Reference no: EM132103864
Problem 1.
Define a function wordsWithLetter() that takes 2 parameters:
1. text, a string containing words and white spaces
2. letter, a string of length 1
The function returns the total number of words in text containing letter.
for example,
>>>line='It is what it is'
>>>print(wordsWithLetter(line,'i'))
>>>4
Problem 2. Define a function lineStats() that takes one parameter:
1. paragraph, a string of words and white spaces
The function returns a list containing the number of vowels in each line.
for example,
>>>t="Apple\npear and kiwi"
>>>print(lineStats(t))
>>>[2,5]
Problem 3.
Define a function wordsStats() that takes one parameter:
1. text, a string of words and white spaces
The function returns a list of unique words in text.
HINT: The words 'IT' and 'it' are the same.
For example,
>>>print(wordsStats('It is what it is'))
>>>['it','is','what']
Explain what security vulnerabilities you would look for
: Assume you are asked to assess the security of an electronic medical record(EMR) system.
|
Scheduling algorithms for different types of queuing
: First-In-First-Out (FIFO): The jobs arc processed in the arriving order. The job at the front of the queue is served until it has completed.
|
How can businesses use technology and relationships
: How can businesses use technology and relationships to reduce their environmental impact?
|
Show a pipeline execution diagram for the program
: Indicate all data dependencies (RAW, WAR, WAW) that exist between instructions by writing the instruction pairs among which the dependency exist.
|
Define a function wordsstats that takes one parameter
: Define a function wordsWithLetter() that takes 2 parameters: 1. text, a string containing words and white spaces 2. letter, a string of length 1
|
What is the protein sequence encoded by the gene
: Which region of the mRNA do you think can be translated into a protein (hint: Can you identify the start codon and stop codon from the mRNA sequence?)
|
How many cycles does this code take to complete
: Show a pipeline execution diagram for the program by inserting nop instructions to eliminate the data hazard.
|
Print the keys as encountered in a preorder traversal
: Consider a binary (min)heap. We have a method that prints the keys as encountered in a preorder traversal.
|
Identify a superkey for the book entity set
: Consider the entity set 'Book' with the attributes 'title', 'author', 'publisher', 'pubDate', 'numberPages', 'condition', 'cost', and 'datePurchased'.
|