter 5 (the source code for Chapter 5 examples is available via Moodle). [6 pts] Store one integer and one float in the MonetaryCoin that represent its value and weight in grams, respectively. Add a third variable of your choice (related to a coin, of course) and use self-descriptive variable names for all three variables. Pass the values to the constructor in MonetaryCoin and save them to your variables.

Answers

Answer:

Explanation:

The following Java code creates the MonetaryCoin class that extends the Coin class. It then creates three variables representing the MonetaryCoin object which are its value, weight, and coinYear. These are all passed as arguments to the constructor and saved as instance variables.

public class MonetaryCoin extends Coin {

   

   int value;

   float weight;

   int coinYear;

   

   public void MonetaryCoin(int value, float weight, int coinYear) {

       this.value = value;

       this.weight = weight;

       this.coinYear = coinYear;

   }

}

When identifying who will send a presentation, what are the two types of audiences?

Answers

Answer:

Explanation:Demographic audience analysis focuses on group memberships of audience members. Another element of audience is psychographic information, which focuses on audience attitudes, beliefs, and values. Situational analysis of the occasion, physical setting, and other factors are also critical to effective audience analysis.

What does the CPU do in a modern computing device?

Enables the user to encrypt data
Enables the user to store data
Performs data computation
Provides electricity

Answers

Answer:  it connects to the power supply to run the pc

Explanation: your welcome

Where is the start frame delimiter found in the Ethernet frame

Answers

The start frame delimiter found in the Ethernet frame is A preamble and begin body delimiter are a part of the packet on the bodily layer. The first  fields of every body are locations and supply addresses.

What is the cause of the body delimiter?

Frame delimiting, Addressing, and Error detection. Frame delimiting: The framing procedure affords essential delimiters which might be used to pick out a set of bits that make up a body. This procedure affords synchronization among the transmitting and receiving nodes.

The Preamble (7 bytes) and Start Frame Delimiter (SFD), additionally referred to as the Start of Frame (1 byte), fields are used for synchronization among the sending and receiving devices. These first 8 bytes of the body are used to get the eye of the receiving nodes.

Read more about the Ethernet :

https://brainly.com/question/1637942

#SPJ1

Write a short note on the topic ,' My Brother'.​

Answers

Answer:

I have an older brother whose name is Michael.

He is two years older than me and studies in Class 3.

My brother has a round face with black hair and brown eyes.

He is very caring, loving and outgoing by nature.

He takes care of me, whenever my parents are not at home.

He shares his toys with me, whenever we are playing indoors.

My brother is a well-mannered boy who is loved by everyone.

He is very good in his studies and helps me in my studies too.

He is very sincere and intelligent and never misses his school.

I love my brother and always pray to God to help us maintain a strong bond forever.

Explanation:

Answer:

Explanation:

To begin with, a brother is an important member of the family because he loves his siblings like a father, cares like a mother and sometimes annoys his sister(s). Sibling relationships usually tend to be emotionally powerful. Therefore, building a strong brother-sister relationship is important not only in childhood, but for the entire lifetime. Siblings learn social skills from each other like negotiating power and managing conflicts among themselves.

First, open two separate terminal connections to the same machine, so that you can easily run something in one window and the other. Now, in one window, run vmstat 1, which shows statistics about machine usage every second. Read the man page, the associated README, and any other information you need so that you can understand its output. Leave this window running vmstat for the rest of the exercises below. Now, we will run the program mem.c but with very little memory usage. This can be accomplished by typing ./mem 1 (which uses only 1 MB of memory). How do the CPU usage statistics change when running mem

Answers

dnt listen to da file shi

In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normalization rules: 1NF, 2NF and 3NF to enhance your database design. Lab Steps: Read about the Normal Forms in your textbook, chapter 14, pages 474 to 483. Check the learning materials on Normal Forms under the Learning Materials folder of Week 5. Apply the Normalization rules to your database design. Describe in words how 1NF, 2NF and 3NF apply to your design/database schema. Apply all the modifications that you made due to applying NF rules to your actual database in the DBMS (MS SQL Server). Put your explanation for how 1NF, 2NF and 3NF apply to your database in a Word document OR PowerPoint presentation.

Answers

Answer:

I don't know

Explanation:

is about knowing how to make use of the refinery

Other Questions
Rose made 56 phone calls in 3 months. In the first month she made 24 calls, and in the second month she made 13 calls. How many calls did she make in the third month? What are the sources and types of the principal agent problem? Can someone please help me Find 25% of a pair of AirForce1's that cost $100. Solve for variable.3k = 36 QUICK!!! Ill mark brainliest! Why did the U.S. bomb Iraq and Saddam Hussein in 1998?He attacked his neighbor, Kuwait, without reason.He refused to comply with U.N. weapons inspectors.Iraq was planning to start another conflict with Iran.Iraq was home to several international terrorist groups. Which of the coordinate points below will fall on the line with the consent of the personality is 1/4 select all that apply why is nepal more vulenerable to earthquakes La noche de la fiesta habaque iluminaban el cielo.1fuegos artificialeslatkesdesfiles A, an, and the are signal words. True False imagine that jesus is standing before you what kind of help will you ask him to give you and why anyone who knows german?? help asap (3,4,5a) Ergo industries, which manufactures automotive parts, had taken carious measures to improve the quality of the products. The product-line mangers at the company had the authority to stop production if they found the components to be defective without the approval of the senior management in the company and to take measures to resolve the issue. This authority motivated the mangers to perform their jobs better. According to hackman and oldham work design model, which of the following core job characteristics is influencing the performance of managers in the above scenario?a. Skill varietyb. Autonomyc. Task identityd. Task significance Which sentence is written correctly? A. Maria wanted so much to make sure that everyone was having a great time. B. Maria wanting so much to make sure that everyone was having a great time. C. Maria had want so much to make sure that everyone was having a great time. D. Maria want so much to make sure that everyone was having a great time. Grass it is a _______. Gerardo works at an ice cream shop each flavor of ice cream is stored in a right cylindrical tub that measures approximately 9 inches high with a radius of 5 inches Gerardo uses an ice cream scoop that makes spherical scoops of ice cream with a diameter of 2.5 inches If gerardo opens a new tub of chocolate ice cream and scoops 37 scoops of chocolate ice cream about how much chocolate ice cream in cubic inches is left in the tub plz help me 14 points A soft currency is a currency that is easy to exchange for another currency.O True0 False Please help :) Giving brainliest. If you take away a law, what have you done to it?