1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
7

Now that you have your file holding your data, you need to analyze the data in three different ways that answer questions you po

se. How you analyze is up to you, since what you analyze depends on what kind of data you have. As an example, with this data file, you can look for weather trends. You could find the average temperature of each decade, find the decade with the lowest average temperature, and the decade with the highest average temperature. It is a shame that the data table does not go back further. The Krakatoa volcano in Indonesia had a major eruption in 1816. It had such an epic effect on the climate that 1813 was known as the year without a summer.
You need your data file saved in the same folder as your program.

Open your data file with Notepad or Wordpad.
Open a new file in Python.
Copy and paste the contents from Notepad to the Python file.
Save the Python file with a .txt extension in the same folder where you save your program.
Analyzing Your Data
Your program will read your data file, perform the analysis, and write the results to a separate file with a .txt extension.

Write a pseudocode plan for your program. Show your plan to a partner. Ask the partner for any suggestions to improve your plan.

When done, show your results to a partner. Ask your partner what parts they found interesting.

Your Word Document Requirements
Part 1: Name: your name

Part 2: Data Source: the source of your data (do not copy and paste your data into the Word document)

Part 3: Questions to Answer: the questions your analysis will answer

Part 4: The Plan: the pseudocode outline of your program

Part 5: Plan Feedback from Your Partner: suggestions from your partner

Part 5: Results: copy and pasted results from your data file

Part 6: Interpretation: your interpretation of the results

Part 7: Final Feedback from Your Partner: description of what your partner found interesting

You can use this rubric

to evaluate your project before you submit it.

What to Submit
You will submit each of the following.

A Word document: Organize it as shown below.
Your data file: Saved with a .txt extension
Your program: Saved with a .txt extension since you cannot upload a .py file.
Your results file: Saved with a .txt extension.

Question # 2
File Upload
You will submit four files.

A Word document: Organize it as described.
Your data file: Saved with a .txt extension
Your program: Saved with a .txt extension since you cannot upload a .py file
Your results file: Saved with a .txt extension

PLZ WILL GIVE 100 POINTS AND BRAINLIEST
Computers and Technology
1 answer:
Alex787 [66]3 years ago
3 0

Answer:

Photosynthesis is a process used by plants and other organisms to convert light energy into chemical energy that, through cellular respiration, can later be released to fuel the organism's metabolic activities

Explanation:

You might be interested in
good information is characterized by certain properties. List and explain these characteristics of good information​
Gelneren [198K]

Answer:

here is your ans

Explanation:

Characteristics of good quality information can be defined as an acronym ACCURATE. These characteristics are interrelated; focus on one automatically leads to focus on other.

Accurate

Information should be fair and free from bias. It should not have any arithmetical and grammatical errors. Information comes directly or in written form likely to be more reliable than it comes from indirectly (from hands to hands) or verbally which can be later retracted.

Complete

Accuracy of information is just not enough. It should also be complete which means facts and figures should not be missing or concealed. Telling the truth but not wholly is of no use.

Cost-beneficial

Information should be analysed for its benefits against the cost of obtaining it. It business context, it is not worthwhile to spend money on information that even cannot recover its costs leading to loss each time that information is obtained. In other contexts, such as hospitals it would be useful to get information even it has no financial benefits due to the nature of the business and expectations of society from it.

User-targeted

Information should be communicated in the style, format, detail and complexity which address the needs of users of the information. Example senior managers need brief reports which enable them to understand the position and performance of the business at a glance, while operational managers need detailed information which enable them to make day to day decisions.

Relevant

Information should be communicated to the right person. It means person which has some control over decisions expected to come out from obtaining the information.

Authoritative

Information should come from reliable source. It depends on qualifications and experience and past performance of the person communicating the information.

Timely

Information should be communicated in time so that receiver of the information has enough time to decide appropriate actions based on the information received. Information which communicates details of the past events earlier in time is of less importance than recently issued information like newspapers. What is timely information depends on situation to situation. Selection of appropriate channel of communication is key skill to achieve.

Easy to Use

Information should be understandable to the users. Style, sentence structure and jargons should be used keeping the receiver in mind. If report is targeted to new-comer in the field, then it should explain technical jargons used in the report.

4 0
3 years ago
Data is physically transmitted from one computer or terminal to another in the ________ layer. physical transport application te
omeli [17]

Answer:

The correct answer to the following question will be "Physical".

Explanation:

  • The lowest layer of the OSI model is the physical layer. It's in charge of transferring bits through one device to the next.
  • This layer isn't worried about the importance of the components and deals with setting up a connection to the node of the network and transmitting and receiving a signal.

Therefore, the Physical layer is the right answer.

7 0
4 years ago
Jeff was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key shoul
Lisa [10]

Answer:

Jeff is describing confusion

Explanation:

In 1945, Claude Shannon gave a classified report on: "Mathematical Theory of Cryptography" where he stated that confusion and diffusion are two properties of the operation of a secure cipher which are very essential in cryptanalysis.

When each bit of the ciphertext depends on several parts of the key, secluding the connections between the ciphertext and the key, it is known as confusion.

Hence, Jeff saying that the key should not relate in a simple way to the cipher text describes confusion.

7 0
4 years ago
Design and implement a program (name it GradeReport) that uses a switch statement to print out a message that reflect the studen
Korolek [52]

Answer:

#include <iostream>

using namespace std;

int main()

{

   int grade;

   

   cout << "Enter student's grade: ";

   cin >> grade;

   

   switch (grade)  

       {

       case 100 ... 1000:

           cout << "That grade is a perfect score. Well done.";

           break;

       case 90 ... 99:

           cout << "That grade is well above average. Excellent work.";  

           break;

       case 80 ... 89:

           cout << "That grade is above average. Nice job.";  

           break;

       case 70 ... 79:

           cout << "That grade is average work.";  

           break;

       case 60 ... 69:

           cout << "That grade is not good, you should seek help!";  

           break;

       default:

           cout << "That grade is not passing.";

           break;

       }

   return 0;

}

Explanation:

*The code is in C++

First, ask the user to enter a grade

Then, check the grade to print the correct message. Since you need to check the ranges using switch statement, you need to write the minimum value, maximum value and three dots between them. For example, 70 ... 79 corresponds the range between 70 and 79 both inclusive.

Finally, print the appropriate message for each range.

Note: I assumed the maximum grade is 1000, which should more than enough for a maximum grade value, for the first case.

6 0
3 years ago
Cyberwar is a potential threat to America's security, both physically and psychologically. This thesis statement is most likely
OLEGan [10]

Answer:

Option C i.e., concept is the correct option.

Explanation:

The following option is true because cyberwar is the threat that is a potential attack on the internet for the purpose to damage the security and the information of the national and the international organizations by the DoS(Denial of service attack) and virus and also to steal the confidential data.

6 0
4 years ago
Other questions:
  • Who usually signs a collection letter?
    15·2 answers
  • Explain the theory of electro-magnetism
    8·1 answer
  • What career is likely to have to highest salary
    14·2 answers
  • Which network component allows computers to communicate on a network without being connected directly to each other?
    9·1 answer
  • What is the most credible website or webpage you have ever visited? Why is it so credible? Describe some of the qualities that m
    8·2 answers
  • within a list are identified by an index number, placed within square brackets after the name of the list. For example:
    13·1 answer
  • Which of the following files should be multiplexed, for safety? (Choose all correct answers.)
    6·1 answer
  • What are the first letters of each of the 3 main colors in javaScript? (seperate with commas)
    9·1 answer
  • 1) Given what you have learned about computers and information technology thus
    6·1 answer
  • Computer viruses and coding books
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!