Returns a list of the index positions

Assignment Help Basic Computer Science
Reference no: EM132184266

What is a function that takes as input a string and returns a list of the index positions of all the vowels in the word.  A vowel is defined as any letter in "aeiouAEIOU".  Use this function in a program that prompts the user for a word or phrase and outputs the index positions of all the vowels. Make the program user friendly. You must NOT print the index positions as a list. Instead, the index positions should be printed one per line as shown below.

For example, the program may execute as follows:

Please enter a word (or phrase) and I will tell you where the vowels are: Hello WORLD!!

The vowels are at positions:

1

4

7

Reference no: EM132184266

Questions Cloud

How are social inequalities and hierarchies reproduced : How might your social class influence how these agents of socialization function? How are social inequalities and hierarchies reproduced?
What strategies can you use to enhance your creativity : Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict?
Disadvantages of three-tiered architecture : Describe the advantages/disadvantages of three-tiered architecture?
Explain what the technology is and how the technology works : Explain the business or technical problem the technology is designed to solve and the application of the technology to the problem.
Returns a list of the index positions : What is a function that takes as input a string and returns a list of the index positions of all the vowels in the word.
Describe barbour and dysons ideas about freedom : Identify potential ways in which your chosen technology can be used either as a means of enabling participation.
Explain the difference between bound and unbound controls : Give an example of filtering as it pertains to Access and 3. Explain the difference between Bound and Unbound Controls. Give examples.
Compare the scan algorithm with dbscan : What are their similarities and differences?Compare the SCAN algorithm with DBSCAN . What are their similarities and differences?
Determine the emerging enterprise network applications : Is the title appropriate? Does the abstract summarize well? Are individual ideas assimilated well? Are wording, punctuation, etc. correct?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Execute dijkstra shortest-path algorithm

Execute Dijkstra's shortest-path algorithm by hand on this graph, showing how the data structures evolve, with A as the starting vertex.

  Find algebraic equations that show p and w as functions

A virtual address a in a paging system is equivalent to a pair (p, w), in which p is a page number and w is a byte number within the page. Let z be the number of bytes in a page. Find algebraic equations that show p and w as functions of z and a.

  Critical issues influencing workplace and professional

List and explain the critical issues influencing workplace and professional relationships with Aboriginal and/or Torres Strait Islander co-workers.

  Parameters to hold stream arguments

Parameters to hold stream arguments must be reference parameters, because an input or output operation changes the streams read or write position, respectively.

  Widgets and widgets are substitutes or complements

How would I determine whether widgets are a normal or inferior good, and whether widgets and widgets are substitutes or complements?

  Why password and audit policies are so important

Explain why password and audit policies are so important in today's age. explain how these policies can be configured in a windows 2016 server environment.

  Propose an smtp option for remote client authentication

Find out what existing methods are available for addressing this issue.

  Methodology for utilizing the framework

1. Provide a depiction (i.e., a diagram) of the components of the framework. You may take this from any source, as long as you cite it. 2. Provide a brief description of the each of the components of the framework. 3. Identify a methodology for uti..

  Difference between overloading and overriding member

Discuss the difference between overloading and overriding a member function in a derived class.

  Test positive for breast cancer in a mammogram

Let's assume that 1% of women over the age of 40 have breast cancer, that 90% of women who have breast cancer will test positive for breast cancer

  Find the least common multiple of the pairs of integer

Find the least common multiple (lcm) of the pairs of integers given in exercises.

  What is the effect of a single-bit error in the ciphertext

Consider a stateful variant of CBC-mode encryption where the sender simply increments the IV by 1 each time a message is encrypted (rather than choosing IV at random each time). Show that the resulting scheme is not CPA-secure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd