1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
4 years ago
8

Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La

tin version removes all consonants from the beginning of the word and places them at the end, followed by ay. For example, cricket becomes icketcray. If a word starts with a vowel, the Pig Latin version is the original word with ay added to the end. For example, apple becomes appleay. If y is the first letter in a word, it is treated as a consonant; otherwise, it is treated as a vowel. For example, young becomes oungyay, but system becomes ystemsay. For this program, assume that the user will enter only a single word consisting of all lowercase letters.
Computers and Technology
1 answer:
Scorpion4ik [409]4 years ago
7 0

Answer:

Written in Python

word = input("Word: ")

if(word[0]=='a' or word[0]=='e' or word[0]=='i' or word[0] =='o' or word[0]=='u'):

     print(word+"ay")

else:

     a = word[1:]

     print(a+word[0]+"ay")

Explanation:

<em>The program was written in Python and I've added the explanation as an attachment; where I used comments as explanations</em>

Download txt
You might be interested in
Which wireless standard can stream data at a rate of up to 54 mbps using a frequency of 5 ghz?.
sleet_krkn [62]

Answer:

802.11a

Explanation:

4 0
3 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
WAP to find area of circle​
Tatiana [17]

Answer:

program by LET statement

Explanation:

CLS

REM to find the area of circle

LET r=10

LET a=22/7*2*r^2

PRINT "area=;"a

END  

                                                                                         press f5

output:

a=628.57

7 0
3 years ago
On computer X, a nonpipelined instruction execution would require 12 ns. A pipelined implementation uses 6 equal-length stages o
DedPeter [7]

Answer:

5.99997

Explanation:

We can refer to Pipelining as an implementation technique where multiple instructions are overlapped in execution. The computer pipeline is divided in stages. Each stage completes a part of an instruction in parallel.

It increases instruction throughput

see attachment for the step by step solution

3 0
3 years ago
What is an effective way to display calculations in a Word document
DanielleElmas [232]
On the main Ribbon, click on Insert tab, in the Symbols Group click the arrow under Equations, and then Insert new equation.
5 0
3 years ago
Read 2 more answers
Other questions:
  • _____ is the standard that enables wireless devices to access web-based information and services. world wide web tcp/ip ethernet
    5·1 answer
  • Asp.net is a Microsoft product?
    6·1 answer
  • Plz help me of this answer<br><br><br>language:python​
    7·2 answers
  • Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
    6·1 answer
  • What are the purposes of a good web page design?
    9·2 answers
  • 6. What type of application is designed for making slide shows?​
    12·2 answers
  • What is the best response to cyberbullying?
    10·2 answers
  • 2. How much did John Jones have in his account on the first day of the
    5·1 answer
  • A(n) ___ is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly si
    5·1 answer
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!