1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir2022 [97]
3 years ago
15

Project: Big Data Programming - Section 2

Computers and Technology
1 answer:
kozerog [31]3 years ago
3 0

Answer:

Project: Big Data Programming - Section 2

Finding and Analyzing Your Data

a temperature map of the US

A temperature map of the US (Courtesy of the National Weather Service)

You need a large data set. If you are interested in weather data, try these search prompts. By adding “site:.gov” to your search, you are more likely to find government websites. Be careful in your search to use a trusted and reliable website. You do not want to download a virus along with your data!

climate at a glance site:.gov

statewide time series site:.gov

Examine Your Data

Once you have downloaded data, you will probably need to delete some of the top lines before you read the file. For instance, the following are the top few lines from a file that holds the average February temperature for 126 years. The data lines have three entries: the date, the average February temperature in degrees Fahrenheit, and the departure from the mean February temperature of 33.82 °F. The date is a string composed of the year and month. Since every month is February, all the date strings end in “02.”

Think of what will happen when you read the data in the file. Most of the rows are structured, but the first five rows have identifying information. Be sure you remove such rows from your data file before you process it.

​Contiguous U.S., Average Temperature, February

Units: Degrees Fahrenheit

Base Period: 1901-2000

Missing: -99

Date,Value,Anomaly

189502,26.60,-7.22

189602,35.04,1.22

189702,33.39,-0.43

This is how this file should start.

​189502,26.60,-7.22

189602,35.04,1.22

189702,33.39,-0.43

Be sure to check your file for the leading lines you need to delete.

Your Task

Now that you have your file holding your data, you need to analyze the data in three different ways that answer questions you pose. How you analyze is up to you, since what you analyze depends on what kind of data you have. As an example, with this data file, you can look for weather trends. You could find the average temperature of each decade, find the decade with the lowest average temperature, and the decade with the highest average temperature. It is a shame that the data table does not go back further. The Krakatoa volcano in Indonesia had a major eruption in 1816. It had such an epic effect on the climate that 1813 was known as the year without a summer.

You need your data file saved in the same folder as your program.

Open your data file with Notepad or Wordpad.

Open a new file in Python.

Copy and paste the contents from Notepad to the Python file.

Save the Python file with a .txt extension in the same folder where you save your program.

Analyzing Your Data

Your program will read your data file, perform the analysis, and write the results to a separate file with a .txt extension.

Write a pseudocode plan for your program. Show your plan to a partner. Ask the partner for any suggestions to improve your plan.

When done, show your results to a partner. Ask your partner what parts they found interesting.

Your Word Document Requirements

Part 1: Name: your name

Part 2: Data Source: the source of your data (do not copy and paste your data into the Word document)

Part 3: Questions to Answer: the questions your analysis will answer

Part 4: The Plan: the pseudocode outline of your program

Part 5: Plan Feedback from Your Partner: suggestions from your partner

Part 5: Results: copy and pasted results from your data file

Part 6: Interpretation: your interpretation of the results

Part 7: Final Feedback from Your Partner: description of what your partner found interesting

You can use this rubric

to evaluate your project before you submit it.

What to Submit

You will submit each of the following.

A Word document: Organize it as shown below.

Your data file: Saved with a .txt extension

Your program: Saved with a .txt extension since you cannot upload a .py file.

Your results file: Saved with a .txt extension.

IT'S DUE TODAY PLEASE GIVE ME A GOOD ANSWER

Explanation:

You might be interested in
Which is a correct explanation of first lines?
tatyana61 [14]

The correct explanation of the first line in poems is; Choice B; The first lines determine all of the poet's subsequent choices.

<h3>Meaning of poem</h3>

By literature definition, a poem is a piece of writing in which the words are chosen for their beauty and sound and are carefully arranged, often in short lines which rhyme.

To ensure that these short lines in poems rhyme, the first line serves as a template and consequently, determines all of the poet's subsequent choices.

Read more on poems and first line;

brainly.com/question/4343450

8 0
3 years ago
Which is the default option for autosum?
Drupady [299]

Answer:

Average is the following the default option of auto sum feature

7 0
3 years ago
How do IT security workers help business
Elodia [21]
They code and learn how to go in the inner and deeper parts of the computer
6 0
4 years ago
What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured I
vovangra [49]

Answer:

Show ip interface brief privileged mode command.

Explanation:

A switch is an intermediate network device for transmitting frames in a network. It operates at the Data-link layer of the OSI model. A Cisco switch uses the Cisco operating system for configuration.

There are three main mode in the switch operating system configuration interface, they are, user, privileged and global configuration mode.

The user mode has few commands vthat runs on it, but are not permanent configuration of the switch. The privileged mode is used mainly for verifying settings in the switch. To check for the IP addresses and status of switch ports, the "show ip interface brief" command is issued in the privileged mode.

All configuration in global mode that are saved in the startup configuration is permanent.

6 0
3 years ago
What is the capacity of a disk with two platters, 10,000 cylinders, an average of 400 sectors per track, and 512 bytes per secto
natita [175]

Answer:

The capacity of the disk is "40 GB".

Explanation:

Given value:

\to \text{cylinder}= 10,000\\\\\to \frac{sector}{track} = 400\\\\\to \frac{bytes}{sector} = 512\\

\text{Calculating the size of track} =  \frac{bytes}{sector} \times  \frac{sector}{track}

                                            = 512 \times  400 \\\\ = 204,800 \ \ Or  \ \ 200 \ K

\text{Calculating the size of surface} = \frac{byte}{track} \times \ cylinder

                                               = 2000 \ K \times  10,000 \\\\ = 20, 000,000 \ K

\text{Calculating the capacity of a disk} = \frac{byte}{surface} \times \frac{surface}{disk}

                                                     = 20, 000,000 \ K \times  2 \\\\ = 40, 000,000 \ K \\\\= 40 \ GB

Cache memory is often used to speed up the runtime. It will enable us to improve performance unless we can store information, that is retrieved constantly in memory space.

  • Hit Cache: when the Processor relates to representing database data, Cache Hit results.
  • Miss Cache: when this Processor responds to a non-present cache data, this will trigger its miss of cache.
  • It doesn't have to retrieve the Main Memory through secondary storage.
3 0
3 years ago
Other questions:
  • How to add a second screen to your computer?
    7·1 answer
  • A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way
    6·1 answer
  • What is the tendency for an individual to have better memory for information that relates to oneself in comparison to material t
    7·1 answer
  • When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmis
    14·1 answer
  • Create a method to search an un-ordered array of integers for a value, if the value is found return the index of its position in
    10·1 answer
  • If you want to transfer information transform STM to LTM, it is essential that you make the information ______________________.
    9·1 answer
  • 52. Which of the following numbering system is used by the computer to display numbers? A. Binary B. Octal C. Decimal D. Hexadec
    12·2 answers
  • 23+ Composition refers to
    11·1 answer
  • To be fluent in computer language you must learn 8000 __________? (9 letter word)
    5·1 answer
  • Explain the working principle of computer with suitable diagram​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!