1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
3 years ago
9

Create a list of lists, named hamsplits, such that hamsplits[i] is a list of all the words in the i-th sentence of the text. The

sentences should be stored in the order that they appear, and so should the words within each sentence. Regarding how to break up the text into sentences and how to store the words, the guidelines are as follows: Sentences end with '.', '?', and '!'. You should convert all letters to lowercase. For each word, strip out any punctuation. For instance, in the text above, the first and last sentences would be: hamsplits[0] == ['and', 'can', 'you', 'by', ..., 'dangerous', 'lunacy'] hamsplits[-1] == ['madness', 'in', 'great', ..., 'not', 'unwatchd', 'go']
Computers and Technology
1 answer:
photoshop1234 [79]3 years ago
5 0

Answer:

Explanation:

The following code is written in Python. It takes in a story as a parameter and splits it into sentences. Then it adds those sentences into the list of lists called hamsplits, cleaned up and in lowercase. A test case is used in the picture below and called so that it shows an output of the sentence in the second element of the hamsplits list.

def Brainly(story):

   story_split = re.split('[.?!]', story.lower())

   hamsplits = []

   for sentence in story_split:

       hamsplits.append(sentence.split(' '))

   for list in hamsplits:

       for word in list:

           if word == '':

               list.remove(word)

You might be interested in
What item on a business card is generally the most prominent?
AveGali [126]
The most prominent
Company name that's most important
3 0
4 years ago
Read 2 more answers
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
Built-in user accounts include only the Administrator account created during Windows installation True False
Semenov [28]

Answer: True

Explanation:

When an OS is installed, the first account created is the built -in user account. It is the administrator account for the purpose of recovery and to facilitate the set up.

8 0
3 years ago
Write a 5 paragraph essay about this virus, who created it, why, what damage did it cause, and did they go to jail. The worst co
zheka24 [161]

The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

<h3>What does MyDoom virus do?</h3>

The MyDoom virus was said to be the one that brought about a lot of loss in the whole globe.

The  MyDoom is known to be an effective worm that was created to make zombies out of lots of thousands of computers.

Note that the Hackers are able hijacked terminal to wage a kind of  denial of service (DoS) attack to any firm that they do identified.

The virus is known also as Novarg as it is a“worm,” sthat do pread by mass emailing.

Therefore, The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

Learn more about Virus from

brainly.com/question/14887682

#SPJ1

6 0
2 years ago
Did y’all enjoyed project next phase 3 and The 4 revamped heroes
ryzh [129]

Answer:

it was good i liked it

Explanation very good

4 0
3 years ago
Other questions:
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • PLEASE HELPPPPPPP
    15·1 answer
  • what is the ability to carry out financial transactions using mobile devices such as tablets and phones?
    5·1 answer
  • Cpu coolers are typically made using what two different types of materials?
    6·1 answer
  • What is a method to exit wordprocessing software
    14·1 answer
  • 2x + 3y = 11<br>y = x-3​
    8·2 answers
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • Which of the following was (and still is) used by computer programmers as a first test program?
    13·2 answers
  • Which operating system (OS) is used to run your laptop?
    15·2 answers
  • PLEASE HELP!
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!