1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
14

Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La

tin version removes all consonants from the beginning of the word and places them at the end, followed by ay. For example, cricket becomes icketcray. If a word starts with a vowel, the Pig Latin version is the original word with ay added to the end. For example, apple becomes appleay. If y is the first letter in a word, it is treated as a consonant; otherwise, it is treated as a vowel. For example, young becomes oungyay, but system becomes ystemsay. For this program, assume that the user will enter only a single word consisting of all lowercase letters.
Computers and Technology
1 answer:
Reptile [31]3 years ago
5 0

Answer:

Written in Python

word = input("Word: ")

if(word[0]=='a' or word[0]=='e' or word[0]=='i' or word[0] =='o' or word[0]=='u'):

     print(word+"ay")

else:

     a = word[1:]

     print(a+word[0]+"ay")

Explanation:

<em>The program was written in Python and I've added the explanation as an attachment; where I used comments as explanations</em>

Download txt
You might be interested in
What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
Hunter-Best [27]

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.

<h3>What type of hackers are motivated by social or political issues?</h3>

Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated  aim or reason.

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.

Learn more about Hacktivism from

brainly.com/question/5483494

#SPJ1

5 0
2 years ago
An object reference provides a(an)______for an object and is used to gain access to the object (Points : 2) entry
sdas [7]

Answer: Instance

Explanation: Instance is the term found in the object-orient programming concept. It is used for the realization of the variation present in any object specifically.The program execution at each time instant is known as the instance of program. Generation of realized instance is known as instantiation.

This helps in the accessing of the object in the program.Other options are incorrect entry , target and handle are not the technical term related with the accessing of object .Thus the correct answer is instance.

3 0
3 years ago
Write an if statement to test if a number stored in y is between 6 and 10 inclusive.
lana66690 [7]

y = choose whatever number you want.

if 5 < y < 11:

   print("The value stored in y is between 6 and 10 inclusive")

else:

   print("The value stored in y is not between 6 and 10 inclusive.")

I hope this helps!

8 0
3 years ago
In cell I5, enter a formula to calculate the total admission fees collected for the 2018
V125BC [204]
The formula is to calculate the total admission fees collected is = F5*B14

1. Click on cell I5
2. Type equal sign =
3. Type F5 or click on F5 cell
3. Type multiplication sign *
4. Type B14 or click on B14 cell
4 0
3 years ago
Read 2 more answers
What do you think about Naruto?
Natalka [10]

Answer:

AMAZINGGG

Explanation:

because it just is !!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the following code segment.
    15·1 answer
  • Within an event-driven program a component from which an event is generated is the ____
    10·1 answer
  • What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a
    6·1 answer
  • The duties of a database administrator include determining which people have access to what kinds of data in the database; these
    13·2 answers
  • Research the topic of legal and ethical behaviors or dilemmas related to technology. Identify five topics of concern and briefly
    9·1 answer
  • 4.2 Lesson Practice​
    8·2 answers
  • Need the answer ASAP!!!!!!!!!!!!! I’ll mark brainliest if correct
    8·1 answer
  • Multiple choice:
    12·2 answers
  • Which of the following is a key aspect of any IT position? installation of fiber optic cables
    14·2 answers
  • If a system contains 1,000 disk drives, each of which has a 750,000- hour MTBF, which of the following best describes how often
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!