1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
5

Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs wi

ll be most helpful?
A. counter module

B. while loop

C. for loop

D. mean module
Computers and Technology
1 answer:
arlik [135]3 years ago
6 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is A: counter module.

Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.

Other options are not correct because:

While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.

You might be interested in
We study computer ___________ to become familiar with how circuits and signals collaborate to create working computer systems.
Arisa [49]

Answer:

organization

Explanation:

We study computer organization to become familiar with how circuits and signals collaborate to create working computer systems.

6 0
3 years ago
The process of transduction is analogous to a. a rocket ship breaking through the Earth’s atmosphere. b. a sailboat utilizing th
maks197457 [2]

Answer:

The answer to this question is "none of these"

Explanation:

Transduction is also known as a virus, that moves in the genetic information through each type of bacteria to another, and in the computer science it is used in the machine learning, that provides testing, and other options were wrong, that can be explained as follows:

  • Option a, It can't use in a rocket ship for breaking.
  • Option b, It can't utilize glide along the water.  
  • Option c, It provides hack and test systems, and not for communication.
  • Option d, It uses a programming language to test virus, that's why it is wrong.
6 0
3 years ago
The manager of a department store decides to give different gifts based on different numbers of purchases that people make. Ther
dusya [7]

<u>The statement will help the manager keep track of the gift items to give away:</u>

The manager in charge of a department store, he or she decided to give the gift for certain product purchased by customer, He or she has to create a product code which is called buy and get as a one category and  attach the list the product.

Once customer has purchased item, software should able to deduct the stock properly.

So programming statement should have list of product as singe product to do the necessary sales.

Software also keep track on stock deduction and keep sales of gift item as free of cost product.

5 0
4 years ago
What design aspects can you change in a table with the shading options? (Select all that apply.)
timurjin [86]
Fill for cells in the table
5 0
3 years ago
The Bureau of Justice Statistics was able to determine that what % of identity theft victims were unable to determine how their
Iteru [2.4K]

Answer:

68%

Explanation:

Identity theft is a kind of crime that is committed when individuals are impersonated. The person who commits the crime assumes the personality of the victim. This could happen in the case of internet financial crimes where the financial details of individuals are stolen and then used to make unauthorized transactions.

The Bureau of Justice report on identity theft victims in 2014 shows that among the victims of this act only 32% knew how the offender was able to obtain their information. This would mean that 68% of the victims were unable to determine how their information as stolen.

6 0
4 years ago
Other questions:
  • You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to
    5·1 answer
  • How do open online courses help with independent learning? (1 point)
    13·2 answers
  • Which of the following statements is true about scalability? Choose 3 options.
    9·2 answers
  • The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that integrates the inf
    14·1 answer
  • is this statement true or false ? satelite and remote sensing devices have helped cartographers make more accurate maps with spe
    12·1 answer
  • What are the paragraph different formatting paragraph tools?draw its icon and state its function.
    13·1 answer
  • National Computer Corporation (NCC) employs Cynthia as an agent. NCC gives her an exclusive territory in which to sell NCC produ
    6·1 answer
  • Which of the following is another term for a subfolder​
    14·1 answer
  • write a 2d array c program that can capture marks of 15 students and display the maximum mark, the sum and average​
    9·1 answer
  • If I use the command right(90), which way will Tracy turn?<br> If correct I mark brainlist
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!