import pandas as pd
df = pd.read_json('files/mine.json')

print(df)
print()
print(df.sort_values(by=['Time'], ascending=False))
                    Name   Time  Level                pin
0          Thomas Edison    181    100              aspoi
1         Nicholas Tesla    613    200              brian
2   Alexander Grand Bell    440    123              23451
3            Eli Whitney    369    432                who
4         John Mortensen  36981    340               apcs
5    aj ruiz im soo cool     36      1       imreallycool
6         you the viewer     74      1  wow, your so cool
7                   aras      0      0               asdf
8                   1234      0      0               1234
9             le creator     17      0          imadethis
10           le creatorr    155      6  ineedtomakeupdate

                    Name   Time  Level                pin
4         John Mortensen  36981    340               apcs
1         Nicholas Tesla    613    200              brian
2   Alexander Grand Bell    440    123              23451
3            Eli Whitney    369    432                who
0          Thomas Edison    181    100              aspoi
10           le creatorr    155      6  ineedtomakeupdate
6         you the viewer     74      1  wow, your so cool
5    aj ruiz im soo cool     36      1       imreallycool
9             le creator     17      0          imadethis
7                   aras      0      0               asdf
8                   1234      0      0               1234
print(df[df.Level == df.Level.max()])
print()
print(df[df.Level == df.Level.min()])
          Name  Time  Level  pin
3  Eli Whitney   369    432  who

         Name  Time  Level        pin
7        aras     0      0       asdf
8        1234     0      0       1234
9  le creator    17      0  imadethis
  • Which of the following has the greatest potential for compromising a user’s personal privacy?
    Correct Answer: A group of cookies stored by the user’s Web browser
    My Answer: The user’s public key used for encryption

  • Of the following potential benefits, which is LEAST likely to be provided by the upgraded system?
    Correct Answer: The company will be able to provide a human representative for any incoming call.
    My Answer: Human representatives will not be needed to respond to some inquiries.

  • Which of the following code segments can be used to assign the intended string to newString?
    Correct Answer: newString ← substring(oldString, 3, len(oldString) - 4)

              tempString ← substring(oldString, 3, len(oldString) - 2)  
              newString ← substring(tempString, 1, len(tempString) - 2)  
    

    My Answer: newString ← substring(oldString, 3, len(oldString) - 4

  • When the robot reaches the gray square, it turns around and faces the bottom of the grid. Which of the following changes, if any, should be made to the code segment to move the robot back to its original position in the bottom-left square of the grid and facing toward the bottom of the grid?
    Correct Answer: No change is needed; the algorithm is correct as is.
    My Answer: Interchange the ROTATE_RIGHT and the ROTATE_LEFT blocks.

  • A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is located in an urban city. Which of the following best describes a limitation of using a simulation for this purpose?
    Correct Answer: The model used by the simulation software often omits details so that it is easier to implement.
    My Answer: Running a simulation requires more time to generate data from trials than observing the crowd exiting the arena at various events.

  • Based on the values in the table, which of the algorithms appear to run in reasonable time?
    Correct Answer: Algorithm A

              Algorithm D  
    

    My Answer: Algorithm B

         Algorithm D