1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
13

Implement the following functions def normalize(input_string): input: a string of text characters. Each character is called a to

ken. output: an array of 'letters'. Each item in the array corresponds to a letter in input_string (in lowercase) for example, the input "O.K. #1 Python!" would generate the following list: ['o','k','p','y','t','h','o','n'] take a look at the Python documentation for string functions (url given below); don't try to replace, delete, or substitute -- if the 'token' is a letter it passes the test.
Computers and Technology
1 answer:
Crank3 years ago
6 0

Answer:

  1. def normalize(input_string):
  2.    output = []
  3.    for c in input_string:
  4.        if(c.isalpha()):
  5.            output.append(c.lower())
  6.    
  7.    return output
  8.    
  9. print(normalize("O.K. #1 Python!"))

Explanation:

Firstly, create a function normalize that takes one input string (Line 1).

Next, we create an empty list and assign it to output variable (Line 2). This list will hold all the letters from the input string.

Create a for loop to traverse each of the character in the input string (Line 4) and then use isalpha() method to check if the current character is a letter (Line 5). If so, add the letter to output list (Line 6). Please note we can convert the letter to lowercase using lower() method.

After completing the loop, return the output list (Line 8).

We can test the function using the sample input given in the question (Line 10) and we shall get ['o', 'k', 'p', 'y', 't', 'h', 'o', 'n']

You might be interested in
Your sister wants to purchase Microsoft Office 2013 for her new laptop. She doesn't want to pay for a subscription, and she want
Pavel [41]

I would buy Microsoft Office 2013 Home and Business Pc License. Its better to purchase the product in all rather than a subscription.

5 0
3 years ago
Software applications called _____ provide the means to record information that passes through a computer or router that is hand
Bezzdna [24]

Answer:

sniffer programs

Explanation:

Software applications called <u>sniffer programs</u>  provide the means to record information that passes through a computer or router that is handling Internet traffic.

3 0
3 years ago
If you have a field that needs a unique number that's one greater than the last field entry, what field type would you typically
Alik [6]
AutoNumber it can do it all alone and put the number(If you don’t know the number to put).
4 0
3 years ago
During which part of geologic time were dinosaurs most common?
ANTONII [103]
The answer is C. Jurassic.
6 0
3 years ago
Read 2 more answers
Friedman (1999) argues that "we are wrong to base health promotion in all societies on a Western framework for human development
Dovator [93]

Answers with Explanation:

A. Give at least two reasons why he believes this.

Friedman believes that health promotion based on Western framework for human development<em> unfairly criticizes the other cultures in the society.</em> Western framework values intellectual and economic achievements alone, which then <em>results to putting a great expense on the other essential human qualities.</em>

B. What crisis does he believe is happening in the most economically developed countries?

The crisis that is happening in the most economically developed country is the <em>devaluing of the other aspects which other human beings value in terms of individuality or families.</em>

C. What does he recommend to improve the programming for adolescent health?

He recommends that if changes were to be implemented for adolescent's health, <u>these have to be properly assessed regarding their effect on the adolescent's development,</u> including his/her family and other social relationships. Next is to check whether<u> it doesn't conflict with the adolescent's culture in the community that he belongs</u>. If it does, then it is essential to change it or find <em>another way which fosters</em><em> </em><em>the same goal.</em>

7 0
3 years ago
Other questions:
  • What's the ASCII code for boy ?
    15·1 answer
  • If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
    7·1 answer
  • Please help will mark brainiest
    8·1 answer
  • Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read
    6·1 answer
  • Using the media as equipment for living. Explain how you would use some form of media to serve a purpose in your life—and what t
    6·2 answers
  • A computerized spreadsheet program is useful for
    6·2 answers
  • A field with the extend data type can contain an attached file, such as an image, document, chart, or spreadsheet.
    6·1 answer
  • Refers to the capacity to form bonds with particular
    11·2 answers
  • Explain why it is important that the device registration is the last thing that is done in the initialization routine of a devic
    10·1 answer
  • What feature should you enable to prevent the sidhistory attribute from being used to falsely gain administrative privileges in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!