1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
15

Write a program that replaces words in a sentence. The input begins with an integer indicating the number of word replacement pa

irs (original and replacement) that follow. The next line of input begins with an integer indicating the number of words in the sentence that follows. Any word on the original list is replaced. Assume that the list will always contain less than 20 word replacement pairs. Ex: If the input is:
Computers and Technology
1 answer:
Paraphin [41]3 years ago
8 0

Answer:

try this

Explanation:

if name == '__main__':

words = input().split()

data = input()

for i in range(0, len(words), 2):

if words[i] in data:

data = data.replace(words[i], words[i + 1])

print(data)

You might be interested in
Is 37 words per minute when typing an okay grade?
Olegator [25]
It is okay but you should be able to type up to 60+ words per minute and keep doing that to practice then if you can get into a typing class.
4 0
3 years ago
Read 2 more answers
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
Sphinxa [80]

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

6 0
3 years ago
On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is calle
11111nata11111 [884]

Answer:

metric

hop count

Explanation:

6 0
3 years ago
How do you handle sensitive data?
arlik [135]

  1. <em>Take stock. Know what personal information you have in your files and on your computers.</em>
  2. <em>Scale down. Keep only what you need for your business.</em>
  3. <em>Lock it. Protect the information that you keep.</em>
  4. <em>Pitch it. Properly dispose of what you no longer need.</em>
  5. <em>plan </em><em>ahead</em>

<em>hope </em><em>it</em><em> helps</em>

7 0
3 years ago
Which of the following tasks would least help an individual achieve a goal to safely lose weight?
ozzi
To continue to look at motivational or inspirational quotes to remind them or to remember how far you have come and it is not time to give up!
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which Of the following components leads to slow computer performance when it becomes outdated
    12·2 answers
  • The answer for this question?
    5·1 answer
  • In Windows Vista, the Run command can be found in which application?
    6·1 answer
  • Does anyone know a good reason WHY to change your username.
    5·1 answer
  • Write a lottery program that will ask the user if they would like to pick 5 numbers (1-30) or if they would like to choose EZ Pi
    5·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • Where is 5G being used and how fast is it?​
    5·2 answers
  • Pls help I will give points
    11·1 answer
  • Cloud architects have been largely replaced by ScrumMasters.<br><br> True<br><br> False
    15·2 answers
  • Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!