Python Programming: An Introduction to Computer Science, 3rd Ed.
Python Programming: An Introduction to Computer Science, 3rd Ed.
3rd Edition
ISBN: 9781590282755
Author: John Zelle
Publisher: Franklin, Beedle & Associates
bartleby

Videos

Question
Book Icon
Chapter 12, Problem 3PE
Program Plan Intro

Tracking conference attendees

Program plan:

  • Import the package.
  • Create a class “Conference_Manager”,
    • Define the “_init_()” function,
      • Create empty list.
      • Open the input file in read mode.
      • Read all the characters from the file using “read()”.
      • Parse the json string using “json_loads()”.
      • Create a “for” loop to iterate all the keys which are obtained from “json_object”.
        • Assign initial values by invoking “_init_()”.
        • Append the value at the end of the list.
      • Close the input file.
    • Define the getter method “get_JSON()”,
      • Return the key, value pairs get from “json_object”.
    • Define the getter method “get_Attendee()”,
      • Create “for” loop to iterate over elements of list.
        • Check whether the value return from “get_Name()” is equal to the value stored in “name,
          • Return the list.
    • Define the getter method “find_ByState()”,
      • Create a list.
      • Create “for” loop to iterate over elements of list.
        • Check whether the value return from “get_State()” is equal to the value stored in “state”,
          • If it is true, append the value to the end of the list.
      • Return the list.
    • Define the getter method “make_Attendee()”,
      • Assign the value to the list return from “_init_ ()” method from Attendee class.
      • Append the value to the end of the list.
    • Define the method “del_Attendee()”,
      • Create for loop,
        • Check whether the name is return from “get_name()”,
          • If it is true, remove the element using “pop()”.
    • Define the method “update_Conference()”,
      • Create a list.
      • Create for loop,
        • Check whether the name is return from “get_name()”,
          • Append the value to the end of the list.
            • Open the output file in write mode,
              • Serialize the object as a JSON formatted stream using “json_dump()”.
  • Create a class “Attendee”,
    • Define the function “_init_()”,
      • Assign the initial values for the variables.
    • Define the getter method “get_Name()” to return the value stored in “name”.
    • Define the getter method “get_Company()” to return the value stored in “company”.
    • Define the getter method “get_State()” to return the value stored in “state”.
    • Define the getter method “get_Email()” to return the value stored in “email”.
    • Define the method “display_Info()” to print the formatted output.
  • Define the “main()” function,
    • Call the constructor to initialize the values.
    • Call “make_Attendee()” function.
    • Assign the value return from “get_Attendee()”.
    • Assign the value return from “find_ByState()”.
    • Print the value return from “get_Company()”.
    • Print the value return from “get_Name()”.
    • Print the value return from “get_Sate()”.
    • Print the value return from “get_Email()”.
    • Call the function “display_Info()”.
    • Create for loop,
      • Print the value return from “get_Name()”.
  • Call the “main()” function.

Blurred answer
Students have asked these similar questions
Using the following execution shown below, explain what is done in each of the ARIES recovery algorithm phases: LSN   LOG 00   begin_checkpoint 10 end_checkpoint 20 update: T1 writes P1 30 update: T2 writes P2 40 update: T3 writes P3 50 T2 commit 60 update: T3 writes P2 70 T2 end 80 update: T1 writes P5 90 T3 abort   CRASH, RESTART In addition to the execution shown here, the system crashes during recovery after writing two log records to stable storage and again after writing another two log records
A new application is being developed and will be using a database that includes a relation about items: Item (item_id:integer, item_name:string, color:string, price:real). Both the purchasing department in charge of obtaining raw material and the manufacturing department in charge of manufacturing the items can change the price of manufactured items according to changes that may happen in the raw material cost or production cost. The two departments use different transactions to update the price of items. The new application uses the following sequences of actions, listed in the order they are submitted to the DBMS: Sequence S1: T1:R(X), T2:W(X), T2:W(Y), T3:W(Y), T1:W(Y), T1:Commit, T2:Commit, T3:Commit Sequence S2: T1:R(X), T2:W(Y), T2:W(X), T3:W(Y), T1:W(Y), T1:Commit, T2:Commit, T3:Commit For each of the following concurrency control mechanisms, describe how they will handle each of the sequences (S1 & S2). Strict 2PL with timestamps used for deadlock prevention. Conservative…
As a database administrator of a large manufacturing organization, you are in charge of their website database that handles suppliers, parts, catalog, customers, and payments of delivered items. The following relations are part of the large database: Supplier(SID, Sname, Saddress, Stelephone)Customer(CID, Cname, Caddress, Ctelephone)Part(PID, Pname, Pmodel, Pcolor)Catalog(SID, PID, Price) (The Catalog relation lists the prices charged for parts by Suppliers). Because the application is web-based and the database is accessed by many users, you want to increase the concurrency usage without compromising the data quality. For each of the following transactions, state the minimum SQL isolation level you would use in order to avoid any conflict problems in them. Please explain your choice. A transaction that adds a new part to a supplier’s catalog. A transaction that increases the price that a supplier charges for a part. A transaction that determines the total number of items for a given…
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Text book image
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Text book image
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Files & File Systems: Crash Course Computer Science #20; Author: CrashCourse;https://www.youtube.com/watch?v=KN8YgJnShPM;License: Standard YouTube License, CC-BY
UNIX Programming (Part - 10) The File System (Directories and Files Names); Author: ITUTEES;https://www.youtube.com/watch?v=K35faWBhzrw;License: Standard Youtube License