1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
4 years ago
7

The Springfork Amateur Golf Club has a tournament every weekend. The club president

Computers and Technology
1 answer:
Lera25 [3.4K]4 years ago
6 0

Answer:

The Python code is given below for each question.

Explanation:

1:

 if __name__ == '__main__':

   f = open('golf.txt', 'w')

   n = int(input("Enter number of players:"))

   for i in range(n):

       name = input("Enter name of player number " + str(i + 1) + ":")

       score = int(input("Enter score of player number " + str(i + 1) + ":"))

       f.write(name + "\n" + str(score) + "\n")

   f.close()

2:

try:

   with open('golf.txt') as r:

       lines = r.readlines()

       for i in range(0, len(lines), 2):

           print("Name:", lines[i].strip())

           print("Score:", lines[i+1].strip())

           print()

except FileNotFoundError:

   print("golf.txt is not found!")

You might be interested in
What should be a technicians first step in an A/C system
irina [24]

Perform a visual inspection

3 0
3 years ago
In its entirety, the CCM process reduces the risk that ANY modifications made to a system result in a compromise to system or da
Tom [10]

Answer: True

Explanation: CCM process is the process which basically watches over any change or modification that is being made in the data and it will only be implemented when there is no adverse effect of the change.It procedure helps in reducing the risk due to any modification made in data of a system. CCM process also take care of the confidentiality of data and integrity as well and helps inn maintaining it.Therefore the given statement is true.

8 0
3 years ago
Which of the following is an advantage to using internal databases for​ information? A. Internal information is accurate and com
Irina-Kira [14]

Answer:

C. They can be accessed quickly and cheaply.

Explanation:

An internal database is information that can be obtained inside the company through internal networks. This information can be easy to get as it is in the network of the company and you have access to it and it also have a low cost as you don't have pay money to get it. According to this, the answer is that an advantage to using internal databases for​ information is that they can be accessed quickly and cheaply.

The other options are not right because internal information can be  outdated and incomplete if it is not updated by people in the company and it can be found in different forms and it is not always easy to manage as this depends on the applications used and how the company decides to visualize it.

3 0
3 years ago
Which of the following statements is not true about the TCP opening and closing of connections?
lubasha [3.4K]

Answer:  c.)

Explanation:

The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.

It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".

The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.

If one process set the FIN bit to "1", this means that it has no more data to send.

3 0
4 years ago
Explain how rotary dialing sends digits to the switch.
kozerog [31]

A rotary dial telephone was a popular type of phone design throughout the 20th century. ... This causes the dial to return to its starting position due to an internal recoil spring, while simultaneously generating a series of electrical pulses that interrupt the flow of current on the telephone's line.
7 0
3 years ago
Other questions:
  • ____________ are used to store all the data in a database
    6·2 answers
  • You have no control over who views your social network information
    13·2 answers
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • Which is the best practice for placing graphics on a slide?
    6·2 answers
  • 1. Provide at least two statements that explain the relationship between the position of the Earth and the seasons.
    15·1 answer
  • Wireshark is an example of what type of utility? A) Packet sniffer B) Port scanner C) Vulnerability scanner D) Content filter
    11·1 answer
  • How does the Evaluate Formula dialog box help fix errors?
    9·2 answers
  • Take points for free who are new and enjoye them
    9·2 answers
  • Who is considered as the father of computer science?​
    11·1 answer
  • To stored three characters a computer occupies. Bytes memory space
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!