1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
baherus [9]
3 years ago
15

Your program Assignment Write a program that reads a sentence as input and converts each word to "Pig Latin". In one version of

Pig Latin, you convert a word by removing the first letter, placing that letter at the end of the word, and then appending "ay" to the word. Here is an Example: English: I SLEPT MOST OF THE NIGHT Pig Latin: IAY LEPTSAY OSTMAY FOAY HETAY IGHTNAY

Computers and Technology
1 answer:
xxTIMURxx [149]3 years ago
5 0

Answer:

theSentence = input('Enter sentence: ')

theSentence = theSentence.split()

sentence_split_list =[]

for word in theSentence:

  sentence_split_list.append(word[1:]+word[0]+'ay')

sentence_split_list = ' '.join(sentence_split_list)

print(sentence_split_list)

Explanation:

Using the input function in python Programming language, the user is prompted to enter a sentence. The sentence is splited and and a new list is created with this statements;

theSentence = theSentence.split()

sentence_split_list =[ ]

In this way every word in the sentence becomes an element in this list and individual operations can be carried out on them

Using the append method and list slicing in the for loop, every word in the sentence is converted to a PIG LATIN

The attached screenshot shows the code and output.

You might be interested in
Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she instal
melamori03 [73]

The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.

<h3>What are some ways to handle against email phishing attacks?</h3>

People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:

  • Be on guard towards the  handing of sensitive information.
  • Never click on alarming messages.
  • Do not open any form of attachments that is suspicious or strange.

Learn more about  phishing attacks from

brainly.com/question/2537406

8 0
2 years ago
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
sveticcg [70]

Answer:

B,C,E your welcome

Explanation: i just took the test

3 0
2 years ago
Arman, a friend of your dad, has a computer running Windows 7 and wants to perform an upgrade. He has only 3GB of RAM in his com
torisob [31]

Answer:

Low memory?

So to fix the problem you could add more memory to the machine.

Explanation:

8 0
3 years ago
The blank method returns an integer between the two provided numbers. It can take the value of either of the provided numbers
Elis [28]

Answer:random

Explanation:

A random method returns a number between zero and one.

4 0
3 years ago
Identify aspects of contemporary society that might lend themselves to a Commedia-type scenario or short play (ex: the British R
Helen [10]

Answer:

pls type clearly to understand i can't understand

4 0
3 years ago
Other questions:
  • Which of the following describes an acceptable print resolution?
    7·1 answer
  • What does pagination mean in Microsoft Word?
    10·2 answers
  • How to write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator).
    13·1 answer
  • What is word processing and word wrap?
    5·1 answer
  • @anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
    11·2 answers
  • Express 0.0005 x 10-4 farads as picofarads
    5·2 answers
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • What do financial planning skills ultimately enable an individual to do?
    10·2 answers
  • Microsoft vs Sony who wins ​
    13·2 answers
  • List six features of the Microsoft ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!