Specification: Read sentences from the user until * is entered. Show the number of words in each sentence that contain a stretch of non-z characters with exactly 2 vowels. A stretch starts from the start of the word or after a 'z'. A stretch terminates just before another 'z' or at the end of the word. Examples: 1. Matching words: zoo, azozooza, GONZALEZ 2. Non-matching words: ozo, azoooza The sentences contain no punctuation, the words are separated by one or more spaces, and the characters may be upper or lower case. Keep reading sentences until the user enters "*". Sample I/O: Sentence: azoooza azooza zoo azoo Matching words = 3 Sentence: GONZALEZ passes the ball to VAZQUEZ Matching words = 3 Sentence: azozototzeti Matching words = 1 Sentence: * Done
Q: What do you think? The k=n+FCS difference between a dataword (k) and a codeword (n) is significant…
A: The Answer is in next step.
Q: Is there any information on the inventor of the multi-touch technology?
A: Definition: In the 1970s, multitouch technology was developed at CERN, MIT, the University of…
Q: Which cloud storage options are there?
A: Definition: Users may save and retrieve files online using Google Drive, a free cloud storage…
Q: Why should we be concerned with the technological and information management components of our…
A: Administrative, technical, and organisational Senior managers often choose to comprehend the three…
Q: . The following JavaScript statements will successfully log the values contained in thesnacksarray…
A: According to the Question below the Solution:
Q: What version of Linux is Ubuntu based on?
A: Ubuntu is a cross-platform, open-source operating system based on Debian(Linux Version), with an…
Q: In terms of delivering services, TCP is a stable and full duplex transport layer protocol…
A: Let's see the meaning of the terms full-duplex, connection-oriented, and dependable delivery in…
Q: What hardware is required to communicate between two or more computers? There are several network…
A: Introduction Network topology is the arrangement of the parts (connections, hubs, etc) of a…
Q: The symmetric multiprocessing system and the loosely linked design are equivalent when it comes to…
A: The symmetric multiprocessing arrangement and the loosely connected design are contrasted: A sort of…
Q: Writing in C++ language the FCFS CODE, to solve this problem. ARRIVAL 0 2 6 20 PROCESS TICKS A B с D…
A: FCFS stands for First Come First Serve, this CPU scheduling algorithm is a non preemptive algorithm…
Q: [Problem 1] Formally prove or disprove the following claims a) loga (n³) is O(n), for n ≥ 1 b) 3" is…
A: Solution: I provided solution for your claims please find below image:
Q: Is the internet beneficial to those with mental or physical disabilities? What advantages do you see…
A: A hearing aid that uses cognitive: Technology to track user brain activity and determine the sound…
Q: In general, character devices transmit data more quickly than block devices. Is this assertion true…
A: Character devices transmit data: Character devices may be input tools like a keyboard and mouse or…
Q: 2- Write step by step the output of the following list by applying the merge sort {6, 1, -3, 5, 10,…
A: Here is the step by step explanation of merge sort with data values.
Q: Describe your thoughts on the software structure review procedure using examples.
A: Introduction: Throughout the early phases of the Software Development Life Cycle, Software Review is…
Q: Which cloud storage options are there?
A: Cloud Storage: A cloud computing a provider who manages and runs data a storage as a service…
Q: During your job search, having a portfolio of your academic accomplishments might be beneficial (and…
A: The answer of the question is given below
Q: Invention of a computer monitor may be traced back to whom?
A: Invention of computer monitor traced back to Karl Ferdinand Braun in 1897 He created the cathode ray…
Q: Discussing the key aspects of how User and Group Schemas are implemented in a corporate environment.…
A: The schema is the blueprint for Active Directory data storage. Each Active Directory object is an…
Q: List 4 problems associated with the dataframe
A: Given CSV file consist of Raw data . you need to perform data cleaning for these data.
Q: Do persons with physical or mental disabilities benefit from having access to the internet? What…
A: The internet has helped people a lot and made people’s life much easier by enabling communication,…
Q: For a high-performance network, MPLS combines the richness of IP with the performance of ATM.
A: The Answer start from step-2.
Q: Do you know what the term "checkpoint" in SSIS means?
A: Here we have given a brief note on term checkpoint in SSIS. You can find the solution in step 2.
Q: Use examples to describe data manipulation, forgeries, and online jacking.
A: Data adjustment in accordance with need is known as data manipulation. It is mostly used in…
Q: A datapath only supported the register addressing mode. In this case, what component of the data…
A: Definition: When using register indirect addressing, the memory location where the data to be…
Q: What kind of communication protocol are you using when you ping your computer?
A: The answer of the question is given below
Q: Write a python program that takes two lists, merges the two lists, sorts the resulting list, and…
A: Given Sample output for python program:- Sample Input 1 list_one = [1, 2, 1, 4] list_two = [5, 4,…
Q: When it comes to data management, why is Microsoft Access preferable to Microsoft Excel?
A: The question has been answered in step2
Q: Which benefits and drawbacks come with caching disk write operations?
A: Increasing the speed of your program can be achieved by caching disk writes. The system functions by…
Q: What are the benefits and drawbacks of cloud storage?
A: The Answer of the question is given below
Q: Give an example of how the background process of calling inline functions differs from calling a…
A: Introduction: The function is a structured code block used to perform a single operation.They…
Q: If a firm is concerned about hackers stealing customer information, what measures should be in…
A: It is essential to every small or big firm to protect data of the user and data of the company.
Q: Define a structure named StudentResult to store the following data of the contestant in the archery…
A: The question has been answered in step2
Q: How does one go about setting up a cloud storage system?
A: A cloud storage system: May be designed to store just a certain kind of data, such digital images or…
Q: emble a client computer based on your programme of study (e.g. IT, CS, Business, etc.), discussing…
A: Answer: (a) As a computer which is normally powerful banner personal computer in order to select a…
Q: 2. If the contents of the page table are as follows: VPN PPN Valid 021 1 31 20 3 11 4 5 01 10 6-0 7…
A: (a) 0x1AE in decimal is 430 which on modulus by 8 (since there are 8 VPN given) gives 6. Since at…
Q: Are there any advantages and disadvantages to redoing the keyboards?
A: Given: When typing on a touch screen, you must use an on-screen keyboard, which is uncomfortable for…
Q: Write detailed description of how I/O devices work and how they are programmed ?
A: Computer System comprise of three components: Input Device: These device is use to enter user data…
Q: Are there any advantages and disadvantages to redoing the keyboards?
A: Given To know about the advantage and disadvantage to redoing the keyboards.
Q: Develop a program that implements a function named largerThanN that accepts three arguments: an…
A: C++ Program: #include<iostream>using namespace std; // function named largerThanN that accepts…
Q: What kind of communication protocol are you using when you ping your computer?
A: ICMP - Internet Control Message Protocol Ping works by sending an Internet Control Message…
Q: What advantages SSDs have over rotating disks ?
A: The circular disc on which magnetic data is kept in a hard disc drive is called a platter (or disc).…
Q: Q3. Let Σ = {a, b}. Let BDFA = {(M) M is a DFA that accepts some string containing an equal number…
A: Here we have given solution for the given problem, You can find the solution in step 2.
Q: What are ethical issues in cyberspace and IT society on the basis of Kantainism, Act utilitainism,…
A: Ethical issues in cyberspace and IT society:- On the basis of Kaintainism:- Kaintainism theory…
Q: Could you provide any examples of how the software structure review process' particular phases are…
A: In the SDLC or the Software development life cycle, the system inspection is taken care by more than…
Q: Who are Mark Dean's biological parents?
A: Mark E. Dean is an American inventor and computer engineer. He developed the ISA bus, and he led a…
Q: What impact will new developments in artificial intelligence have on the future? What kind of…
A: Introduction:Machines have been given the ability to learn from the data they collect in artificial…
Q: The word "local area network" should be defined.
A: local area network" A group of the devices connected to one another in a single physical location,…
Q: Which kind of program-level parallelism, control or data, is more appropriate for SIMD? What kind of…
A: Parallelism at the programme level: Program-level parallelism is the process of decentralizing a…
Q: Definitions of acidosis and alkalosis are provided. In this system, what role do buffers play?
A: Buffers:- A buffer is a substance that prevents a solution's pH from changing when an acid or base…
Step by step
Solved in 4 steps with 2 images
- Q: Write regular expression for the following languages. All strings in which b is never tripled. It means that no words contain the substring bb. All the strings accepting b as second letter. Regular expression that accept only prime numbers. All the strings that start with aa, end with bb, and have alternating substrings ba in between. Language of all those strings with length greater than 3String Pair // Problem Description // One person hands over the list of digits to Mr. String, But Mr. String understands only strings. Within strings also he understands only vowels. Mr. String needs your help to find the total number of pairs which add up to a certain digit D. // The rules to calculate digit D are as follow // Take all digits and convert them into their textual representation // Next, sum up the number of vowels i.e. {a, e, i, o, u} from all textual representation // This sum is digit D // Now, once digit D is known find out all unordered pairs of numbers in input whose sum is equal to D. Refer example section for better understanding. // Constraints // 1 <= N <= 100 // 1 <= value of each element in second line of input <= 100 // Number 100, if and when it appears in input should be converted to textual representation as hundred and not as one hundred. Hence number…CODING LANGUAGE: R (similar to python) R is a programming language for statistical computing and graphics supported by the R Core Team and the R Foundation for Statistical Computing. The Behdel TestThe Bechdel test asks whether a work of fiction features at least two women who talk to each otherabout something other than a man, and there must be two women named characters.In this mini analysis we work with the data used in the FiveThirtyEight story titled:"The Dollar-And-Cents Case Against Hollywood's Exclusion of Women"https://fivethirtyeight.com/features/the-dollar-and-cents-case-against-hollywoods-exclusion-of-women/Start with loading the packages: fivethirtyeight, tidyverse1. What information does this dataset contain? What commands did you use to see this?For our purposes of analysis we will focus our analysis on movies released between 1990 and 2013.bechdel90_13 <- bechdel %>%filter(between(year, 1990, 2013))2. How many movies are in our filtered data set?The…
- Treasure Hunter description You are in front of a cave that has treasures. The cave canrepresented in a grid which has rows numbered from 1to , and of the columns numbered from 1 to . For this problem, define (?, )is the tile that is in the -th row and -column.There is a character in each tile, which indicates the type of that tile.Tiles can be floors, walls, or treasures that are sequentially representedwith the characters '.' (period), '#' (hashmark), and '*' (asterisk). You can passfloor and treasure tiles, but can't get past wall tiles.Initially, you are in a tile (??, ). You want to visit all the treasure squares, andtake the treasure. If you visit the treasure chest, then treasurewill be instantly taken, then the tile turns into a floor.In a move, if you are in a tile (?, ), then you can move tosquares immediately above (? 1, ), right (?, + 1), bottom (? + 1, ), and left (?, 1) of thecurrent plot. The tile you visit must not be off the grid, and must not be awall patch.Determine…9. Write a program that reads from the user a sentence. The program should count the number of occurrences of the character 'a' in the sentence. 10. Write a program that reads from the user 10 words. The program then should count and print the number of words that start with character 'a'.Target The aim of this work is to use control structures and loops. Read carefully the problem and understand what needs to be done. Read your description is given and when you understand how it works, then start designing its solution and its implementation on the computer applying the syntax and semantics of the language Java programming. Write a LongestDupSubstring.java program that accepts a string as input and compute and print the longest sub-string displayed in two times without overlap (see 5th example for overlap). If there are more from one of such sub-strings, the program displays the first one it finds as well the number of characters in the substring. If there is no substring that appears 2 times, then the program will not print anything. Execution examples (the user's input is red and the longer in length 2 substrings) 1 Example Give a string: again and again Longest substring: again Longest substring size: 5 2 Example Give a string: seven saints and seven dinners Longest…
- Incorrect Question 3 Consider: String s1 = "a"; What is the difference between: (A) String s2 And: (B) = s1; String s2 = new String(s1); (B) assigns a reference to the original "a" to s2 (B) is not allowed O (A) assigns a reference to the original "a" to s2 No differenceAlphabetic Telephone Number TranslatorMany companies use telephone numbers like 555-GET-FOOD so the number is easier for theircustomers to remember. On a standard telephone, the alphabetic letters are mapped to numbers519in the following fashion:A, B, and C = 2D, E, and F = 3G, H, and I = 4J, K, and L = 5M, N, and O = 6P, Q, R, and S = 7T, U, and V = 8W, X, Y, and Z = 9Write a program that asks the user to enter a 10-character telephone number in the format XXXXXX-XXXX. The application should display the telephone number with any alphabeticcharacters that appeared in the original translated to their numeric equivalent. For example, ifthe user enters 555-GET-FOOD, the application should display 555-438-3663 For the attached assignment, write a python program, you also need to write: Comments for all the values, constants, and functions IPO Variables Pseudcodes = "abab" h 55m Left Substrings in s are { 'a', 'b', 'a', 'b', 'ab', 'ba', 'ab', 'aba', 'bab', 'abab'}. By deleting one "a" and one "b", the string becomes "ab" or "ba" and all of its substrings are distinct. This required 17. String Reduction 2 deletions. Given a string, reduce it in such a way that all of its substrings are distinct. To do so, you may delete any characters at any ALL index. What is the minimum number of deletions needed? Function Description Complete the function getMinDeletions in the editor below. Note: A substring is a contiguous group of 1 or more characters within a string. getMinDeletions has the following parameter(s): Example string s: the given string 8 S = "abab" Returns: int: the minimum number of deletions required Substrings in s are { 'a', 'b', 'a', 'b', 'ab', 'ba', 'ab', 'aba', 'bab', 'abab'}. By deleting one "a" and one "b", the string becomes "ab" or "ba" and all of its substrings are distinct. This required Constraints 2 deletions. 10 1sns 105…
- Maze represents a maze of characters. The goal is to get from the * top left corner to the bottom right, following a path of 1’s. Arbitrary * constants are used to represent locations in the maze that have been TRIED * and that are part of the solution PATH.9-13. Substring: Complete the following code to check if str2 with length strlen2 is a substring of str1 with length strlen1. Examples: str1=flower, str2=low (low is a substring of flower) str1=flower, str2=law (law is not a substring of flower) Algorithm: 1. Find the first character of str2 in str1. 2. If not found, str2 is not a substring of str1, else compare the remaining characters. 3. If all remaining characters matched, str2 is a substring of str1. Else, str2 is not a substring of strl. cld mov rcx, qword [strlenl] 9. 10. 11. cmp rcx, 0 je not Substring mov rcx, qword [strlen2] dec rcx 12. inc rsi 13. cmp rcx, 0 je substring jmp notSubstringSoundex System Soundex is a system that encodes a word into a letter followed by three digtis that roughly describe how the word sounds. That is, similar sounding words have similar four-character codes. For instance, the words carrot and caret are both coded as C123. A slight variation of the Soundex coding algorithm is as follows: 1. Retain the first letter. 2. For the remaining letters, delete all occurrences of a, e, i, o, u, h, y, and w. 3. Replace the letters that remain with numbers so that (a) b, f, p, and v become 1 (b) c, g, j, k, q, s, x, and z become 2 (c) d and t both become 3 (d) l (that is, el) becomes 4 (e) m and n become 5 (f) r becomes 6 4. If the result contains two adjacent identical digits, eliminate the second of them. 5. Keep only the first four characters of what you have left. If you have fewer than four, then add zeros on the end to make the string have length four. Write a program that carries out the algorithm. See Fig. 6.86.