Answer:
#Declare variable to get the input
#list from the user
input_list = input()
#split the list into words by space
list = input_list.split()
#Begin for-loop to iterate each word
#to get the word frequency
for word in list:
#get the frequency for each word
frequency=list.count(word)
#print word and frequency
print(word,frequency)
Explanation:
This program that we are told to write will be done by using python programming language/ High-level programming language.
The question wants us to write a program in which the output will be as below;
hey 1
hi 2
Mark 1
hi 2
mark 1
Just by imputing hey hi mark hi mark.
Just copy and run the code below.
#Declare variable to get the input
#list from the user
input_list = input()
#split the list into words by space
list = input_list.split()
#Begin for-loop to iterate each word
#to get the word frequency
for word in list:
#get the frequency for each word
frequency=list.count(word)
#print word and frequency
print(word,frequency)
In this exercise we have to use the knowledge in computational language in python to write the following code:
We have the code can be found in the attached image.
So in an easier way we have that the code is
input_list = input()
list = input_list.split()
for word in list:
frequency=list.count(word)
print(word,frequency)
See more about python at brainly.com/question/18502436
what do the three dots : . seen in equations/proof mean
Two technicians are discussing Newton's first law of motion. Technician A says that a lightweight vehicle requires as
much energy to accelerate as a heavier vehicle. Technician B says that a lighter vehicle requires less energy to
accelerate than a heavier vehicle. Who is correct?
Select one
a. Technician A
b Technician B
C Both Technician A and Technician B
d. Neither Technician A nor Technician
Complete the sentence.
_______is a career discipline that focuses on developing new computing technologies and techniques.
O computer science
O information technology
O computer technology
O information systems
Answer:
Computer Science
Explanation:
These other options deal with different disciplines of computers. Information technology deals with the collecting and storing of data. Computer technology deals with the maintenance and work of a computer system. Information systems deals with the way that you can collect and store data.
,Computer Science_is a career discipline that focuses on developing new computing technologies and techniques. Hence, option A is correct.
What is tech support?Tech support has been the acronym for technological support. A company has been requiring the backend support that helps in resolving the issues related to the technical products.
We know that Computer technology deals with the maintenance and work of a computer system.
The Information systems deals with the way that you can collect and store data.
These other options deal with different disciplines of computers, thus Information technology deals with the collecting and storing of data.
The education discipline helps in providing a company with technological support has been information technology.
Thus,Computer Science_is a career discipline that focuses on developing new computing technologies and techniques. Hence, option A is correct.
Learn more about tech support, here:
brainly.com/question/21415070
#SPJ2
John tells you that a certain algorithm runs in time (3 + 200), and Bill tells you that the same algorithm runs in time Ω(3). Can both John and Bill be correct? Why?
According to the question, the statements made by both John and Bill are correct. This is because both express the value of algorithms with respect to their requirement and identification.
What is an Algorithm?An algorithm may be characterized as a type of procedure that is widely used for solving a problem or performing a computation. They act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.
As per John, the worst-case run time requires the setting of the algorithm to (3+200), but on contrary, as per Bill, the running time of the same algorithm requires Ω(3). The concept of both people is correct but they are understanding the algorithm with respect to their facts and requirements.
Therefore, the statements made by both John and Bill are correct. This is because both express the value of algorithms with respect to their requirement and identification.
To learn more about Algorithm, refer to the link:
https://brainly.com/question/24953880
#SPJ9
what is the fnajofnjanfaofoafnka
Answer: that is the letter f,n,a,j,o,f,n,j,an,f,a,o,f,n,k,a
Which are ether random letters or….. it’s a word scramble.
I well now organize the letters.
1F 2F 3F 4F
1N 2N 3N 4N
1A 2A 3A 4A
1J 2J
1O 2O
1K
Words that can be written are
Fan four times there are other things such as names it can write such as Joan Jon or it could be abbreviations but I believe It’s just random letters you wrote to confuse the brainly community trust me you confused me lol.
Explanation:
And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase
There were 5 staff members in the office before the increase.
To find the number of staff members in the office before the increase, we can work backward from the given information.
Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.
Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.
Moving on to the information about the year prior, it states that there was a 500% increase in staff.
To calculate this, we need to find the original number of employees and then determine what 500% of that number is.
Let's assume the original number of employees before the increase was x.
If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:
5 * x = 24
Dividing both sides of the equation by 5, we find:
x = 24 / 5 = 4.8
However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.
Thus, before the increase, there were 5 employees in the office.
For more questions on staff members
https://brainly.com/question/30298095
#SPJ8
Describe what test presentation and conclusion are necessary for specific tests in IT testing such as
-resource availability
-environment legislation and regulations (e.g. disposal of materials)
- work sign off and reporting
For specific tests in IT testing, the following elements are necessary.
What are the elements?1. Test Presentation - This involves presenting the resources required for the test, ensuring their availability and readiness.
2. Conclusion - After conducting the test, a conclusion is drawn based on the results obtained and whether the objectives of the test were met.
3. Resource Availability - This test focuses on assessing the availability and adequacy of resources required for the IT system or project.
4. Environment Legislation and Regulations - This test evaluates compliance with legal and regulatory requirements related to environmental concerns, such as proper disposal of materials.
5. Work Sign Off and Reporting - This includes obtaining formal approval or sign off on the completed work and preparing reports documenting the test outcomes and findings.
Learn more about IT testing at:
https://brainly.com/question/13262403
#SPJ1
To display on a tablet, a photograph needs to be converted into which of the following?
a flowchart
0s and 1s
input
variables
Answer:
0s and 1s
It needs to be converted to bits
Answer:
The guy above me is right, give them brainiest please :)
Explanation:
Did the quiz on Edge. have a good day~
Which of the following are true statements about collisions in hashing? Linear probing can cause secondary collisions. Higher space utilization tends to cause more collisions.
Answer:
hello the options to your question is incomplete below are the options
A. Linear probing causes secondary collisions.
B. Higher space utilization tends to cause more collisions.
C. Chained entries will be ordered by key.
D. (a) and (b).
E. All of the above.
answer : (a) and (b) --- D
Explanation:
The true statements about collisions in hashing are ;Linear probing causes secondary collisions and Higher space utilization tends to cause more collisions.
collisions in hashing is when two data sets whom are distinctively different have the same hash value or checksum. the collision in hashing can be resolved by checking the hash table for an open slot to keep the data set that caused the collision.
Which computer is big enough to hold in a plam ?
Answer:
A palmtop must be small enough to hold in the palm of your hand, for this reason they are called palmtops. The first company to commercialize this type of device was Palm.
Explanation:
hope it helps
mark me brainliest pls
The computer which is big enough to hold in a palm is Palmtop.
What is a computer?A computer is referred to as an electronic device used to generate information or data and programmed to execute out automated series of mathematical or logical operations. Data storage, retrieval, and processing are all abilities.
Palmtop is the smallest in size as compared to an ordinary laptop that it can easily be carried on the palm of a person. It is a portable device that can make it smoother to move from one place to another.
Palmtops have a compressed keyboard and a tiny LCD screen. The majority of models come with a personal event planner, calendar, address book, and calculator. Some types can upload data to larger computer systems and are controllable.
Learn more about computers, here:
https://brainly.com/question/18591190
#SPJ2
Question 41
What is an another name of Personal Computer?
A OMicro-Computer
BOPrivate Computer
CODistinctive Computer
DOIndividual Computer
A personal computer, also known as a micro-computer, is a type of computer designed for individual use by a single person. Option A
It is a general-purpose computer that is meant to be used by an individual for various tasks, such as word processing, web browsing, gaming, and multimedia consumption. Personal computers are widely used by individuals in homes, offices, and educational institutions.
Option B, "Private Computer," is not a commonly used term to refer to a personal computer. The term "private" does not accurately describe the nature or purpose of a personal computer.
Option C, "Distinctive Computer," is not an appropriate term to refer to a personal computer. The term "distinctive" does not convey the common characteristics or usage of personal computers.
Option D, "Individual Computer," is not a commonly used term to refer to a personal computer. While the term "individual" implies that it is meant for individual use, the term "computer" alone is sufficient to describe the device.
Therefore, the most accurate and commonly used term to refer to a personal computer is A. Micro-Computer. This term highlights the small size and individual-focused nature of these computers. Option A
For more such questions micro-computer visit:
https://brainly.com/question/26497473
#SPJ11
32. The broadcast address is a special address in which the host bits in the network address are all set to 1, and it can also be used as a host address.
A.True
B.False
Some host addresses are reserved for special uses. On all networks, host numbers 0 and 255 are reserved. An IP address with all host bits set to 1 is False.
How can I find a network's broadcast address?Any device connected to a multiple-access communications network can receive data from a broadcast address. Any host with a network connection could receive a message delivered to a broadcast address.All hosts on the local subnet are reached by using this address to send data. The Routing Information Protocol (RIP), among other protocols that must communicate data before they are aware of the local subnet mask, uses the broadcast address.The use of some host addresses is reserved. Host numbers 0 and 255 are set aside for use only on reserved networks. When all host bits are set to 1, an IP address is considered false.To learn more about Broadcast address refer to:
https://brainly.com/question/28901647
#SPJ1
State methods of minimizing dust in a computer laboratory.
Answer:
well you could use a blower to remove dust in a computer laboratory
You can use Word to create ____.
a. reports c. letters and memos
b. tables d. all of the above
find four
reasons
Why must shutdown the system following the normal sequence
If you have a problem with a server and you want to bring the system down so that you could then reseat the card before restarting it, you can use this command, it will shut down the system in an orderly manner.
"init 0" command completely shuts down the system in an order manner
init is the first process to start when a computer boots up and keep running until the system ends. It is the root of all other processes.
İnit command is used in different runlevels, which extend from 0 through 6. "init 0" is used to halt the system, basically init 0
shuts down the system before safely turning power off.
stops system services and daemons.
terminates all running processes.
Unmounts all file systems.
Learn more about server on:
https://brainly.com/question/29888289
#SPJ1
what are the three component parts
of floating point number
Answer:
IEEE floating point numbers have three basic components: the sign, the exponent, and the mantissa. The mantissa is composed of the fraction and an implicit leading digit (explained below).Explanation:
\(hii\)hope this helps you ✌️What type of 3-phase connection requires only two transformers?
The use of two single-phase transformers to step down a high 3-phase voltage to a lower 3-phase voltage is possible using a rudimentary configuration dubbed an "open delta."
What is a single-phase transformer?For industrial applications, three phase transformers perform significantly better. Most heating, air conditioning, lighting, and house applications employ single phase systems in residential settings. When compared to low-power industrial systems and machines, they are less productive. A specific type of transformer called a single phase transformer functions using only one phase of power. This device carries electrical power from one circuit to another by the mechanism of electromagnetic induction. It is a passive electrical device. A transformer cannot change single-phase electricity into three-phase power, even if single-phase power can be produced from a three-phase power source. Phase converters or variable frequency drives are needed to convert single-phase electricity to three-phase power.To learn more about single phase transformers, refer to:
https://brainly.com/question/29665451
What is wrong with the following circuit?
Nothing. This circuit has no mistakes.
The NOT gate should only two input.
There should be only one output from the OR gate.
The AND gate should have one input and two outputs.
Choose the correct option.
Which of the following infection types can send information on how you use your computer
to a third party without you realizing it?
Spyware accumulates your personal information and passes it on to curious third parties without your knowledge or consent.
Spyware is also learned for installing Trojan viruses.
What is spyware?
Spyware is a type of malicious software or malware that is established on a computing device without the end user's knowledge. It plagues the device, steals exposed information and internet usage data, and relays it to advertisers, data firms, or external users.
How do hackers utilize spyware?
Spyware monitors and logs computer use and activity. It celebrates the user's behavior and finds vulnerabilities that allows the hacker to see data and other personal details that you'd normally consider confidential or sensitive.
To learn more about Spyware, refer
https://brainly.com/question/7126046
#SPJ9
Sir Tim Berners-Lee wrote the three fundamentals for the Web. What are these three fundamentals? Choose the answer. OO HTMT, IP, URL (or URI) HTML, HTTP, URR HTTP, HTML, IP HTML, HTTP, URL (or URI)
Answer:
HTML, HTTP, and URI/URI
Explanation:
In 1990, Berners-Lee developed three fundamental technologies: HTML, HTTP, and URI/URL; which remain the core of the web as we know it today.
Hope it helped! :)
Assistive technology has gained currency in the 21st century since it facilitates the inclusion agenda in the country.Give four reasons to justify your point.
Answer:
Assistive technology has gained currency in the 21st century because it provides various benefits that support inclusion. These include:
Increased accessibility: Assistive technology can make it easier for individuals with disabilities to access and interact with technology and digital content. This can increase their independence and enable them to participate more fully in society.Improved communication: Assistive technology can facilitate communication for individuals with speech or hearing impairments, enabling them to express themselves and connect with others.Enhanced learning opportunities: Assistive technology can provide students with disabilities with access to educational materials and resources, enabling them to learn and succeed in school.Greater employment opportunities: Assistive technology can provide individuals with disabilities with the tools they need to perform job tasks and participate in the workforce, increasing their opportunities for employment and economic independence.Explanation:
Assistive technology refers to tools, devices, and software that are designed to support individuals with disabilities. In recent years, assistive technology has become increasingly important in promoting inclusion and accessibility for people with disabilities. The four reasons mentioned above provide a brief overview of the key benefits that assistive technology can offer, including increased accessibility, improved communication, enhanced learning opportunities, and greater employment opportunities. These benefits can help individuals with disabilities to participate more fully in society, achieve greater independence, and improve their quality of life.
plssss help i will mark u as brainliest plssss
Answer:
Explanation:
1°
<p style="color: red">Random Name 1</p>
<p style="color: blue">Random Name 2</p>
<p style="color: yellow">Random Name 3</p>
<p style="color: green">Random Name 4</p>
<p style="color: gray">Random Name 5</p>
2°
<ol>
<li>Pen 1<li>
<li>Pen 2<li>
<li>Pen 3<li>
<ol>
3°
<ul>
<li>CPU<li>
<li>Motherboard<li>
<li>RAM<li>
<li>GPU<li>
<ul>
I think is this you need, have a nice day ;)
1110011*110011 binary multiplication
122113420121
Explanation:
Answer:
110110101001
Explanation:
You have to multiply them normally and then add then in a binary manner..
Remember these are binary numbers ( 1+1=0,
1+0=1, 0+0=0)
A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain?
Security and risk management
Security architecture and engineering
Communication and network security
Asset security
The responsibilities of a security professional described above belong to the security domain of option D: "Asset security."
What is the servers?Asset safety focuses on identifying, classifying, and defending an organization's valuable assets, containing sensitive personally capable of being traced information (SPII) stored on guest servers.
This domain encompasses the secure management, storage, memory, and disposal of sensitive dossier, ensuring that appropriate controls are in place to safeguard the secrecy, integrity, and availability of property.
Learn more about servers from
https://brainly.com/question/29490350
#SPJ1
Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new videos for $3.00 a night, and oldies for $2.00 a night.
Write a program that the clerks at Five Star Retro Video can use to calculate the total charge for a customer’s video rentals.
The program should prompt the user for the number of each type of video and output the total cost.
An example of the program input and output is shown below:
Enter the number of new videos: 3
Enter the number of oldies: 2
The total cost is $13.0
The clerks at Five Star Retro Video can use to calculate the total charge for a customer’s video rentals is of three types.
What is Five Star Retro Video ?The same discerning individuals who enjoy purchasing LP record albums may rent VHS tapes and DVDs from Five Star Retro Video. The shop offers current DVD rentals for $3.00 per night and vintage titles for $2.00 per night.
n1 is same to eval(input("Enter the number of new videos: "))
Enter the number of seniors in the box below.
print("The whole expense is $%.1f"%(n1*3+n2*2))
Thus, the clerks at Five Star Retro Video can use to calculate the total charge for a customer’s video rentals is of three types.
To learn more about Five Star Retro Video, refer to the link below:
https://brainly.com/question/13138157
#SPJ1
Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.
Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.
Writting the code:Assume the variable s is a String
and index is an int
an if-else statement that assigns 100 to index
if the value of s would come between "mortgage" and "mortuary" in the dictionary
Otherwise, assign 0 to index
is
if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)
{
index = 100;
}
else
{
index = 0;
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
A network technician is implementing a software-defined network. Which of the following layers would apply business logic to make decisions about how traffic should be prioritized?
A. Application
B. Management
C. Infrastructure
D. Access
The correct option is A. Application. In a software-defined network (SDN), the application layer is responsible for controlling and managing the network's behavior.
This layer includes the software applications that run on top of the SDN and determine how traffic should be prioritized based on business logic.
By leveraging centralized controllers and software applications, SDNs can automate network management and provide granular control over network traffic. This allows businesses to prioritize mission-critical applications and services while optimizing network performance and reducing costs.
Overall, the application layer plays a critical role in the implementation of SDNs by enabling intelligent decision-making and network optimization based on the unique needs and requirements of the business.
To know more about SDN click here:
brainly.com/question/29386698
#SPJ4
Which statements are true about a user-defined data type? Select 3 options.
It cannot be changed once you define it.
It can include numeric data.
It can include string data.
It can include bool data.
It can only include one data type.
\( \huge \fbox{\orange{Answer}}\)
It cannot be changed once you define it.It can include bool data.It can include string data.our systems have detected unusual traffic from your computer network. this page checks to see if it's really you sending the requests, and not a robot.
Computing equipment that are connected to one another and have the ability to share resources and exchange data are referred to as being in a computer network. Communication protocols are used by these networked devices to transmit data across wired or wireless technologies. Let's respond to some often asked questions about computer networking.
What exactly is a computer network?
An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.
To know more about Computer network visit;
https://brainly.com/question/13992507
#SPJ4
I need help!!!
What’s a keyboard?
What’s a monitor?
What’s a usb?
What’s a tv?
What’s a laptop?
What’s a remote?
Answer:
a keyboard is what u r using to type this question rn
a monitor is technically the security cams in among us
a usb is something that you use to attach information onto a computer
a tv is literally a box that shows images and transmits sounds
a laptop is a computer but that is used more for traveling
a remote is another box but smaller that helps you navigate through the channels in a tv.
Explanation:
O_o how did you not know this...
also could i have brainliest plz?!