1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alisha [4.7K]
3 years ago
8

g Write a recursive function all capital (L,start ,stop) that takes a string L and two integers. It returns a Boolean (True/Fals

e). The function will return True if there are ONLY upper case letters in the string from index start to index stop. The function will return False if there are any lower case letters in the string from index start to index stop.
Computers and Technology
1 answer:
Anton [14]3 years ago
8 0

Answer:

def recursive(L, start, stop):

         y = L[start:stop]

         print(y.isupper())

recursive("ALLow", 0, 3)

Explanation:

The code is written in python.

def recursive(L, start, stop):

The function is defined known as recursive. The function takes a string and 2 integers known as start and stop. The parameter L is a string and the other 2 parameter start and stop are integers which indicates the index range of the string L.  

y = L[start:stop]

A variable y is declared to store the string L with the index range from start to stop . Note start and stop are integers.

print(y.isupper())

The code prints True if the index range of the string L are all upper case else it print False.

recursive("ALLow", 0, 3)

This code calls the function with the required parameters L(string), Start(integer) and stop(integer)

 

You might be interested in
A single user/single ____ operating system allows only one user to run one program at a time
babymother [125]
Single tasking? If the OS's kernel doesn't allow multi-tasking, how does it service interrupts and handle I/O?
6 0
3 years ago
Read 2 more answers
Which of the following is a benefit of an enterprise resource planning (ERP) system? a. It broadcasts video and/or audio over th
Arturiano [62]

Answer:

Option(d) is the correct answer to the given question

Explanation:

The Enterprise resource planning is the business approach that enables an company to choose the automated application framework for building the project as well as to manage the certain infrastructure, facilities, and human capital that are related to the help desk operations.

  • The enterprise offers the chance to improve and optimize the technology used in a corporation.
  • All the other options are not related to the enterprise resource planning that's why they are incorrect option .
5 0
3 years ago
An outline is most like which of the following?
bija089 [108]
(b or a) im not sure
4 0
3 years ago
Read 2 more answers
A software developer is busy writing code. What phase of the project life cycle is he in?
ra1l [238]

Answer:

project execution

Explanation:

According to project management, a project has been completed in 4 phases.

The first phase of the project cycle is project initiation, in which goal, objectives and completion time of the project has been decided. In second phase, requirements to accomplish the task and planning for completion of goals is completed. It is called Project Planning. Third phase is the execution phase, it is very important phase of the project, where developers and designers starts working on the code and other hardware designing. In this phase working on desired outputs has been completed according to the inputs. The last phase is project closure, In this phase the project is handed over to the client after completion for the testing.

So, Project Execution is the phase, where developers are busy in writing code.

4 0
3 years ago
List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential c
Mamont248 [21]

The  three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials are:

  • Embarrassment and also the loss of customers as a result of data loss.
  • The loss of what we call a proprietary information.
  • The loss of what we call the sensitive business strategy information (such as  planned acquisitions, and other.).

<h3>What is E-espionage? </h3>

This  term e-Espionage is known to be a form of an unauthorized and it is often seen as a criminal access to a lot of confidential systems and information and it is one whose purpose is that they have or gain a lot of commercial or political advantage.

Hence, the types of espionage are:

  • Clandestine cell system.
  • Counterintelligence, etc.

Therefore, The  three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials are:

  • Embarrassment and also the loss of customers as a result of data loss.
  • The loss of what we call a proprietary information.
  • The loss of what we call the sensitive business strategy information (such as  planned acquisitions, and other.).

Learn more about electronic espionage from

brainly.com/question/312313

#SPJ1

3 0
1 year ago
Other questions:
  • Make sure to read all of these specifications carefully. Write a function, named array_shifter, that accepts an array of doubles
    12·1 answer
  • Why students might want headsets for their computers?
    11·1 answer
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • A file named data.txt contains an unknown number of lines, each consisting of a single integer. Write some code that creates two
    14·2 answers
  • Network is a process by which several protocols evolve to form a single product.
    13·1 answer
  • American company Software Unlimited is planning to expand its operations to the Bangor Republic where the group is the primary u
    7·1 answer
  • PLEASE HELP ASAP!!
    11·1 answer
  • As Kaydence reads a chapter in her anthropology text, she draws a network diagramming the relationships among the concepts descr
    15·1 answer
  • To quit, a user types 'q'. To continue, a user types any other key. Which expression evaluates to true if a user should continue
    7·1 answer
  • What is computer hardware part​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!