1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
10

Design the program that reads two files and compares their contents. The program calls a method that reads the file one line at

a time. If the lines are the same the program skips the line. If the lines are different then the program prints the line number followed by the different lines from each file.
Computers and Technology
1 answer:
Advocard [28]3 years ago
5 0

Answer:

file1 = []

file2 = []

fileone = "lyric1.txt"

filetwo = "lyric2.txt"

def linereader( myfile, mylist):

   for line in open(myfile, "r") as file:

       line_read = readlines( line)

       mylist.append( line_read)

   file.close()

linereader( fileone, file1)

linereader( filetwo, file2)

# Assuming both files have same number of lines.

for index, item in enumerate(zip(file1, file2)):

   if item[0] != item[1]:

       print( index + 1, item)

Explanation:

The python code compares two files and returns the number and the lines from both files that do not match. The source code opens the files lyric1.txt and lyric2.txt reading each lines to different lists which are iterated to compare its items returning the number of the line and the unequal lines.

You might be interested in
When replacing a system board in a laptop, which feature is a must?
Marta_Voda [28]

Answer:

Having the integrated peripherals in the same locations as the old system board

Explanation:

System board is the printed circuit board that is used to connect the peripheral devices. It provides the slots and ports to connect the peripherals devices.

If there is a need to replace the system board of the laptop. You can change the system board. On new system board, all the peripherals that are installed on previous (old) system board should be placed on new system board. As the system requirements are same, only printed circuit board of the system is changed.

The new system board is replica of the previous board so, we can not change peripheral of the system boards.

5 0
3 years ago
Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
pychu [463]

Answer:

ADMINISTRATIVE CONTROL

Explanation:

If a potential employee is required to undergo a drug screening an Administrative Control is what will be conducted on the employee because

Administrative controls are training, procedure, policy that limit or prevent exposure of an individual to hazards. Examples of administrative controls include training, supervision, timing of work. Administrative controls are also changes in work procedures such as written safety policies, rules, supervision which is the reason the employee has to undergo drug screening using Administrative controls.

6 0
4 years ago
The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
artcher [175]

The publisher tab in the application control allows you to manage the various certificates that are used to sign to binaries. Publisher allow executables of a particular vendor, signed by a security certificate issued to the vendor by a Certificate Authority. Also, all applications and binary files either added to or modified on an endpoint that are signed by the certificate are automatically added to the whitelist.

3 0
3 years ago
The process of converting information from a form/questionnaire is referred to as data preparation. This process follows a four-
Sergio [31]

Answer:

Data tabulation.

Explanation:

6 0
3 years ago
. Why use a sensitivity analysis?
Natali [406]

Answer:

 Sensitivity analysis is the method in which it basically predict the final outcome of the decision. It analysis each variable individually and identify the dependency of the output value on the particular value of the input.  

The advantage of the sensitivity analysis is that it reduce the overall risk of the particular strategy and also impact of the system.

It basically work on the basic principle that firstly changed the structure and model and then observe the particular behavior of the model.

7 0
3 years ago
Other questions:
  • Which fingers should you use to type the reach keys?
    12·1 answer
  • Which of the following statements about Linux is not​ true? A. Linux works on all the major hardware platforms. B. It plays a ma
    5·1 answer
  • Derek is working at the help desk when he receives a call from a client about an issue with the company's email. The customer is
    9·1 answer
  • the easiest and cheapest time to alter the information system is in the ________ phase of the sdlc. a. requirements analysis b.
    8·1 answer
  • A network administrator recently implemented two caching proxy servers on the network. how can the administrator best aggregate
    5·1 answer
  • Who where the romanovs? What happened to them ?
    7·1 answer
  • T F Changes to a function parameter always affect the original argument as well.
    15·1 answer
  • Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string,
    9·1 answer
  • For the sake of maximizing hardware utilization in a multicore system with a many to many threading model, the relationship of t
    12·1 answer
  • The residual volume can be measured directly with: Select an answer and submit. For keyboard navigation, use the up/down arrow k
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!