In recent technology news, Elon Musk bought Twitter, a publicly-traded company on the NYSE, for $44...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
In recent technology news, Elon Musk bought Twitter, a publicly-traded company on the NYSE, for $44 billion dollars. Twitter is a program that allows users to post short messages to a list and allows other user accounts to subscribe to these users in order to see these messages in their message-viewing list. Well I'm sure we can create a program that does that and maybe we'll sell ours for even MORE money! We'll call it Tooter ™M! Below are the technical specifications for this program. THIS IS AN INDIVIDUAL PROJECT! DO NOT COPY OTHER PEOPLE'S CODE, DO NOT GOOGLE HOW TO MAKE A TWITTER CLONE OR ANYTHING SIMILAR, AND LASTLY PROTECT YOUR CODE! IF YOU ARE PROGRAM IS CAUGHT BEING COPIED OR IS A COPY, BOTH STUDENTS WILL FAIL THE COURSE AND LIKELY BE EXPELLED! Technical Specifications of the Tooter app: 1. This application is secured by a pin. When the user starts the program, it should ask them for a pin. This is unique to an individual user, who will remain the current user until the program is restarted. 2. There are 2 features of Tooter: a. Writing toots - This consists of taking in the user's input and saving it into the toots.csv file. These should be added onto the end of the file so as to not overwrite the whole file for every new toot. b. Reading toots - This consists of reading the toots.csv file and printing out every toot that was written by a person the current user follows. If no toots are displayed, print the message "No toots available." to the user. 3. Data structures a. User- the following are the segments of a line in the users.csv file i. ii. iv. handle: The unique identifier of the user, this connects users to their toots. name: The common name of the user, this should be displayed with each toot by the user. pin: The unique identifier that is the password for the user to log in to the system. following: A list of handles separated by dashes, "-", these are the users that you will see toots from when viewing. b. Toot - the following are the segments of a line in the toots.csv file i. iii. handle - The unique identifier of the user who created the message date - The month/day/year form of when the message was created message - The message that the user wrote In recent technology news, Elon Musk bought Twitter, a publicly-traded company on the NYSE, for $44 billion dollars. Twitter is a program that allows users to post short messages to a list and allows other user accounts to subscribe to these users in order to see these messages in their message-viewing list. Well I'm sure we can create a program that does that and maybe we'll sell ours for even MORE money! We'll call it Tooter ™M! Below are the technical specifications for this program. THIS IS AN INDIVIDUAL PROJECT! DO NOT COPY OTHER PEOPLE'S CODE, DO NOT GOOGLE HOW TO MAKE A TWITTER CLONE OR ANYTHING SIMILAR, AND LASTLY PROTECT YOUR CODE! IF YOU ARE PROGRAM IS CAUGHT BEING COPIED OR IS A COPY, BOTH STUDENTS WILL FAIL THE COURSE AND LIKELY BE EXPELLED! Technical Specifications of the Tooter app: 1. This application is secured by a pin. When the user starts the program, it should ask them for a pin. This is unique to an individual user, who will remain the current user until the program is restarted. 2. There are 2 features of Tooter: a. Writing toots - This consists of taking in the user's input and saving it into the toots.csv file. These should be added onto the end of the file so as to not overwrite the whole file for every new toot. b. Reading toots - This consists of reading the toots.csv file and printing out every toot that was written by a person the current user follows. If no toots are displayed, print the message "No toots available." to the user. 3. Data structures a. User- the following are the segments of a line in the users.csv file i. ii. iv. handle: The unique identifier of the user, this connects users to their toots. name: The common name of the user, this should be displayed with each toot by the user. pin: The unique identifier that is the password for the user to log in to the system. following: A list of handles separated by dashes, "-", these are the users that you will see toots from when viewing. b. Toot - the following are the segments of a line in the toots.csv file i. iii. handle - The unique identifier of the user who created the message date - The month/day/year form of when the message was created message - The message that the user wrote
Expert Answer:
Answer rating: 100% (QA)
1 This application is secured by a pin When the user starts the program it should ask them for a pin This is unique to an individual user who will remain the current user until the program is restarte... View the full answer
Related Book For
Posted Date:
Students also viewed these programming questions
-
explain the principles behind distributed database systems, including techniques for partitioning data, maintaining consistency across distributed nodes, and handling distributed transactions in a...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Hi there , I need help. for my work i need a relevant and well written introduction as well as conclusion to the following below. My work is complete i just need a introduction and conclusion please...
-
A square duct, 30 cm by 30 cm, is maintained at a constant temperature of 30oC and an airstream of 50oC and 1 atm is forced across it with a velocity of 6 m/s. Calculate the heat gained by the duct....
-
Solve Prob. 18.63 assuming = 360 rpm. Problem 18.63: The assembly shown consists of pieces of sheet aluminum of uniform thickness and of total mass 1.5 kg welded to a light axle supported by...
-
Refer to the situation described in BE119. Determine the financing cash flows to be reported by IT Industries in 2021. BE11-9 On April 1, 2020, Teleworks Company lent $100,000 to IT Industries. IT...
-
Describe the differences between domestic and international HRM.
-
You are auditing the financial statements of a cosmetics distributor that sells thousands of individual items. The distributor keeps its inventory in its distribution center and in two public...
-
Dozier Company produced and sold 1 , 0 0 0 units during its first month of operations. It reported the following costs and expenses for the month: Direct materials $ 7 2 , 0 0 0 Direct labor $ 3 6 ,...
-
"Code By Day" (CBD) Software Consulting Company: Billing & Payroll System Functional Description: (highlighted words may or may not be objects) The CBD software consulting Company has the following...
-
On November 1, 2025, Alpha Omega, Inc. sold merchandise for $20,000, FOB destination, with payment terms, n/30. The cost of goods sold was $6,800. On November 3, the customer returns on this sale...
-
What would be the FX breakeven Euro/USD rate of an USD denominated 4-year bond, purchased at 10% discount, held to maturity, paying a 3% coupon annually if purchased by a European investor. Spot...
-
Micron Technologies (MU) is currently trading at $81.93/share (S(0) = $81.93). A 6-month risk-free zero coupon bond with a $100 face value trades at $98.51. Assume that MU pays no dividends. What is...
-
Beginning today, you will receive equal payments at the beginning of each year for 11 years (this includes today's payment). The present value of these payments is $10,000. If the appropriate...
-
After reading this article, what financial tips do you think you've learned from this? Discuss....
-
Sariah has just begun training for a half-marathon, which is 13.113.1 miles. Since she was on vacation, she started the training program later than the rest of her running club. There are 66 weeks of...
-
Which of the following anions act as weak bases in solution?Check all that apply. Br? NO2? CN? Cl?
-
1. Firms may hold financial assets to earn returns. How the firm would classify financial assets? What treatment will such financial assets get in the financial statements in accordance with US GAAP...
-
1. Rich Snyder was twenty-four years old when he assumed leadership of In-N-Out after his father passed away. Do you think his young age was an asset or a liability for his leadership? Or did it...
-
Is the logic of the virtuous circle a convincing argument in favor of corporate social responsibility?
-
Are there any items on the list of entrepreneurial characteristics that are musthaves for someone to succeed in any career, not just entrepreneurship?
-
How do managers refine a costing system?
-
When does product undercosting or overcosting occur?
-
How do managers cost products or services using ABC systems?
Study smarter with the SolutionInn App