1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
14

Assign decoded_tweet with user_tweet, replacing any occurrence of 'TTYL' with 'talk to you later'. Sample output with input: 'Go

tta go. I will TTYL.' Gotta go. I will talk to you later.

Computers and Technology
2 answers:
nekit [7.7K]3 years ago
8 0

Answer:

I am going to use the Python programming language to answer this. The source code is given below:

print("Enter your tweet here")

user_tweet = input()

decoded_tweet = user_tweet.replace('TTYL', 'talk to you later')

print("This is the decoded tweet: ")

print(decoded_tweet)

Explanation:

In the program the replace() module was used to replace 'TTYL' with 'talk to you later.'

Attached is the screenshot of the output.

stich3 [128]3 years ago
4 0

Answer:

I am going to use the Python programming language to answer this. The source code is given below:

print("Enter your tweet here")

user_tweet = input()

decoded_tweet = user_tweet.replace('TTYL', 'talk to you later')

print("This is the decoded tweet: ")

print(decoded_tweet)

Explanation:

In the program the replace() module was used to replace 'TTYL' with 'talk to you later.'

Attached is the screenshot of the output.

You might be interested in
Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
pashok25 [27]

Answer: Incident response plan

Explanation: Incident resource plan is the strategy that is created in the form of plan in the information technology (IT) department. This plan is made for the detection of the staff, issue or problem that arise, loss of data etc. This plan works in the situations like cyber-crime, data hacking etc.

Other options are incorrect because they done have any well defined strategy for the hacking or attacking situation rather control the security issues. Thus the correct option is incident response planning.

7 0
3 years ago
A gui allows you to interact with objects on the screen such as icons and buttons true or false
gizmo_the_mogwai [7]
The answer to your question is true
5 0
3 years ago
I need help!
tekilochka [14]
True!!!!!!!!!!!!!!!!!
6 0
3 years ago
Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
xeze [42]
<span>Sarah learns she may only utilize SecNet 54 and SecNet 11 for transmitting classified information up to top secret.
</span>

SecNet 11 Plus is a family of encrypted <span>802.11b wi-fi <span>networking products. The Army has also approved</span></span> SecNet 11<span> as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.</span>

7 0
3 years ago
The definition of network is:
kondaur [170]

\text{Hello there!}

<u>Networks were originally used as a government weapon 61 years ago</u> to <u>communicate information</u> such as data and research. However, individual networks were eventually discontinued by the government and made open to the public to use for things such as PAN, LAN, MAN, WAN, SAN, and so on.

<u>Our internet today is capable of communicating with bilions of computers.</u> This is possible due to your modem using radio wave-like speeds to connect to your ISP. Your ISP then connects to a larger network, which is connecting to thousands of other networks. You see, <u>the internet is just a large network of networks that are connected through very fast radiowaves</u>. However, it is not just a single network being used anymore; it's thousands of them. The term, "internet" was used to describe this large selection of networks. In short, <u>B</u><u> would be incorrect. </u>

The worldwide web is a protocol used by the internet to connect to select websites favourably from whoever's using it. This obviously would not define the network, as this is something that's used by it. Furthermore, <u>A</u><u> would not be correct.</u>

As described already, the network was a selection of computers used to communicate information to each other. <u>C </u><u>would not be correct </u>as it states that there is only one computer being used.

\fbox{Therefore, D would be the correct answer.}

\rule{300}{1.5}

6 0
3 years ago
Other questions:
  • Drag the correct type of update to its definition.
    5·1 answer
  • What operator is used to create a validation rule? A. – B. / C. &lt; or &gt; D. +
    12·1 answer
  • I want to know all part of computer system?
    9·2 answers
  • . Does Zuckerberg believe in the thought that “the endpoint is when you sell the
    15·1 answer
  • A patient presents at an outpatient urgent care facility with an acute illness and is seen by a provider. A detailed history wit
    13·1 answer
  • i got a set of headphones and when i plug them into my speakers the right side only works how do i fix the left side of them
    12·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • Ok.,so i have a sopitify account and by accident i pressed the downlaod on button and it says start you free trial i pressed tha
    11·2 answers
  • Assume the size of an integer array is stored in $s0 and the address of the first element of the array in the memory is stored i
    10·1 answer
  • A search expression entered in one search engine will yield the same results when entered in a different search engine.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!