1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
2 years ago
9

Write a Python program string_functions.py that defines several functions. Each function re-implements Python's built-in string

methods
Computers and Technology
1 answer:
Svetach [21]2 years ago
3 0

Answer:

def length( mystring):

   count = 0

   for i in mystring:

       count += 1

   return count

def reversed( mystring):

   strlist = []

   for i in range(length(mystring)):

       strlist.append(mystring[(length(mystring) - 1) - i])

       txt = "".join(strlist)

   return txt

string = 'Yolanda'

print(reversed(string))

Explanation:

The python module defines two functions 'reversed' and 'length'. The length function counts the number of characters in a string variable while the reversed function reverses the string variable value.

You might be interested in
A subroutine may be used to refer to which of the following? Check all that apply.
Mamont248 [21]
A sub routine could refer to a method, procedure or function of sum sort
3 0
3 years ago
Read 2 more answers
The default (preset slide layouts are set up in ____ orientation.
Rama09 [41]
The default is normal view orientation.
3 0
3 years ago
Sam has sent Sally an email. Sally wants to answer him without manually typing in his email address. Which email option should s
tiny-mole [99]

Answer:

reply

Explanation:

hit the reply button to do that

3 0
3 years ago
Read 2 more answers
Please help me i’ll give you brainlist
Genrish500 [490]

answer: C

explanation: because it's the biggest of the given platforms

5 0
2 years ago
Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
zheka24 [161]

Answer:

The comparison is done based on their basic, principle, plaintext, key size, rounds, rounds name, security and speed. See the attached document.

Explanation:

The the attachment

8 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • Define the missing function. licenseNum is created as: (100000 * customID) + licenseYear. Sample output:
    10·2 answers
  • You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to
    5·1 answer
  • * Declare a variablecalled "car" of type "Car", and initialise its value to a new instance of the "Car"class.
    9·1 answer
  • The "fathers of the Internet" are Vinton Cerf and ________. Select one: A. Robert Kahn B. Robert Cailliau C. Tim Berners-Lee D.
    11·1 answer
  • You want to display the process of raising a scholarship request and its approval on a slide. Which element in the presentation
    5·1 answer
  • Signs of mastery include?
    10·1 answer
  • I'm having trouble changing my google account password
    12·1 answer
  • PLEASE HURRY!!!!<br> Look at the image below
    8·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!