1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
10

Write a program that reads a list of words. Then, the program outputs those words and their frequencies. Ex: If the input is: he

y hi Mark hi mark the output is: hey 1 hi 2 Mark 1 hi 2 mark 1
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
4 0

Answer:

#Declare variable to get the input

#list from the user

input_list = input()

#split the list into words by space

list = input_list.split()

#Begin for-loop to iterate each word

#to get the word frequency

for word in list:

#get the frequency for each word

frequency=list.count(word)

#print word and frequency

print(word,frequency)

Explanation:

This program that we are told to write will be done by using python programming language/ High-level programming language.

The question wants us to write a program in which the output will be as below;

hey 1

hi 2

Mark 1

hi 2

mark 1

Just by imputing hey hi mark hi mark.

Just copy and run the code below.

#Declare variable to get the input

#list from the user

input_list = input()

#split the list into words by space

list = input_list.split()

#Begin for-loop to iterate each word

#to get the word frequency

for word in list:

#get the frequency for each word

frequency=list.count(word)

#print word and frequency

print(word,frequency)

You might be interested in
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
How to learn python ?
laila [671]

Answer:

https://www.python.org/about/gettingstarted/

Explanation:

its a site i used

7 0
3 years ago
Who watched Unus Annus??? (If you did what was your favorite part?​
quester [9]

This video was completeley unedited was a banger, and so was the vid where they made robot amy. that was hilarious.

But since it is now Post Mortem all say here is...

Unas Annus. Memento Mori.

It sure was fun.

3 0
3 years ago
6. Consider a circle of diameter d cm.
blagie [28]

Circles

Area of Circle is \pi d^{2} /4

Total percentage increase in the area of the modified circle is 69%

Explanation:

(a)  Given the diameter of the circle be d

Then the radius of the circle = r = d/2

and the area of the circle is given by:

 

Area(A) = \pi r^{2}  

A = \pi (d/2)^{2}

A = \pi d^{2} /4

The area of circle is \pi d^{2} /4

(b)

The increase in percentage while changing the dimensions is given by the formula  :

Total % increase = a% + b% - (a% * b%)/100

Where ,

a% is the percentage increase in side a

b% is the percentage increase  in side b

Let the percentage increase in radius is : a%

Since a% = b%

So the formula is

Total increase % = a% + a% + (a% * a%)/100

Given here the diameter of the circle increases by 30% so a =30

Therefore, putting the value of a in the formula

Total increase % = 30% + 30% + (30% *30%)/100

Total increase % = 60% + 9%

Total increase % =69%

Therefore the total percentage increase in the area of the modified circle is 69%

8 0
3 years ago
The field on which records are sorted is called the composite primary key.A. TrueB. False
Gemiola [76]

Answer: TRUE

Explanation: Composite is simply used to refer to the existence of more than one event or pattern. The composite primary key as related to database management query refers to the synergy or combination of more than one field or column of a specified table which is used in sorting or accurate identification of a record. When attributes are combined, that is more than one, it assists in narrowing down the returned records such that records which are close and exclusive to the options specified are returned. Usually, the more the number of columns which makes uo the case mpoaite keys, the more unique and well sorted our returned output is.

4 0
4 years ago
Other questions:
  • A ____ is a prewritten formula that is built into excel.
    6·1 answer
  • The instruction set for a microprocessor is unique and is typically understood only by the microprocessors of the same brand.
    7·1 answer
  • Which two statements are true regarding the user exec mode? (choose two.)?
    6·1 answer
  • PLEASE HELP!!!!!!!!!!!
    15·2 answers
  • Information management should supply information in the form of meaningful images rather than raw data, which requires that we h
    13·1 answer
  • ______ is the ability of a system to do more than one thing at a time. A. Multibusing c. online processing b. Multiprocessing d.
    13·1 answer
  • Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to
    8·1 answer
  • Lucia is using the American Psychological Association (APA) style guidelines to writer her research paper. What is her most like
    5·2 answers
  • Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorilla
    6·1 answer
  • What are two reasons to tie cables up and out of the way inside a computer case?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!