1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julia-pushkina [17]
3 years ago
5

Consider this data sequence: "fish bird reptile reptile bird bird bird mammal fish". let's define a singleton to be a data eleme

nt that is not repeated immediately before or after itself in the sequence. so, here there are four singletons (the first appearance of "fish", the first appearance of "bird", "mammal", and the second appearance of "fish"). write some code that uses a loop to read a sequence of words, terminated by the "xxxxx". the code assigns to the variable n the number of singletons that were read. (for example in the above data sequence it would assign 4 to n. assume that n has already been declared . but not initialized . assume that there will be at least one word before the terminating "xxxxx".
Computers and Technology
1 answer:
Ierofanga [76]3 years ago
5 0
N = 0

string temp;
if wordset[0] != wordset[1] then {
    n = n + 1
}
temp = wordset[0]
for i = 1 to wordset.length - 2 do {
    if wordset[i] != temp AND wordset[i] != wordset[i + 1] then {
        n = n + 1
    }
    temp = wordset[i]
 
} 

}
You might be interested in
What is the most important external issue when using social media in emergency management?
DerKrebs [107]
Th e most important external issue when using social media in emergency management is the disaster response. Disseminating information through social media is very effective especially when there are calamities and a disaster respond from both private and public sector is very urgent.
8 0
3 years ago
"Most of us know that when we come into a college classroom, we will see desks and chairs, a computer station and a projector. A
gayaneshka [121]
Accessibility... I think
3 0
3 years ago
In what explicit way did Eye of the Storm include reader participation?
Naddika [18.5K]
The group is divided into two groups. They have themselves introduced and have welcomed participants. The objective is to consider action to challenge discriminatory treatment. Have the group understand and recognize discrimination. Ground rules were created to have supportive learning environment.
6 0
2 years ago
Read 2 more answers
Explain how to install Microsoft Office Suite.
kupik [55]

Answer:

Explanation:

Download and install Microsoft Office applications

1. Log into your Microsoft Office 365 portal. ...

2. In the top right corner, click Install Office apps.

3. Select Office 2016. ...

4.  If prompted, click the Save File button, to allow the download.

5. The install file will download to your computer.

6. When you launch the new applications, log in with your Office 365 email address and password.

3 0
3 years ago
Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connecte
kkurt [141]

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

5 0
2 years ago
Other questions:
  • MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?
    11·1 answer
  • Write a program that implement a bubble sort ?
    5·1 answer
  • Which of the following is another term for a subfolder?
    9·1 answer
  • HELP PLEASE I WILL GIVE YOU 15 POINTS!
    8·1 answer
  • Pls explain the meaning of the word"INTERNET"​
    5·2 answers
  • Question # 6
    11·2 answers
  • What is a fire wall and how does it work
    14·1 answer
  • ________ can be written only once. The data cannot be erased or written over once it is saved.​
    9·1 answer
  • Print("Weight on Earth?")
    13·1 answer
  • A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!