Write a program that keeps names and email addresses

Assignment Help Basic Computer Science
Reference no: EM13307293

Write a program that keeps names and email addresses in a dictionary as key-value pairs.

The program should display a menu that lets the user look up a person's email address, add a new name and email address, change an existing email address, and delete an existing name and email address. The program should pickle* the dictionary and save it to a file when the user exits the program. Each time the program starts, it should retrieve the dictionary from the file and unpickle* it.

You must create and use at least 5 meaningful functions.
display a menu
look up a person's email address
add a new name and email address
change an existing email address
delete an existing name and email address.

Reference no: EM13307293

Questions Cloud

Implementation strategy for change : Demonstrate the skill of identifying an implementation strategy for change and working with diverse opinions and perspectives to develop and describe a new approach to a past challenge of an organization implementing change.
Find a more accurate formula : Find the values of A and B such that error is minimized. What power of h is the error proportional to. Use the formula to find d/dx sin(x) at x =pi/3.
Colebrook-white equation : Determine the headloss in a 46 cm steel formed concrete pipe with an average flow velocity of 3 m/s and a length of 40 m using the colebrook-white equation
What is the length of the athletes jump : An athlete competing in long jump leaves the ground with a speed of 9.14 m/s at an angle of 35.0 ° above the horizontal
Write a program that keeps names and email addresses : Write a program that keeps names and email addresses in a dictionary as key-value pairs.
Explain the effects of the negative impact : Explain the effects of the negative impact/interaction and suggest ways in which the criminal justice system can use this form of social media more effectively.
Convert this cfg to one with-out the lambda-production then : convert this CFG to one with-out the lambda-Production then.
What is the power required to keep that object in motion : An object weighting 100N is traveling vertically upward from the ground in the absence of air resistance at a constant velocity of 5 m/s
Determine the velocity downstream of the rotor : An early NASA/DOE wind turbine consisted of a 125.0-ft diameter, two-bladed horizontal axis rotor. Maximum power was achieved at a wind speed of 19.0 miles/hr.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Successfully prevent identity theft

Select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce should implement to prevent it from happening. Also, address the options users can take to protect th..

  Creating data encryption standard for ibm

Let us start off with once widely used Data Encryption Standard (DES) which was created by International Business Machines (IBM).

  Make this code appear from right to left it is html code

Please make this code appear from right to left, it's HTML Code

  Design a dtack circuit that will generate the correct number

Assume the processor has a clock period of 5ns and the memory chips' access time is 58 ns. Design a DTACK circuit that will generate the correct number of wait states.

  What is the general algorithm for solving this problem

what is the general algorithm/approach for solving this problem? as a test case, move_robot 10 forward 3 = 13

  Discuss strategies to dilute manager-s anger

Discuss strategies you will use to dilute this manager's anger. Discuss how you will get them both to support your recommendations.

  Creating cut-over plan for alternate processing site

Create cut-over plan for alternate processing site based on given below. Consider LAN for small 100-person business, Pixel Inc. Business occupies one floor in an office building.

  Consider a variant of cbc-mode encryption

Consider a variant of CBC-mode encryption where the sender simply increments the IV by 1 each time a message is encrypted (rather than choosing IV at random each time). Show that the resulting scheme is not CPA-secure.

  Design concept in terms of the usability of the design

A justification for the design concept in terms of the usability of the design. You should explain why your decisions make sense and why your interface concept works for the application. Any preliminary designs can be included as an Appendix to th..

  Create a new string to represent the corresponding full name

Create a new string to represent the corresponding full name, and display it on screen in format: Lastname, Firstname, Middle name.

  The sequence control structure

1. the sequence control structure and the selection control structure?

  Understanding of storage classes and scope rules

It amounts to a "divide and conquer" approach to problem solving. This needs sound understanding of storage classes and scope rules. Response and or thoughts?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd