1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
5

Boardman College maintains two files—one for Sociology majors and another for Anthropology majors. Each file contains students'

ID numbers, last names, first names, and grade point averages. Each file is in student ID number order. The college is merging the two departments into a Department of Sociology and Anthropology. Design the logic for a program that merges the two files into one file containing a list of all students, maintaining ID number order.
Computers and Technology
1 answer:
gregori [183]3 years ago
4 0

Answer:

Explanation:

#say the two files are converted to lists

Sociology major and Anthropology major

#Create new list

SociologyandAnthropology=[]

#loop through sociology list

for x in Sociology major:

     a=[]

     for y in Anthropology major:

        for i in range (0,no.of items,1):

              if x[i] == y[i]:

                    a.append(x[i])

              else:

                   a.append(x[i])

                   a.append(y[i])

SociologyandAnthropology.append(a)

#sort using ID number

z=ID number index

SociologyandAnthropology=sorted(SociologyandAnthropology,key=lambda x:x[z]).

You might be interested in
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Which best describes a computer bug?
yanalaym [24]

Answer:

a piece of computer software containing defects that prevent a program from running properly

Explanation:

i got a 100% on the test

6 0
3 years ago
The term ____ refers to a series of storage devices, such as tapes, hard drives, and cds, that are networked together to provide
Setler [38]

Answer:

SAN

Please Mark Brainliest If This Helped!

5 0
2 years ago
Using emails for time-sensitive messages is an example of:
blagie [28]

Answer:time-sensitive email

5 0
3 years ago
Danelle wants to use a stylus on her laptop but does not have a touch screen. She needs the stylus to help her create designs fo
yarga [219]

Answer:

Correct option is

A. She can add a digitizer over the screen on her laptop

Explanation:

A digitizer is a hardware that receives analogue signal and converts is to digital signal.To use stylus on a normal laptop when can attach a digitizer to the laptop.These digitizer comes in form of Tablet (Graphics Tablet)

Graphics tablet is an external tablet like slate with a dedicated stylus for hand drawn designing and arts. Use of stylus gives more command over design features.It can read any kind of hand written data and transfer to PC.

5 0
3 years ago
Other questions:
  • What is the internet?
    5·2 answers
  • Which best describes what online reading tools aim to help readers do? *100 POINTS*
    9·2 answers
  • Presently we can solve problem instances of size 30 in 1 minute using algorithm A, which is a algorithm. On the other hand, we w
    8·1 answer
  • Which iteration must have an expression that has a true or false value?
    11·2 answers
  • Select the images that are isometric drawings
    11·1 answer
  • ¿Es aquel panel que controla la estructura de la tabla dinámica?
    14·2 answers
  • what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers
    11·1 answer
  • Read the attached paper titled A Survey of Coarse-Grained Reconfigurable Architecture and comment on it. Make sure to specifical
    5·1 answer
  • Areas on which the development of the computer as a communication technology is based
    5·1 answer
  • What is syllabus of diploma in computer after class 10​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!