Opens that file and reads through the file

Assignment Help Basic Computer Science
Reference no: EM131660288

In this second phase of the project you will be writing a Python application that will read email data from a file and you will analyzing the data to figure out the distribution by hour of the day for each of the messages.

The program must: 

  1. Prompt for a file name
  2. Opens that file and reads through the file
  3. Displays a custom error message if the file does not exist
  4. You can pull the hour out from the 'From ' line by finding the time and then splitting the string a second time using a colon.
  5. From [email protected] Sat Jan 5 09:14:16 2008
  6. Accumulated the counts for each hour (key)
  7. Print out the count for each of the hours after the program has completed execution. The counts should be sorted by hour as shown below.
  8. 00 13
  9. 01 17
  10. 02 01
  11. 03 29

Reference no: EM131660288

Questions Cloud

Discuss the various current leadership theories : the various current leadership theories described in the lecture, help me to describe my leadership style of transformational leadership
Organizations best practices in project risk management : Develop your own approach based on your organization's best practices in project risk management and/or utilize effective processes/ tools/ techniques.
Differentiate potential tort liability and tax liability : As an employer, you may at some time consider hiring an independent contractor. Hiring workers as independent contractors instead of as employees may help.
What are the pros and cons of having a phr : Patient portals and personal health records (PHRs) are commonplace today. What are the pros and cons of having a PHR?
Opens that file and reads through the file : In this second phase of the project you will be writing a Python application that will read email data from a file and you will analyzing the data to figure out
What do you normally do when you are faced with issues : Men are less likely to face emotional problems than women. Why do you think men are less likely to seek help
Define a class representing an inflatable balloon : Define a class representing an inflatable balloon. Balloon should have a method inflate( ) (which can be called many times) and a maximum inflation pressure.
Design requires part criticality analyses for candidate : Design requires part criticality analyses for candidate parts identified through a functional fault tree analysis to create a rank ordered critical items list.
Prevent sql injection attack : Why a Firewall can not prevent SQL injection attack?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  A software system composed of a crawler

A software system composed of a crawler and a query processor that helps users locate specific information on the Web or on a specific Web site

  How many bits are delivered to the network layer protocol

How many bits, including headers, are delivered to the network layer protocol at the destination?

  Jetstream aftermarket service goals

What type of 3PL service provider is best suited to meet Jetstream's aftermarket service goals? How should they go about finding a capable 3PL service provider?

  Summarize the process for gathering the evidence

From your selected devices, explain how the tools could be used in a corporate setting and what IT policies they can help enforce. Summarize the process for gathering the evidence with each tool.

  Comparison of vpn protocols

Provide a brief comparison of VPN Protocols, outlining the advantages and disadvantages of each. Provide a scenario where it might be useful to use VPN for an organization.

  Logistics for jetstream aftermarket service

Discuss the pros and cons of using third party logistics for Jetstream's aftermarket service? What potential risks exist with outsourcing the aftermatket services to a 3PL?

  What are the approximate high and low logic levels

While walking down a dark alley, Ben Bitdiddle encounters a twoinput gate with the transfer function shown in Figure 1.48. The inputs are A and B and the output is Y.

  What are the different types of qa activities

What are the different types of QA activities? Do you know any classification other than the one described in this chapter based on how they deal with defects?

  Relationship of each outer ip header field

For IPv4, indicate the relationship of each outer IP header field and each extension header in the outer packet to the corresponding field or extension header.

  Differentiate centralised and distributed data processing

Explain the differences between centralised and distributed data processing. Describe the pros and cons of each approach.

  What are the sequence number source port number

In the second segment sent from A to B, what are the sequence number, source port number and destination port number? If the first segment arrives before the second segment, in the acknowledgment of the first arriving segment, what is the acknowledgm..

  What are the similarities between risc and cisc

What are the similarities between RISC and CISC

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd