In recent technology news, Elon Musk bought Twitter, a publicly-traded company on the NYSE, for $44...
Fantastic news! We've Found the answer you've been seeking!
Question:
![](https://dsd5zvtm8ll6.cloudfront.net/si.experts.images/questions/2023/09/64f6fe00b9825_1693908480688.jpg)
Transcribed Image Text:
In recent technology news, Elon Musk bought Twitter, a publicly-traded company on the NYSE, for $44 billion dollars. Twitter is a program that allows users to post short messages to a list and allows other user accounts to subscribe to these users in order to see these messages in their message-viewing list. Well I'm sure we can create a program that does that and maybe we'll sell ours for even MORE money! We'll call it Tooter ™M! Below are the technical specifications for this program. THIS IS AN INDIVIDUAL PROJECT! DO NOT COPY OTHER PEOPLE'S CODE, DO NOT GOOGLE HOW TO MAKE A TWITTER CLONE OR ANYTHING SIMILAR, AND LASTLY PROTECT YOUR CODE! IF YOU ARE PROGRAM IS CAUGHT BEING COPIED OR IS A COPY, BOTH STUDENTS WILL FAIL THE COURSE AND LIKELY BE EXPELLED! Technical Specifications of the Tooter app: 1. This application is secured by a pin. When the user starts the program, it should ask them for a pin. This is unique to an individual user, who will remain the current user until the program is restarted. 2. There are 2 features of Tooter: a. Writing toots - This consists of taking in the user's input and saving it into the toots.csv file. These should be added onto the end of the file so as to not overwrite the whole file for every new toot. b. Reading toots - This consists of reading the toots.csv file and printing out every toot that was written by a person the current user follows. If no toots are displayed, print the message "No toots available." to the user. 3. Data structures a. User- the following are the segments of a line in the users.csv file i. ii. iv. handle: The unique identifier of the user, this connects users to their toots. name: The common name of the user, this should be displayed with each toot by the user. pin: The unique identifier that is the password for the user to log in to the system. following: A list of handles separated by dashes, "-", these are the users that you will see toots from when viewing. b. Toot - the following are the segments of a line in the toots.csv file i. iii. handle - The unique identifier of the user who created the message date - The month/day/year form of when the message was created message - The message that the user wrote In recent technology news, Elon Musk bought Twitter, a publicly-traded company on the NYSE, for $44 billion dollars. Twitter is a program that allows users to post short messages to a list and allows other user accounts to subscribe to these users in order to see these messages in their message-viewing list. Well I'm sure we can create a program that does that and maybe we'll sell ours for even MORE money! We'll call it Tooter ™M! Below are the technical specifications for this program. THIS IS AN INDIVIDUAL PROJECT! DO NOT COPY OTHER PEOPLE'S CODE, DO NOT GOOGLE HOW TO MAKE A TWITTER CLONE OR ANYTHING SIMILAR, AND LASTLY PROTECT YOUR CODE! IF YOU ARE PROGRAM IS CAUGHT BEING COPIED OR IS A COPY, BOTH STUDENTS WILL FAIL THE COURSE AND LIKELY BE EXPELLED! Technical Specifications of the Tooter app: 1. This application is secured by a pin. When the user starts the program, it should ask them for a pin. This is unique to an individual user, who will remain the current user until the program is restarted. 2. There are 2 features of Tooter: a. Writing toots - This consists of taking in the user's input and saving it into the toots.csv file. These should be added onto the end of the file so as to not overwrite the whole file for every new toot. b. Reading toots - This consists of reading the toots.csv file and printing out every toot that was written by a person the current user follows. If no toots are displayed, print the message "No toots available." to the user. 3. Data structures a. User- the following are the segments of a line in the users.csv file i. ii. iv. handle: The unique identifier of the user, this connects users to their toots. name: The common name of the user, this should be displayed with each toot by the user. pin: The unique identifier that is the password for the user to log in to the system. following: A list of handles separated by dashes, "-", these are the users that you will see toots from when viewing. b. Toot - the following are the segments of a line in the toots.csv file i. iii. handle - The unique identifier of the user who created the message date - The month/day/year form of when the message was created message - The message that the user wrote
Expert Answer:
Answer rating: 100% (QA)
1 This application is secured by a pin When the user starts the program it should ask them for a pin This is unique to an individual user who will remain the current user until the program is restarte... View the full answer
Related Book For
Posted Date:
Students also viewed these programming questions
-
explain the principles behind distributed database systems, including techniques for partitioning data, maintaining consistency across distributed nodes, and handling distributed transactions in a...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Hi there , I need help. for my work i need a relevant and well written introduction as well as conclusion to the following below. My work is complete i just need a introduction and conclusion please...
-
A square duct, 30 cm by 30 cm, is maintained at a constant temperature of 30oC and an airstream of 50oC and 1 atm is forced across it with a velocity of 6 m/s. Calculate the heat gained by the duct....
-
Passenger miles flown on I-Go Airlines, a commuter firm serving the Boston hub, are as follows for the past 12 weeks: (a) Assuming an initial forecast of 22,000 miles for week 1, use exponential...
-
Trotmans Variety Store is completing the accounting process for the current year just ended, December 31. The transactions during the year have been journalized and posted. The following data with...
-
Rusli Ltd provides a car valet service for car hire businesses when their cars are returned from hire. Details of the service costs are as follows: Per car Car valet charge 20 Less Variable costs...
-
The time between calls to a corporate office is exponentially distributed with a mean of 10 minutes. (a) What is the probability that there are more than three calls in one-half hour? (b) What is the...
-
If the MSFT 24 call is selling for $1.50, and the MSFT 25 call is selling for $1, construct a bull spread using these nearby 24 and 25 calls. a. Construct a table like the ones we did in class...
-
The Town of Weston has a Water Utility Fund with the following trial balance as of July 1, 2019, the first day of the fiscal year: Credits Cashi Customer accounts receivable Allowance for...
-
Break-Even Sales Under Present and Proposed Conditions Portmann Company, operating at full capacity, sold 1,000,000 units at a price of $190 per unit during the current year. Its income statement is...
-
Turn this information into an excel sheets with the excel formulas being shown P10.1 (LO 1) (Depreciation for Partial Period-SL, SYD, and DDB) Alladin Company purchased Machine #201 on May 1, 2025....
-
You are the Financial Analyst at Wellington Laboratories Ltd., a New Orleans, USA based bulk drugs manufacturer, which is evaluating the following project for manufacturing a new compound. Year Cash...
-
A variable mesh screen produces a linear and axisymmetric velocity profile as indicated below in the air flow through a 2-ft diameter circular cross section duct. The static pressures upstream and...
-
A vertical round steel rod 2 m long is securely held at its upper end. A weight can slide freely on the rod and its fall is arrested by a stop provided at the lower end of the rod. When the weight...
-
8) Determine the magnitudes of the forces F and P so that the single equivalent couple (i.e. the resultant of the three couples) acting on the triangular block is zero. Z -F F 3 m 10 N, 30 6 m 10 N 3...
-
I need the answer as soon as possible Explain five types of electronic offenses and how to prevent each of them
-
The sales department of P. Gillen Manufacturing Company has forecast sales in March to be 20,000 units. Additional information follows: Finished goods inventory, March 1 . . . . . . . . . . . . . . ....
-
1. Rich Snyder was twenty-four years old when he assumed leadership of In-N-Out after his father passed away. Do you think his young age was an asset or a liability for his leadership? Or did it...
-
Is the logic of the virtuous circle a convincing argument in favor of corporate social responsibility?
-
Are there any items on the list of entrepreneurial characteristics that are musthaves for someone to succeed in any career, not just entrepreneurship?
-
3. On December 31, 2008, the city in question 2 makes its first annual lease payment. How does it report the payment on the government-wide financial statements? On the fund-based financial...
-
How does governmental accounting apply to public colleges and universities?
-
What is included in the management's discussion and analysis (MD&A), and why is it required of state and local governments?
![Mobile App Logo](https://dsd5zvtm8ll6.cloudfront.net/includes/images/mobile/finalLogo.png)
Study smarter with the SolutionInn App