1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
14

(PYTHON) Write a program that uses this technique to read a CSV file such as the one given above. Display the IDs and names of t

he students with the highest and lowest scores.

Computers and Technology
1 answer:
Ludmilka [50]3 years ago
7 0

Answer:

import csv

with open('employee_birthday.txt') as csv_file:

csv_reader = csv.reader(csv_file, delimiter=',')

line_count = 0

for row in csv_reader:

if line_count == 0:

print(f'Column names are {", ".join(row)}')

line_count += 1

else:

print(f'\t{row[0]} works in the {row[1]} department, and was born in {row[2]}.')

line_count += 1

print(f'Processed {line_count} lines.')

Explanation:

Heres an example of how to read csvs

You might be interested in
The Internet has been around for quite a while, but it did not have much impact on our everyday lives until the appearance of th
pishuonlain [190]

Answer:

The answer is "WWW".

Explanation:

WWW stands for World Wide Web, It is a combination of all Internet resources and users, that uses the hypertext transfer protocol. It provides world information that is available on the internet that is the expression of human knowledge. It is also known as a domain name that introduces resources or individual instances of the entire collection.

6 0
3 years ago
Ou have an application running on Oracle Cloud Infrastructure. You identified that the read and write operations are slowing you
Otrada [13]

Answer:

Options A and C.

Explanation:

In Oracle Cloud Infrastructure the two options which allows you to increase disk performance are;

1. Terminate the compute instance preserving the boot volume. Create a new compute instance using a VM Dense IO shape using the boot volume preserved.

2. Create a backup of the boot volume. Create a new compute instance a VM Dense IO shape and restore the backup.

3 0
3 years ago
Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab repo
Neko [114]
The third one probably
5 0
4 years ago
Type of malware that is spread when you distribute
vladimir1956 [14]
Trojans, normal viruses, etc. Anything can and could hop on to the files you send depending on the websites and if you don't have a firewall.
3 0
4 years ago
In ________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instr
xxMikexx [17]
The answer is:  "drive-by hacking" .
____________________________________________
 
      "In<span> <u> drive-by hacking </u></span>, <span>an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network."
_______________________________________________________________</span>
5 0
3 years ago
Other questions:
  • The function below takes a single string parameter: sentence. Complete the function to return everything but the middle 10 chara
    15·1 answer
  • How to use translate on a website?
    15·1 answer
  • The variable grade can have any real number value from 0 to 100. Ask the user to enter a grade in numerical form. Write an if-el
    9·1 answer
  • Assume that speed = 10 and miles = 5. What is the value of each of the
    9·1 answer
  • Nikolas has a idea that he could use the compressed carbon dioxide in a fire extinguisher to propel him on his skateboard. Nikol
    13·2 answers
  • What kind of software is Microsoft Outlook??
    15·2 answers
  • Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post t
    15·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label? TODAY UPPER PROPER LOWER
    11·1 answer
  • What is 11x12x12x14x15x16
    7·1 answer
  • charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!