1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
11

Create a Python program that:

Computers and Technology
1 answer:
Charra [1.4K]3 years ago
4 0

Answer:

```

file = open("trips.txt","r")

file = file.split("\n")

trip_date = []

fuel_used = []

miles_traveled = []

for i in file:

   trip_date.append(i.split(", ")[0])

for i in file:

   fuel_used.append(i.split(", ")[1])

for i in file:

   miles_traveled.append(i.split(", ")[2])

```

This should put the data in their own lists (i didn't test it) but im not going to solve everything for you. The rest is for you to tinker with. You shouldn't throw your question at us and expect an answer. This is the most that I will give you.

Explanation:

You might be interested in
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?A)
Over [174]

Answer:

C) Social media

Explanation:

Social media is a vital marketing tool in the modern era. Aside from posting photos or status updates, using social media for customer service can elevate your business to the next level. Social media has strong potential to better address customer service issues. And if you address and resolve customer concerns over social media in short enough time, the exchange can help you create a loyal customer base.

8 0
3 years ago
Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could a
Alexxx [7]

Answer:

False

Explanation:

Namedroppers help you look for domain names that are constantly updated on a daily basis. You can purchase a domain name of your choice from the results of the available domain names that are populated by namedropper. The description from the question above belongs to web application vulnerability scanners. These scanners are automated to scan web apps and look for vulnerabilities that most attackers take advantage of like SQL injection and buffer overflows.

8 0
4 years ago
Please help me with this please and explain thanks
Luden [163]

Answer:

I think the first one us to create a link to a website

4 0
3 years ago
A computer uses a memory unit with 256k words of 32 bits each. A bina.ry
iogann1982 [59]

Answer:

Touch and hold a clip to pin it. Unpinned clips will be deleted after 1 hour.

4 0
3 years ago
Jame
Sophie [7]

Answer:

Did you just copy this from a texbook?

Explanation:

7 0
3 years ago
Other questions:
  • What Coding program does UNITY use?
    6·1 answer
  • Henry Ford would have been most interested to bring which modern innovation to his automotive factories?
    5·2 answers
  • Draw the gates required to build a half adder.
    12·1 answer
  • In what way is your social media footprint related to your digital ID
    12·1 answer
  • if you love games played on facebook, such as farmville, what might be your motivation for playing games
    13·1 answer
  • A sequence of repetitive operations performed to evaluate the ability of a PC to operate at peak efficiency for a defined time p
    15·1 answer
  • The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
    14·1 answer
  • Which of the following algorithms is the same as the flowchart shown below?
    9·1 answer
  • In Python write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs
    9·1 answer
  • Can computers be opened from the All programs submenu
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!