Print the number of vowels and consonants in the word

Assignment Help Computer Engineering
Reference no: EM132211424

Write a program that reads a word and prints the number of vowels and consonants in the word.

For this exercise assume 'a', 'e', 'i', 'o', 'u', and 'y' are vowels.

Please write a short paragraph, bullet points, or psuedocode describing your algorithm for solving the problem.

For user input "Harry", the program should print 2 vowels and 3 consonants.

The user of the program should input the word.

Reference no: EM132211424

Questions Cloud

What the amount and character of gain glover must recognize : What is the amount and character of gain Glover must recognize on the distribution, and what is his basis in his Oak Corp. stock
What the amount and character of gain brady must recognize : What is the amount and character of gain Brady must recognize on the distribution in each of the following alternative scenarios
Write a program that reads the contents of the two files : Write a program that reads the contents of the two files into two separate arrays, or ArrayLists.
Journalize all entries required on the given dates : Journalize all entries required on the above dates, including entries to update depreciation, where applicable, on assets disposed of. Pronghorn Company
Print the number of vowels and consonants in the word : Write a program that reads a word and prints the number of vowels and consonants in the word.
Write out pseudocode using given information : Write a program that reads in values from the user and if each value is not a duplicate of a value already read in, then display those values.
A program to read a file containing an encrypted message : Write a program to read a file containing an encrypted message, which must be decoded and printed on the screen.
Compute the revised annual depreciation : On January 1, 2020, the Martinez Company ledger shows Equipment $31,000. Compute the revised annual depreciation
Write a program that reads three edges for a triangle : Write a program that reads three edges for a triangle and computes the perimeter if the input is valid. Otherwise, display that the input is invalid.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program takes two randomly generated parallel arrays

The random number generation for both arrays would be done in a method, both when the arrays are first populated and when they have to be repopulated.

  What type of data formatting is used in the given image

What type of data formatting is used in the image below? Who was the scientist who conceived the concept of a stored programmed control computer? John von Neumann who introduced the von Neumann architecture.

  Consider the local and global implications of your choices

Compare the pros and cons of different types of tablets in regard to the operating system.

  Describe the typical way that project managers organize

Describe the typical way that project managers organize the programmers' work storage areas. Why is this approach useful?

  Show the graphical view of how the jobs run

Show the graphical view of how the jobs run. Also show the following results for each process: Finish Time, Tr, and Tr/Ts.

  How is the pruned tree used for classification

How is the pruned tree used for classification? Examine the unpruned tree. What are the top three predictors according to this tree?

  Construct a candidate list of subjects

Construct a candidate list of subjects. Starting from the subject with the highest number of inconnectivity, create a slot.

  The similarities osi model and the tcp/ip architecture

List and describe each layer of the OSI model. What is the main purpose of the OSI model.

  Show the output carries for the up count

Draw the graphic symbol of an up-down synchronous binary counter with mode input (for up or down) and count-enable input with G dependency. Show the output carries for the up count and the down count.

  Compute the nth fibonacci number

A Fibonacci sequence is a sequence of numbers where each successive number is the sum of the previous two.

  Discuss the relationship of vlans and trunking

describes the purpose, function and configuration for trunking between switches. Discuss the relationship of VLANs and trunking along with the types of Ethernet

  Design and organize forensics report

When the investigation is complete and facts and findings are captured within your forensics report you should assure that the forensic report is organized in the correct manner and you are prepared for the courtroom testimony. Explain the details..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd