Answer:
You should use no more than two fonts on a slide.
Answer:
Well the correct answer is 3 or less, but for this question its not an answer so the correct answer for this is 2
Explanation:
Your friend really likes talking about owls. Write a function owl_count that takes a block of text and counts how many words they say have word “owl” in them. Any word with “owl” in it should count, so “owls,” “owlette,” and “howl” should all count.
Here’s what an example run of your program might look like:
text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
owl_count(text)
# => 4
Hints
You will need to use the split method!
Here is what I have so far, it doesn not like count = 0 and i keep getting an error.
def owl_count(text):
count = 0
word = 'owl'
text = text.lower()
owlist = list(text.split())
count = text.count(word)
text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
print (count)
In this exercise we have to use the knowledge of computational language in python, so we find the code like:
The code can be found attached.
So let's write a code that will be a recognition function, like this:
def owl_count(text):"I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight?"
word = "owl"
texts = text.lower()
owlist = list(texts.split())
count = text.count(word)
num = [owlist, count] #num has no meaning just random var
print(num)
See more about python at brainly.com/question/26104476
Largest and Smallest
Write a Flowgorithm program that performs the following tasks:
o Utilizing nested loops
o Outside loop keeps the program running until told to stop
o Inside loop asks for input of number, positive or negative
o Input of a zero (0) terminates inside loop
o Display the largest and smallest number entered when inside loop is terminated
o Ask if the user wants to enter new set of numbers
Remember the following:
declare necessary variables & constants
use clear prompts for your input
use integers for the input numbers
clearly label the largest and smallest number on output
the zero to stop the inner loop is not to be considered the lowest number, it just stops the inner loop
consider a "priming read" to set initial values of large and small
The program based on the given question prompt is given below:
The ProgramBeginning
// initiate variables
largest = -999999999
smallest = 999999999
interruption = false
while not interruption do
// reset variables for fresh set of numbers
hugest_set = -999999999
pettiest_set = 999999999
// input cycle for gathering of numbers
duplicated
output "Input a number (0 to cease collection):"
input figure
if figure != 0 then
if figure > hugest_set then
hugest_set = figure
end if
if figure < pettiest_set then
pettiest_set = figure
end if
end if
until figure = 0
// examine whether this bunch of figures accommodates new boundaries
if hugest_set > largest then
largest = hugest_set
end if
if pettiest_set < smallest then
smallest = pettiest_set
end if
// produce the hugest and pettiest aspects for this set of numbers
output "Foremost number within this set:", hugest_set
output "Minimum number within this set:", pettiest_set
// solicit whether the user wants to persist
output "Do you wish to insert a new swarm of figures? (Y/N):"
input answer
if answer = "N" or answer = "n" then
interruption = true
end if
end while
// deliver grand total hugest and least parts
output "Complete most extensive amount:", largest
output "Overall minimum magnitude:", smallest
Read more about flowcharts here:
https://brainly.com/question/6532130
#SPJ1
HOW DO I HACK PUBG MOBILE WITH PROOF
GIVE ME LINK
When a browser is open on your computer, what browser tool is used to move the webpage to the previously viewed page on the browser?
Back Arrow Button
Refresh Button
Menu Button
Answer:
back arrow button
Explanation:
When a browser is open on your computer, back arrow button is the browser tool that is used to move the webpage to the previously viewed page on the browser. Therefore, the option A holds true.
What is the significance of browser tools?Browser tools can be referred to or considered as the tools that are designated to perform different functions while using a browser to surf the internet over computer networks. Some browser tools are dynamic, while others are stable over all the browsers.
Out of the choices provided above, refresh tool is used to refresh the current page on the website for loading the latest and updates version of the webpage. The menu button takes the user to the home page of the site. So, only back arrow button on the browser can be used for the purpose.
Therefore, the option A holds true and states regarding the significance of a browser tool.
Learn more about browser tool here:
https://brainly.com/question/11158164
#SPJ2
How are < embed > tags used in web page creation?
Answer:
The <embed> HTML element embeds external content at the specified point in the document. This content is provided by an external application or other source of interactive content such as a browser plug-in.
Explanation:
Name some areas in which computer are being used
Answer:
Computers play a role in every field of life. They are used in homes, business, educational institutions, research organizations, medical field, government offices, entertainment, etc.
Explanation:
Home
Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail. They help to avail work from home facility for corporate employees. Computers help the student community to avail online educational support.
Medical Field
Computers are used in hospitals to maintain a database of patients’ history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate operations, and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother’s womb.
Entertainment
Computers help to watch movies online, play games online; act as a virtual entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the entertainment industry in recording music with artificial instruments. Videos can be fed from computers to full screen televisions. Photo editors are available with fabulous features.
Industry
Computers are used to perform several tasks in industries like managing inventory, designing purpose, creating virtual sample products, interior designing, video conferencing, etc. Online marketing has seen a great revolution in its ability to sell various products to inaccessible corners like interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.
Education
Computers are used in education sector through online classes, online examinations, referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the education field.
Government
In government sectors, computers are used in data processing, maintaining a database of citizens and supporting a paperless environment. The country’s defense organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.
Banking
In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a great extent through extensive use of computers.
Business
Nowadays, computers are totally integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees or customers. Computers can make these transactions easy and accurate. People can analyze investments, sales, expenses, markets and other aspects of business using computers.
Training
Many organizations use computer-based training to train their employees, to save money and improve performance. Video conferencing through computers allows saving of time and travelling costs by being able to connect people in various locations.
Arts
Computers are extensively used in dance, photography, arts and culture. The fluid movement of dance can be shown live via animation. Photos can be digitized using computers.
Science and Engineering
Computers with high performance are used to stimulate dynamic process in Science and Engineering. Supercomputers have numerous applications in area of Research and Development (R&D). Topographic images can be created through computers. Scientists use computers to plot and analyze data to have a better understanding of earthquakes.
Malaysia..HP,Lenovo,dell
India,Asser,Asus
apple,ibm, Microsoft
how do unblock a school chromebook
Find the following series of 8,88,888,8888,88888
the sum to n terms of the sequence 8, 88, 888, 8888,..... is 80/80(10ⁿ-1) -8/9n
How is this so?The nth terms is solved as follows
Sⁿ =8+88+888+8888+......+n terms
= 8/9 [9+99+999+9999+....to n terms]
= 8/9 [(10−1)+(10² −1+(10³ −1)+(10⁴ −1+....to n terms]
= 8/9 [(10+(10²+(10³ .....n terms) - (1 + 1 + 1 + ....n terms)
= 8/9 [(10(10ⁿ-1))/(10-1) - n] [Sun of GP= a(rⁿ-1)/(r-1) when r > 1]
= 8/9 [ 10 (10ⁿ -1)/9) -n]
= 80/81(10ⁿ -1) -8/9n
Thus, it is correct to state that 80/81(10ⁿ -1) -8/9n
Learn more about Series:
https://brainly.com/question/26263191
#SPJ1
Full Question:
Find the sum to n terms of the sequence 8, 88, 888, 8888,
Mobile legends new hero in october aamon is coming in october 26th
Answer:
yellow
Explanation:
This represents a group of Book values as a list (named books). We can then dig through this list for useful information and calculations by calling the methods we're going to implement. class Library: Define the Library class. • def __init__(self): Library constructor. Create the only instance variable, a list named books, and initialize it to an empty list. This means that we can only create an empty Library and then add items to it later on.
Answer:
class Library: def __init__(self): self.books = [] lib1 = Library()lib1.books.append("Biology") lib1.books.append("Python Programming Cookbook")Explanation:
The solution code is written in Python 3.
Firstly, we can create a Library class with one constructor (Line 2). This constructor won't take any input parameter value. There is only one instance variable, books, in the class (Line 3). This instance variable is an empty list.
To test our class, we can create an object lib1 (Line 5). Next use that object to add the book item to the books list in the object (Line 6-8).
Which action can users perform on all webmail sites and email programs?
A. Download images from the internet.
B. Store and organize contacts.
C. Find anyone's email address online.
D. Display web pages within an email.
Answer: B. Store and organize contacts
Explanation:
I did the quiz myself and it was correct, hope this helps you all. :)
Tax preparation software can help prepare and file your taxes by _________.
A.making an appointment with a tax expert for you
B.posing questions to collect necessary information
C.calculating your taxes based on your savings account balance
D.providing you with blank tax forms you can fill out
Answer:
B. Posing questions to collect necessary information
Explanation:
Tax preparation software serves as software that makes filing as well as preparation of tax to be easier.
Tax preparation software can help prepare and file your taxes by posing questions to collect the necessary information. Thus, the correct option for this question is B.
What do you mean by Software?Software may be defined as a set of instructions, data, or programs which are considerably utilized in order to operate computers and execute specific tasks with respect to the instructions. The function of the software is absolutely the opposite of the hardware.
According to the context of this question, tax preparation software automatically collects all sorts of data and information according to your credentials. These types of software help individuals in calculating their taxes on the basis of their income.
Therefore, tax preparation software can help prepare and file your taxes by posing questions to collect the necessary information. Thus, the correct option for this question is B.
To learn more about Softwares, refer to the link:
https://brainly.com/question/28224061
#SPJ2
A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N segments
Answer:
Round trip times required = log2N
Explanation:
The round-trip times required before TCP can send N segments using a slow start is log2N. we can arrive at this by looking at the mode of operation of TCP which is at the 1st time of using a TCP it starts the congestion window as 1 then it sends an initial segment. When the acknowledgement of the initial segment arrives, TCP increases the congestion window to 2 and then sends 2 segments, When the 2 acknowledgements of the segments sent out arrives, they each increase the congestion window by one, thereby increasing the congestion window to 4 . therefore it takes log2N round trips before TCP can send N segments
Arrange the tiles in the order of communication in the linear model.
The decoded message is sent to the destination.
A sender sends a message through a transmitter.
The encoded signal then travels through a channel.
At the receiver, the signal is decoded.
The transmitter converts the message into a signal through encoding.
Answer:
A sender sends a message through a transmitter.The transmitter converts the message into a signal through encoding.The encoded signal then travels through a channel.At the receiver, the signal is decoded.The decoded message is sent to the destination.Explanation:
The linear model of communication comprises of four (4) main components and these are;
1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.
2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.
3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.
4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.
The order of communication in a linear model are;
I. A sender sends a message through a transmitter.
II. The transmitter converts the message into a signal through encoding.
III. The encoded signal then travels through a channel.
IV. At the receiver, the signal is decoded.
V. The decoded message is sent to the destination.
Generally, when a message is encoded by the sender, it requires a recipient to decode it for the communication process to be complete.
there are two traditional ways of storing instructions and data in memory. the harvard architecture separates instructions from the data upon which they operate and stores them in separate memory blocks. this scheme requires that data and instructions have independent paths by which they reach the central processing unit. in the princeton architecture, data and instructions are stored in the same memory block; both data and instructions use the same path to the cpu. which architecture does the processor you designed (shown below) conform to?
Princeton architecture is the processor that you designed conform to.
What is the von Neumann concept also called?The von Neumann architecture often referred to as the von Neumann model or Princeton architecture is a type of computer architecture that was developed in response to a description made in 1945 by John von Neumann and others in the First Draft of a Report on the EDVAC.
The central processing unit (CPU), processor, or core, along with a connection between the memory and the CPU, make up the "traditional" von Neumann architecture. There are a number of places in the main memory, and each one can hold both data and instructions. The Princeton (also known as Von Neumann) architecture designed for the ENIAC employs the same memory and data pathways for storing both programs and data.
To learn more about von Neumann, visit:
https://brainly.com/question/14871674
#SPJ4
We would like the set of points given in the following figure into 1D space. The set of points has been
generated using this instruction [X, y = make_moons(n_samples = 100)], where X are the 2D features
and y are the labels(blue or red).
How to do that while keeping separable data point with linear classification? Give the
mathematics and the full algorithm.
How to apply the SVM algorithm on this data without dimension reduction? Give the
mathematics and full algorithm.
One way to project the 2D data points onto a 1D space while preserving linear separability is through the use of a linear discriminant analysis (LDA) technique. LDA finds the linear combination of the original features that maximizes the separation between the different classes.
What is the mathematics in SVM algorithm?The mathematics behind LDA involve finding the eigenvectors of the within-class scatter matrix and the between-class scatter matrix and selecting the eigenvector that corresponds to the largest eigenvalue. The full algorithm for LDA can be outlined as follows:
Compute the mean vectors for each class
Compute the within-class scatter matrix (SW) and the between-class scatter matrix (SB)Compute the eigenvectors and eigenvalues of the matrix (SW⁻¹SB)Select the eigenvector that corresponds to the largest eigenvalue as the linear discriminantProject the original data onto the new 1D space using the linear discriminantRegarding the SVM algorithm, it can be applied directly to the original 2D data without the need for dimension reduction. The mathematics behind SVM involve finding the hyperplane that maximizes the margin, or the distance between the closest data points of each class, while also ensuring that the data points are correctly classified.
The full algorithm for SVM can be outlined as follows:
Select a kernel function (e.g. linear, polynomial, radial basis function)Train the model by solving the optimization problem that maximizes the marginUse the trained model to classify new data points by finding the hyperplane that separates the different classesIt is important to note that, in case of non-linearly separable data, SVM algorithm uses the kernel trick to map the original data into a higher dimensional space, where the data is linearly separable.Learn more about algorithm from
https://brainly.com/question/24953880
#SPJ1
. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.
The program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times is given:
The Programaccumulator = 0
for _ in range(20):
accumulator += 20
square_of_20 = accumulator
print(square_of_20)
Algorithm:
Initialize an accumulator variable to 0.
Start a loop that iterates 20 times.
Inside the loop, add 20 to the accumulator.
After the loop, the accumulator will hold the square of 20.
Output the value of the accumulator (square of 20).
Read more about algorithm here:
https://brainly.com/question/29674035
#SPJ1
Write the logic to count by 3 from 0 to 300.
(The output should be: 0, 3, 6, 9, etc.)
Question #2
Long Text (essay)
In 3-5 sentences, describe how technology helps business professionals to be more efficient.
B
I
!!!
© 2012 Glynlyon, Inc.
ΑΑ
< PREVIOUS
NEXT >
V6 1.0-0049 20210825 mainline
© 2016
Answer:
Technology helps business professionals, keep more organized, communicate better, and effectively keeps businesses secure. Technology helps keep employee information and business paper work more organized using computers and software; while making it easier to communicate with employee's using e-mail and memo's.30-Jan-2019
Explanation:
Question 7 of 10
What type of information system would be used by upper level management
using both internal and external information?
OA. Management information system
B. Decision support system
C. Transaction processing system
D. Executive information system
The type of information system would be used by upper level management using both internal and external information is Option B Decision support system.
Why is this so?An executive information system is a decision support system (DSS) that aids top executives in making choices (EIS).
It achieves this by allowing access to essential data needed to support a company's strategic goals. The majority of EISs have graphical displays with a user-friendly interface.
So, Option B is correct.
Learn more about information system at:
https://brainly.com/question/28945047
#SPJ1
Answer:
WRONG
Explanation:
Sam and you work together in an IT firm. One day you overhear Sam bragging how he investigated a complex network issue at a client site and solved it to the client's satisfaction. You later come to know he was chatting with a friend who works in another IT company but smaller than yours. He also at times visits a few clients of his friend, and offers them professional services. Which professional work standards Sam may have violated?
Answer:
Based on the scenario you have described, Sam may have violated several professional work standards, including:
1. Confidentiality: By discussing the details of a client's network issue with someone outside the company, Sam may have breached the client's trust and violated the confidentiality of their information.
2. Conflict of Interest: Sam's work for his friend's clients could create a conflict of interest with his job at your company. He may be in a situation where he could potentially prioritize his friend's clients over his own, which is unethical.
3. Professional Competence: If Sam is providing professional services to clients outside of his area of expertise, he may be violating the professional competence standard. It is important for IT professionals to only provide services within their area of expertise.
4. Professional Conduct: Sam's bragging about his work to someone outside of the company may also be seen as unprofessional conduct. It may reflect poorly on the company and damage its reputation.
Overall, Sam's actions could potentially harm the company's reputation, violate ethical standards, and jeopardize client relationships. It is important for IT professionals to uphold high ethical standards in their work.
Hope this helps!
Convert the following to CNF: S→SS|AB|B A→aAAa B→ bBb|bb|Ꜫ C→ CC|a D→ aC|bb
To convert the given grammar into Chomsky Normal Form (CNF), we need to rewrite the rules and ensure that each production has only two non-terminals or one terminal on the right-hand side. Here is the converted CNF grammar:
1. S → SS | AB | B
2. A → AA
3. A → a
4. B → bBb | bb | ε
5. C → CC | a
6. D → aC | bb
Explanation:
1. The production S → SS has been retained as it is.
2. The production A → aAAa has been split into A → AA and A → a.
3. The production B → bBb has been split into B → bB and B → b.
4. The production B → bb has been kept as it is.
5. The production B → ε (empty string) has been denoted as B → ε.
6. The production C → CC has been retained as it is.
7. The production C → a has been kept as it is.
8. The production D → aC has been kept as it is.
9. The production D → bb has been kept as it is.
In summary, the given grammar has been converted into Chomsky Normal Form (CNF), where each production has either two non-terminals or one terminal on the right-hand side. This form is useful in various parsing and analysis algorithms.
For more questions on parsing, click on:
https://brainly.com/question/13211785
#SPJ8
Answer:
Explanation:
To convert the given grammar to Chomsky Normal Form (CNF), we need to follow a few steps:
Step 1: Eliminate ε-productions (productions that derive the empty string).
Step 2: Eliminate unit productions (productions of the form A → B).
Step 3: Convert long productions (productions with more than two non-terminals) into multiple productions.
Step 4: Convert terminals in remaining productions to new non-terminals.
Step 5: Ensure all productions are in the form A → BC (binary productions).
Applying these steps to the given grammar:
Step 1: Eliminate ε-productions
The given grammar doesn't have any ε-productions.
Step 2: Eliminate unit productions
The given grammar doesn't have any unit productions.
Step 3: Convert long productions
S → SS (Remains the same)
S → AB
A → aAAa
B → bBb
B → bb
C → CC
C → a
D → aC
D → bb
Step 4: Convert terminals
No changes are needed in this step as all terminals are already in the grammar.
Step 5: Ensure binary productions
The given grammar already consists of binary productions.
The converted grammar in Chomsky Normal Form (CNF) is:
S → SS | AB
A → aAAa
B → bBb | bb
C → CC | a
D → aC | bb
Note: The original grammar didn't include the production rules for the non-terminals 'S', 'C', and 'D'. I assumed the missing production rules based on the provided information.
In cell D15, enter a formula using a counting function to count the number of cells in the Billable? column
The formula that could be entered as a counting function to count the number of cells would be COUNTA.
What formula can be used in cell D15?If you want to count the number of cells that are not empty in the Billable column, you can go to cell D15 and type in =COUNTA(.
After that, you highlight the entire Billable column from D2 to D14 and then close the formula and press enter. It will return the number of cells that are not empty.
Find out more on the spreadsheet functions at https://brainly.com/question/1395170.
2.10 LAB - Select employees and managers with inner join
The Employee table has the following columns:
• ID-integer, primary key
.
FirstName-variable-length string
• LastName-variable-length string
ManagerID - integer
.
Write a SELECT statement to show a list of all employees' first names and their managers' first names. List only employees that have a
manager. Order the results by Employee first name. Use aliases to give the result columns distinctly different names, like "Employee and
"Manager".
Hint: Join the Employee table to itself using INNER JOIN.
I have the code, however I have the employees as managers and the managers as the employees in the table. Here is the code I have.
SELECT emp.FirstName AS Employee, mgr.FirstName as Manager FROM Employee AS emp
INNER JOIN Employee AS mgr
ON emp.ID = mgr.ManagerID
ORDER BY mgr.ManagerID; no
The statement to show a list of all employees' first names and their managers' first names is in explanation part.
What is SQL?SQL is an abbreviation for Structured Query Language. SQL allows you to connect to and manipulate databases. SQL was adopted as an American National Standards Institute (ANSI) standard in 1986.
Here's an example SQL query to show a list of all employees' first names and their managers' first names, ordered by employee first name:
SELECT e1.FirstName AS Employee, e2.FirstName AS Manager
FROM Employee e1
INNER JOIN Employee e2
ON e1.ManagerID = e2.ID
ORDER BY Employee;
Thus, in this we order the results by the Employee column (i.e., the first name of the employee). The query only returns employees that have a manager (i.e., their ManagerID column is not null).
For more details regarding SQL, visit:
https://brainly.com/question/13068613
#SPJ9
onsider the below given table and write queries for
(i) & (ii) and output of
(iii) –(v):Table Name: Pet
i) Display name, owner and gender for all dogs.
ii) Display Name, owner and age of all pets whose age is more 2 years.
iii)select name, owner from pet where owner name like ‘%ya’;
iv) select name, age from pet where species = dog and age between 1 and 3;
v) select * from pets where species in (‘horse’,’parrot’)
Note that this is an SQL prompt. This is because we are asked to create queries. When you have information on tables are are asked to create queries that will result in a certain output, you are looking at a dataase query. Queries are created in SQL. Here are the queries below. The expected output are all attached.
(i) Display name, owner and gender for all dogs.
Query:
SELECT Name, Owner, Gender
FROM Pet
WHERE Species = 'Dog';
(ii) Display Name, owner and age of all pets whose age is more 2 years.
Query:
SELECT Name, Owner, Age
FROM Pet
WHERE Age > 2;
(iii) select name, owner from pet where owner name like ‘%ya’;
Query:
SELECT Name, Owner
FROM Pet
WHERE Owner LIKE '%ya';
(iv) select name, age from pet where species = dog and age between 1 and 3;
Query:
SELECT Name, Age
FROM Pet
WHERE Species = 'Dog' AND Age BETWEEN 1 AND 3;
(v) select * from pets where species in (‘horse’,’parrot’)
Query:
SELECT *
FROM Pet
WHERE Species IN ('Horse', 'Parrot');
An SQL query is a command used to retrieve or manipulate data in a relational database. It is important because it allows users to extract specific data from large databases, make updates to existing data, and create new records.
SQL queries are essential in many industries that rely on large amounts of data, such as finance, healthcare, and e-commerce.
SQL queries are used to interact with data stored in relational databases, which are typically organized into tables. Queries allow users to extract, modify, and manage data within those tables.
See all output attached.
Learn more about SQL Query on:
https://brainly.com/question/30755095
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Assuming this is a database, consider the above given table and write queries for:
(i) & (ii) and output of
(iii) –(v):Table Name: Pet
i) Display name, owner and gender for all dogs.
ii) Display Name, owner and age of all pets whose age is more 2 years.
iii)select name, owner from pet where owner name like ‘%ya’;
iv) select name, age from pet where species = dog and age between 1 and 3;
v) select * from pets where species in (‘horse’,’parrot’)
Could YOU Please help me out of this question This is how I started typing but at the end I got stuck My half of the answers I attached. please Help I will give you brainiest
we will work on text processing and analysis. Text analyzers could be used to identify the language in which a text has been written (language detection), to identify keywords in the text (keyword extraction) or to summarize and categorize a text. You will calculate the letter (character) frequency in a text. Letter frequency measurements can be used to identify languages as well as in cryptanalysis. You will also explore the concept of n-grams in Natural Language Processing. N-grams are sequential patterns of n-words that appear in a document. In this project, we are just considering uni-grams and bi-grams. Uni-grams are the unique words that appear in a text whereas bi-grams are patterns of two-word sequences that appear together in a document.
Write a Java application that implements a basic Text Analyzer. The Java application will analyze text stored in a text file. The user should be able to select a file to analyze and the application should produce the following text metrics:
1. Number of characters in the text.
2. Relative frequency of letters in the text in descending order. (How the relative frequency that you calculated compares with relative letter frequencies in English already published?)
3. Number of words in the text.
4. The sizes of the longest and the shortest word.
5. The twenty most repeated uni-grams (single words) in the text in descending order.
6. The twenty most repeated bi-grams (pairs of words) in the text in descending order.
Test your program in the file TheGoldBug1.txt, which is provided.
The given program based on the question requirements is given below:
The Programpublic static void analyzeChar(String text)
{
text = text.toLowerCase();
char [] characters = new char[26];
int [] rep =new int[26];
//populate the array of characters
char ch = 'a';
for (int i =0; i < characters.length; i++)
{
characters[i] = ch;
ch++;
}
itz72
//System.out.println(Arrays.toString(characters));
//System.out.println(Arrays.toString(rep));
//how many times each characters repeats
for (int i =0 ; i < text.length (); i++ )
{
ch = text.charAt(i);
if(ch>= 'a'&& ch<= 'z')
{
rep[(int)(ch-'a')]++;
}
itz72
}
//show the number of repetitions
for (int i = 0; i < rep.length; i++)
{
System.out.println("character" + characters[i] + "reapeats"+ rep[i]);
}
}
itz72
public static void calcNumChar(String text)
{
System.out.println("The number of characters is: " + text.length());
}
public static String getText(String fileName) throws IOException
{
String line = "", allText = "";
//open the file
File file = new File(fileName);
Scanner inputFile = new Scanner(file);
//read the file
while(inputFile.hasNext())
{
line = inputFile.nextLine();
//System.out.println(line);
allText=allText + (" " + line);
}
itz72
//close the file
inputFile.close();
return allText;
}
public static String getFilename()
{
String file;
Scanner kb = new Scanner(System.in);
System.out.print("Enter the name of the file: ");
file = kb.nextLine();
return file;
}
}
This script contains numerous functions that aid in the examination and manipulation of written materials. This program determines the incidence of every letter present in the supplied text, tallies the overall character count, and includes the ability to import text from a file.
Read more about programs here:
https://brainly.com/question/26497128
#SPJ1
The following do-while loop is suppose to ask for the price for a gallon of gas. The price must a positive number. The price can be an integer value or a double value. for example the price can be 3 or 3.0 or 3.5.
To create a robust program, we must do the data validation and as long as the user is entering a negative value or a String, the program must keep asking the user to enter a valid input.
in this program you need to use some of the scanner methods listed here, make sure to use the proper ones: hasNextInt(), hasNextDouble(), hasNextLine(), hasNext(), nextInt(), nextDouble(), nextLine()
Must flush the buffer at the proper locations in the code
Answer:
import java.util.Scanner;
public class qs {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
double price;
do {
System.out.print("Enter the price for a gallon of gas: ");
while (!input.hasNextDouble()) {
System.out.println("That's not a number!");
input.next(); // this is important!
}
price = input.nextDouble();
} while (price < 0);
System.out.println("The price is " + price);
}
}
Select the correct answer from each drop-down menu.
Tanya wants to include an instructional video with all its controls on her office website. The dimensions of the video are as follows:
width="260"
height="200"
What code should Tanya use to insert the video?
To insert the video, Tanya should add the following code:
✓="video/mp4">
The browser will use the first file that it supports. If the browser does not support any of the files, the text between the video and </video> tags will be displayed.
How to explain the informationTanya can use the following code to insert the video with all its controls on her office website:
<video width="260" height="200" controls>
<source src="video.mp4" type="video/mp4">
<source src="video.ogg" type="video/ogg">
Your browser does not support the video tag.
</video>
The width and height attributes specify the dimensions of the video player. The controls attribute specifies that the video player should display all its controls. The source elements specify the location of the video files.
The first source element specifies the location of the MP4 file, and the second source element specifies the location of the Ogg file. The browser will use the first file that it supports. If the browser does not support any of the files, the text between the video and </video> tags will be displayed.
Learn more about program on
https://brainly.com/question/26642771
#SPJ1
Read the following Python code:
pets = 2
binaryPets = bin(pets)
print(binaryPets)
Which of the following is the correct output? (5 points)
0b10
0d10
0p10
0x10
The correct output for the given Python code would be option A: 0b10.
What is the Python code?The value 2 is assigned to the variable named "pets" in the provided Python code. Afterwards, the decimal value of pets (2) is transformed into binary format through the utilization of the bin() function. The function bin() produces a binary value in string form, and adds the prefix "0b" to indicate this.
Thus, the result displayed for binaryPets upon printing will be 0b10. Indicating that a value is in binary format is done by adding the prefix '0b'. In binary, the decimal value 2 is represented by 10.
Learn more about Python code from
https://brainly.com/question/26497128
#SPJ1
A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.
Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.
Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.
Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.
The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.
The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.
Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.
The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.
What is the Quicksort?Some rules to follow in the above work are:
A)Choose the initial element of the partition as the pivot.
b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.
Lastly, Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.
Learn more about Quicksort from
https://brainly.com/question/29981648
#SPJ1