Keep track of vendor email addresses

Assignment Help Basic Computer Science
Reference no: EM132323048

Using Python programmingYour company needs a way to keep track of vendor email addresses. 

Create a program that keeps vendor names and email addresses in a dictionary as key-value pairs. The key should be vendor name. The program should display a menu that lets the user chose an action . . . - look up a vendor's email address, - add a new vendor and email address, - delete an existing vendor and email address or - change an existing email address. Your program should allow the user to process any number of transactions; some mechanism for the user to indicate they are done should be programmed.  When the user is done, but before ending the program, print all vendors and email addresses in a neatly formatted list.  

Comment your source code and describe your code to someone who may be viewing it for the first time.

Reference no: EM132323048

Questions Cloud

What is the combined number of units of the two products : Based on this information, what is the combined number of units of the two products that would be required to break-even with the projected sales mix ?
Largest timestamp of transaction : In timestamp ordering, W-timestamp(Q) denotes the largest timestamp of any transaction that executed write(Q) successfully
What is the amount of goodwill acquired by josef ltd : Josef Ltd acquired 90% of the share capital and reserves of Peter Limited for $170,000. Share capital was $100 000 and reserves amounted to $62 000.
Understanding of the mintzberg model : Objective: Students will demonstrate their understanding of the Mintzberg model and how it can be applied to improve performance.
Keep track of vendor email addresses : Using Python programmingYour company needs a way to keep track of vendor email addresses.
Describe the managements decision-making process : Describe the concepts: Terms sales mix and its effect on break-even sales, Activity Based- Costing and include a discussion on why you think these topics.
Python dictionary object : The company has set you up with a sample thesaurus stored in a Python dictionary object. Here's the code that represents the thesaurus:
Remediation tie into information security maintenance : Describe how planning, risk assessment, vulnerability assessment, and remediation tie into information security maintenance
Prepare a schedule for showing budgeted cash receipts : Prepare a schedule for each month showing budgeted cash disbursements for Cloaks Company. Prepare a schedule for each month showing budgeted cash.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Depends on the concept of usability

Effective product design depends on the concept of usability. Usability of a product is based on six principles. Discuss each principle, and provide examples to illustrate its meaning.

  Explain forms-based-authentication

Discuss authorization and authentication and explain forms-based-authentication. Describe the use of the ControlToValidate, Validation expression, ErrorMessage, and Enabled properties of a validation control.

  Study of information security based incidents

The Breach Research Project is a study of Information Security based incidents or crimes that have been published in the media

  Create table in datasheet view to store vendor company data

Create a table in Datasheet view to store vendor company data. On the Create tab, in the Tables group, click the Table button. You are now in the Datasheet view of a new table. Notice that Access has created a new field named ID with the AutoNumber d..

  A virus typically goes through four operational phases

A virus typically goes through four operational phases during its lifetime: Name and describe these phases.

  Whether each of these proposed

Determine whether each of these proposed definitions is a valid recursive definition of a function f from the set of nonnegative integers to the set of integers. if f is not well defined state reason; If f is well defined, find a formula for f(n) ..

  Charity event to the zoo

You volunteer to help drive at a charity event to the zoo, but you can fit only 8 of the 17 children present in your van. How many different groups of 8 children can you drive?

  Suppose a firm short-run production function

Suppose a firm's short-run production function is given by Q = 4L0.8. If the production function is Q = L0.8 K0.2, how many units of capital is it using?

  Develop a finite difference scheme for solving this equation

Consider a third-order ODE of the form d3 y/dx3 = F(x, y, dy/dx). Develop a finite difference scheme for solving this equation if y = A at x = a; y = B at x = b; and dy/dx = C at x = a. Assume that F is a linear function in the dependent variable ..

  Primary risks associated with financial leverage

What is the benefits of this leverage? What are the primary risks associated with financial leverage?

  Write a method that computes the flows in the tree edges

Write a method that computes the flows in the tree edges, putting the flow in the edge connecting v and its parent in the tree in the vth entry of an array flow.

  Filename and that the file can be opened

In this program, you should be able to open any FASTA file by inputting the command fasta and the file name (so the command line is "fasta filename") and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd