Specification: Read sentences from the user until * is entered. Show the number of words in each sentence that contain a stretch of non-z characters with exactly 2 vowels. A stretch starts from the start of the word or after a 'z'. A stretch terminates just before another 'z' or at the end of the word. Examples: 1. Matching words: zoo, azozooza, GONZALEZ 2. Non-matching words: ozo, azoooza The sentences contain no punctuation, the words are separated by one or more spaces, and the characters may be upper or lower case. Keep reading sentences until the user enters "*". Sample I/O: Sentence: azoooza azooza zoo azoo Matching words = 3 Sentence: GONZALEZ passes the ball to VAZQUEZ Matching words = 3 Sentence: azozototzeti Matching words = 1 Sentence: * Done
Q: Mark Dean lives in what city?
A: Answer the above question are as follows
Q: Describe the idea of unit-by-unit testing.
A: Explain the concept of unit testing. Unit Testing: Unit testing is one of the various software…
Q: Are operational systems in data warehouses possible?
A: Operational Systems: Data warehousing uses the phrase "operational system" to describe a system that…
Q: What are Connecting I/O Devices to computer ?
A: An input/output device, sometimes known as an IO device or simply an IO, is any hardware that allows…
Q: What is the name of the SSH client file that a server administrator uses to set up the public key in…
A: Basics: A cryptographic protocol known as Secure Shell is used to operate business functions…
Q: According to Mukherjee, the fundamental foundation of sustainable futures may be the human…
A: Launch: In Physical Sciences, natural occurrences are observed and examined. A math model is then…
Q: Explain the differences between a random forest and a decision tree in one or a few words at most.…
A: The answer of the question is given below
Q: Describe the differences between a task, a job, and a person that the SAP ERP system makes.
A: Introduction: Software for enterprise resource planning, or SAP ERP, was created by SAP SE.…
Q: [Problem 10] Run the Dijkstra's algorithm on the following directed graph and find all shortest…
A:
Q: Local area networks (LANs) have several advantages.
A: LAN or Local Area Network is a type of network which is setup in small area usually below 1.5 Km. It…
Q: A for construct is a loop that handles a list of items. So long as there are items to process, it…
A: Introduction: A for construct is a loop that handles a list of items. So long as there are items to…
Q: What is mobile forensics What are the phases of mobile forensic What are the mobile forensic tools…
A: About Mobile forensics:…
Q: A datapath only supported the register addressing mode. In this case, what component of the data…
A: Definition: When using register indirect addressing, the memory location where the data to be…
Q: Counting the growth rings of a tree is a good way to tell the age of a tree. Each growth ring counts…
A: Solution: The question given that Counting the growth rings of a tree is a good way to tell the age…
Q: 2- Write step by step the output of the following list by applying the merge sort {6, 1, -3, 5, 10,…
A: Here is the step by step explanation of merge sort with data values.
Q: B 1 A 1 00 2 40 D E F 10
A: Dijkstra's Algorithm is used to find the shortest paths between given source vertex S and all…
Q: What does a wireless network's "infrastructure mode" entail? If the network is not operating in…
A: Wireless network infrastructure mode and additional modes of operation: Each wireless host is linked…
Q: What are some of the advantages of cloud storage
A: Online storage: Cloud storage is the term used in computer science to describe computer systems that…
Q: Integrating technology-wide and application-specific safeguards is a primary focus of the…
A: Controls: The Integrated Framework has two different forms of control, namely general control and…
Q: Writing in JAVA language the FCFS CODE, to solve this problem. PROCESS TICKS A B с D 7 3 12 4…
A: Here's the code:
Q: Invention of a computer monitor may be traced back to whom?
A: Karl Ferdinand Braun invented the first computer monitor in 1897. Karl Ferdinand invented the…
Q: Is there a connection between a person's physical and cultural development and their learning…
A: The answer of the question is given below
Q: When scanning ports, how much interaction is there between the three-way handshake and the four…
A: Introduction: The network that the network administrator was in charge of was mapped out using it.…
Q: What are the underlying principles of information systems, and how do they assist organizations in…
A: Information systems include: 1. Transaction Processing Systems: Necessary for operational data…
Q: Is this a true statement or a false statement? As compared to corporate systems, supply chain…
A: The Answer start from step-2.
Q: What are some examples of the technological, administrative, and organizational parts of an…
A: Considerations about organisation, administration, and technology Most of the time, senior…
Q: When it comes to data management, why is Microsoft Access preferable to Microsoft Excel?
A: Microsoft access and excel both are the important applications but their usage are according to the…
Q: Suppose we have a 16-bit main memory address and 32 blocks of cache memory accessible on a…
A: The structure of virtual memory: Caches and RAM make up the contemporary computer system's memory…
Q: Q2. Consider the problem of determining whether a two-tape Turing machine ever writes a nonblank…
A: ANSWER:-
Q: It is widely acknowledged that creating appropriate security policies and consistently enforcing…
A: Security policy A security policy is a record that states in writing the way in which an…
Q: Multiprocessing: what is it and how does it function?
A: Multiprocessing:- Multiprocessing is the ability of a system to run multiple processors at one…
Q: Please write a C-program that first reads an integer representing the current population of the…
A: The C program is given below with code and output screenshot All the Best ?
Q: A. The regular expression/\b\$\d+/gwill match words beginning with a dollar sign and one or more…
A: (A) False, as the regular expression is given as : "/ ^\ $/", which will replace our dollar symbol…
Q: In the early days of computing, vacuum tubes were a critical component.
A: Introduction: The history of computing extends further back in time than the history of computing…
Q: Which of the following parameters are required for the certificate template that will be used for…
A: IKEv2: IKEv2 stands for lnternet Key Exchange Version 2. It is a VPN encryption protocol responsible…
Q: [Problem 9] Starting at vertex A, run Prim's algorithm on the following graph. You do not need to…
A:
Q: The following options are provided by Microsoft Excel as potential substitutes. Explain the workings…
A: Answer :- Hello student I will explain all things in detaile
Q: What are the differences between a standard server and a cloud server
A: The answer is in step 2
Q: What merits does the internet have as one of the apex ICTs? Do specific details and reasons have to…
A: Definition: Communication over the internet saves time and money. This is due to the fact that…
Q: How long should the ping utility take to respond on a local area network?
A: Introduction: Ping is the central TCP/IP command for troubleshooting connection, reachability, and…
Q: If the are n devices in a mesh topology network the the total number of duplex links are?
A: Mesh topology: A network configuration known as a mesh topology has devices such as computers and…
Q: unction [ ] = square_spectrum( L,N ) %Activity 1 for CEN415 Summer 2022 x=linspace(0,2*L,200);…
A: The graph is given below
Q: Cells B1, C1, and D1 contain the values Seat1Row1, Seat2Row1, and Seat3Row1. If cells B1, C1, and D1…
A: Auto-fill in Excel: This feature in Excel is used to fill a cell or a range of cells with value(s)…
Q: We have a byte-addressable computer with 16-bit main memory addresses and 32 blocks of cache memory…
A: (a)The size of the offset field is 4 bytes. (b) The pixel dimensions of the tag field are 8x8.
Q: Let FA1 accept L₁ and let FA2 accept L2. Briefly describe an effective procedure that can be used to…
A:
Q: Explain the Performance characteristics of a commercial solid state disk ?
A: Solid-state drives, or SSDs, are a form of storage component found in computers. Persistent data is…
Q: Exactly what is the difference between a modem, a router, and anything else?
A: MODEM: A modem is a gadget that regulates and demodulates the electric sign and keeps a devoted…
Q: What exactly is dynamic scoping, when is it used, and how can its performance be improved?
A: Adaptive scoping: The dynamic is defined as evolving. A concept called "dynamic scoping" uses the…
Q: True or false, and briefly explain your response to each of the following statements: When the…
A: The statement is true. If the transmitter and receiver window sizes are both 1, the alternating-bit…
Q: 5. Draw Olympic Rings. O (a) Write a Java program that displays the 5 rings of different colors as…
A: The answer is given below, the code implementation is done in Java programming language and the text…
Python Code:
Step by step
Solved in 2 steps with 1 images
- String Pair // Problem Description // One person hands over the list of digits to Mr. String, But Mr. String understands only strings. Within strings also he understands only vowels. Mr. String needs your help to find the total number of pairs which add up to a certain digit D. // The rules to calculate digit D are as follow // Take all digits and convert them into their textual representation // Next, sum up the number of vowels i.e. {a, e, i, o, u} from all textual representation // This sum is digit D // Now, once digit D is known find out all unordered pairs of numbers in input whose sum is equal to D. Refer example section for better understanding. // Constraints // 1 <= N <= 100 // 1 <= value of each element in second line of input <= 100 // Number 100, if and when it appears in input should be converted to textual representation as hundred and not as one hundred. Hence number…Q: Write regular expression for the following languages. All strings in which b is never tripled. It means that no words contain the substring bb. All the strings accepting b as second letter. Regular expression that accept only prime numbers. All the strings that start with aa, end with bb, and have alternating substrings ba in between. Language of all those strings with length greater than 3CODING LANGUAGE: R (similar to python) R is a programming language for statistical computing and graphics supported by the R Core Team and the R Foundation for Statistical Computing. The Behdel TestThe Bechdel test asks whether a work of fiction features at least two women who talk to each otherabout something other than a man, and there must be two women named characters.In this mini analysis we work with the data used in the FiveThirtyEight story titled:"The Dollar-And-Cents Case Against Hollywood's Exclusion of Women"https://fivethirtyeight.com/features/the-dollar-and-cents-case-against-hollywoods-exclusion-of-women/Start with loading the packages: fivethirtyeight, tidyverse1. What information does this dataset contain? What commands did you use to see this?For our purposes of analysis we will focus our analysis on movies released between 1990 and 2013.bechdel90_13 <- bechdel %>%filter(between(year, 1990, 2013))2. How many movies are in our filtered data set?The…
- Treasure Hunter description You are in front of a cave that has treasures. The cave canrepresented in a grid which has rows numbered from 1to , and of the columns numbered from 1 to . For this problem, define (?, )is the tile that is in the -th row and -column.There is a character in each tile, which indicates the type of that tile.Tiles can be floors, walls, or treasures that are sequentially representedwith the characters '.' (period), '#' (hashmark), and '*' (asterisk). You can passfloor and treasure tiles, but can't get past wall tiles.Initially, you are in a tile (??, ). You want to visit all the treasure squares, andtake the treasure. If you visit the treasure chest, then treasurewill be instantly taken, then the tile turns into a floor.In a move, if you are in a tile (?, ), then you can move tosquares immediately above (? 1, ), right (?, + 1), bottom (? + 1, ), and left (?, 1) of thecurrent plot. The tile you visit must not be off the grid, and must not be awall patch.Determine…9. Write a program that reads from the user a sentence. The program should count the number of occurrences of the character 'a' in the sentence. 10. Write a program that reads from the user 10 words. The program then should count and print the number of words that start with character 'a'.Target The aim of this work is to use control structures and loops. Read carefully the problem and understand what needs to be done. Read your description is given and when you understand how it works, then start designing its solution and its implementation on the computer applying the syntax and semantics of the language Java programming. Write a LongestDupSubstring.java program that accepts a string as input and compute and print the longest sub-string displayed in two times without overlap (see 5th example for overlap). If there are more from one of such sub-strings, the program displays the first one it finds as well the number of characters in the substring. If there is no substring that appears 2 times, then the program will not print anything. Execution examples (the user's input is red and the longer in length 2 substrings) 1 Example Give a string: again and again Longest substring: again Longest substring size: 5 2 Example Give a string: seven saints and seven dinners Longest…
- Incorrect Question 3 Consider: String s1 = "a"; What is the difference between: (A) String s2 And: (B) = s1; String s2 = new String(s1); (B) assigns a reference to the original "a" to s2 (B) is not allowed O (A) assigns a reference to the original "a" to s2 No differenceAlphabetic Telephone Number TranslatorMany companies use telephone numbers like 555-GET-FOOD so the number is easier for theircustomers to remember. On a standard telephone, the alphabetic letters are mapped to numbers519in the following fashion:A, B, and C = 2D, E, and F = 3G, H, and I = 4J, K, and L = 5M, N, and O = 6P, Q, R, and S = 7T, U, and V = 8W, X, Y, and Z = 9Write a program that asks the user to enter a 10-character telephone number in the format XXXXXX-XXXX. The application should display the telephone number with any alphabeticcharacters that appeared in the original translated to their numeric equivalent. For example, ifthe user enters 555-GET-FOOD, the application should display 555-438-3663 For the attached assignment, write a python program, you also need to write: Comments for all the values, constants, and functions IPO Variables PseudcodeMaze represents a maze of characters. The goal is to get from the * top left corner to the bottom right, following a path of 1’s. Arbitrary * constants are used to represent locations in the maze that have been TRIED * and that are part of the solution PATH.
- s = "abab" h 55m Left Substrings in s are { 'a', 'b', 'a', 'b', 'ab', 'ba', 'ab', 'aba', 'bab', 'abab'}. By deleting one "a" and one "b", the string becomes "ab" or "ba" and all of its substrings are distinct. This required 17. String Reduction 2 deletions. Given a string, reduce it in such a way that all of its substrings are distinct. To do so, you may delete any characters at any ALL index. What is the minimum number of deletions needed? Function Description Complete the function getMinDeletions in the editor below. Note: A substring is a contiguous group of 1 or more characters within a string. getMinDeletions has the following parameter(s): Example string s: the given string 8 S = "abab" Returns: int: the minimum number of deletions required Substrings in s are { 'a', 'b', 'a', 'b', 'ab', 'ba', 'ab', 'aba', 'bab', 'abab'}. By deleting one "a" and one "b", the string becomes "ab" or "ba" and all of its substrings are distinct. This required Constraints 2 deletions. 10 1sns 105…9-13. Substring: Complete the following code to check if str2 with length strlen2 is a substring of str1 with length strlen1. Examples: str1=flower, str2=low (low is a substring of flower) str1=flower, str2=law (law is not a substring of flower) Algorithm: 1. Find the first character of str2 in str1. 2. If not found, str2 is not a substring of str1, else compare the remaining characters. 3. If all remaining characters matched, str2 is a substring of str1. Else, str2 is not a substring of strl. cld mov rcx, qword [strlenl] 9. 10. 11. cmp rcx, 0 je not Substring mov rcx, qword [strlen2] dec rcx 12. inc rsi 13. cmp rcx, 0 je substring jmp notSubstringuctirst(); function: O a. converts all letters into upper case O b.converts first letter into uppercase Oc. converts first letter into lower case O d. converts all letters into lower case t of