1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
14

You have a passage of text that needs to be typed out, but some of the letter keys on your keyboard are broken! You're given an

array letters representing the working letter keys, as well as a string text, and your task is to determine how many of the words from text can be typed using the broken keyboard. It is guaranteed that all of the non-letter keys are working (including all punctuation and special characters).
Computers and Technology
1 answer:
Romashka [77]3 years ago
6 0

Answer:

def broken_keyboard(text, characters):

   my_keys = [i.lower() for i in characters]

   count = 0

   words = list(text.split(" "))

   

   for word in words:

       word=word.lower()

       for char in word:

           if(char in my_keys or is not char.isalpha()):    

               count += 1  

   return count

Explanation:

The python function "broken_keyboard" returns the count of keys that can be used in the broken keyboard. It accepts two arguments, the strings of words and a list of character strings of letters that can be used in the keys.

You might be interested in
What is an example of new technology having a negative impact on sustainability?.
Sedbober [7]

An example of new technology that is having a negative impact on sustainability is using multiple servers to maintain a cryptocurrency operation.

<h3>How does technology influence sustainability?</h3>

The use of technology is one that have a lot of power to increase productivity, efficiency and cost savings, and others  but it is also known to have a negative effect on the environment.

Sustainability implies that one meets the needs of people without having to compromise the power of future posterity to meet their own needs.

Learn more about sustainability from

brainly.com/question/25350238

3 0
2 years ago
What is a URL (Please explain)?
GalinKa [24]
Definition

URL a.k.a uniform resource locater, is simply the address of a World Wide Webpage.

Sentence example:

"Type a URL into a browser's address bar."
5 0
3 years ago
One property of light that makes it possible to record the image of an object with the camera
KengaRu [80]

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

7 0
3 years ago
Complete the statement below with the correct term.
nikitadnepr [17]

Answer:

DOMAIN

Explanation:

A utility that provides names to each computer on a network is called a DOMAIN naming service.

4 0
3 years ago
With _____ transmission, both parties in a global network are connected at the same time, as in a phone call
butalik [34]

Answer:

<u>synchronous</u>

Explanation:

During synchronous transmission parties are exchanging messages in real time.

5 0
2 years ago
Other questions:
  • Will upvote all answers
    7·1 answer
  • Mark for review (Will be highlighted on the review page) 3. Which one of the following word processing features saves you the mo
    14·1 answer
  • Are you concerned that strangers may have access to the personal information you share on social media platforms? Why or why not
    10·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • Which of the following are ways that
    9·1 answer
  • Please tell fast plzzzzzzzzzzz.​
    9·1 answer
  • write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
    12·1 answer
  • Use the drop-down menus to describe the customize ribbon dialog box.
    11·1 answer
  • Identifiy the impact of new technology for your organizations <br>​
    13·1 answer
  • Given the following declaration, what is the value of b[ 1 ][ 0 ]? int b[ 2 ][ 2 ] = { { 1 }, { 3 , 4 } };
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!