Write your implementation in a module you will name

Assignment Help Management Information Sys
Reference no: EM132276375

Lab Activity 5

Lab Activity 5.1

Implement a program that starts by asking the user to enter a login id (i.e., a string). The program then checks whether the id entered by the user is in the list ["joe", "sue", "hani", "sophie"] of valid users. Depending on the outcome, an appropriate message should be printed. Regardless of the outcome, your function should print "Done." Before terminating. Here is an example of a successful login:

>>>

Login: joe

You are in!

Done.

And here is one of that is not:

>>>

Login: john

User unknown

Done.

Lab Activity 5.2

Implement a program that requests from the user a list of words (i.e., strings) and then prints on the screen, on per line all four-letter strings in the list.
>>>

Enter word list: ["stop", "desktop", "top", "post"]

stop

post

Lab Activity 5.3

Write the for loop that will print these sequences of numbers, one per line, in the interactive shell.

(a) Integers from 0 to 9 (i.e., 0, 1, 2, 3, 4, 5, 6, 7, 8, 9)

(b) Integers from 0 to 1 (i.e., 0, 1)

Lab Activity 6

Lab Activity 6.1

Write the for loop that will print the following sequences of numbers, one per line.

(a) Integers from 3 up to and including 12

(b) Integers from 0 up to but not including 9, but with a step of 2 instead of the default of 1 (i.e., 0, 2, 4, 6, 8)

(c) Integers from 0 up to but not including 24 with a step of 3

(d) Integers from 3 up to but not including 12 with a step of 5

Lab Activity 6.2

Define, directly in the interactive shell, function perimeter() that takes, as input, the radius of a circle (a nonnegative number) and returns the perimeter of the circle. A sample usage is:

>>>perimeter(1)

6.283185307179586

>>>perimeter(2)

12.566370614359172

Remember that you will need the value of π (defined in module math) to compute the perimeter.

Lab Activity 6.3

Implement function average() that takes two numbers as input and returns the average of the numbers. You should write your implementation in a module you will name average.py.

A sample usage is:
>>> average (1,3)
2.0
>>> average (2, 3.5)
2.75

Reference no: EM132276375

Questions Cloud

Essay on philosophy of leadership and application : Organisational Behaviour and Leadership - Assessment – Individual essay - Demonstrate a critical understanding of organisational behaviour
What decisions did the fbi and saic make : What decisions did the FBI and SAIC make during development that increased risk? How can these be avoided in the next project that the FBI takes on?
Create a doubly linked list : From your Singular Linked List. Create a Doubly Linked List. Use this to create a prioritized list by use. Bring to front those links recently queried.
Discussion of key elements of the model of stewardship : Review the models of stewardship presented by Wilson (2016) and Block (1993) - analyse the potential benefits and challenges that might occur upon employing
Write your implementation in a module you will name : Define, directly in the interactive shell, function perimeter() that takes, as input, the radius of a circle (a nonnegative number) and returns the perimeter.
What do you see as the benefits of such an effort : Discuss why a company would want to go through the expense and effort to develop a Data Warehouse environment. What do you see as the benefits.
Disucss the term managing information systems : This capstone course will require a BEST PRACTICES PRESENTATION which will consist of a PowerPoint presentation. The project presentation will be a detailed.
How reasonable do you feel that the hipaa rules : How reasonable do you feel that the HIPAA rules for database security and the penalties for violations are?
How situational awareness is a driver for detection control : The increasing sophistication of cyber attacks have shown that no controls are 100% effective, and some compromises do occur.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the concepts of information systems security

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly.

  How six sigma manufacturing organizations

Construct an example of how Six Sigma for Data Mining helps manufacturing organizations. Evaluate the relation of the Define, Measure, Analyze, Improve and Control (DMAIC) methodology to Six Sigma for Data Mining.

  Determine the continuous assurance auditing activities

Determine the continuous assurance auditing activities that the organization will need to implement to help achieve CMMI level 3.

  Create a new security strategy

You are the IT professional in charge of security for a company that has recently opened within a shopping mall.

  What prior experiences do you have that inform

WRTG 112 : What are some of your aspirations (educational, professional, or other goals) that you can work toward by taking Introduction to Writing.

  Develop five major goals for information technology plan

Develop at least five major goals for the information technology strategic plan. Speculate on three positive organizational impacts of implementing the strategic plan. Justify your response.

  Measure success of it systems infrastructure-centric

measure success of it systems infrastructure-centric web-centric call center metricsin this module we focused on

  Information systems and security

Discuss one of the most important things from this Information Systems and Security.

  How are the juries of the three countries similar

What topic have you chosen for your research paper? Why did you choose this topic? List the questions you plan to address, as well as any other information you plan to include.

  Analyze complex problems in network security

NIT5140 Information Security Assignment. To develop skills to independently think of situation and apply skills to analyze complex problems in network security

  Outline a risk mitigation strategy for each of selected risk

Outline a risk mitigation strategy for the each of the selected high risks. Summarize the challenges the team faced and how you worked out.

  Write a explanation of porters four competitive strategies

Write a brief explanation of Porter's four competitive strategies. A brief explanation of how competitive strategy determines value chain structure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd