1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
3 years ago
5

In English there are five vowel letters in the alphabet: A, E, I, O, U. For the purposes of this exercise we won't count Y as a

vowel. Write a program that takes a line of text as input and outputs the number of vowels in the words. Make sure to account for both uppercase or lowercase. You are encouraged to write functions and test code in IDLE before submitting your solutions here.
Computers and Technology
1 answer:
Vikki [24]3 years ago
3 0

Answer:

s = input("Enter a sentence: ")

count = 0

for c in s:

 if "AEIOU".find(c.upper()) >= 0:

   count = count + 1

print ("There are %d vowels." % (count))

Explanation:

Just for fun, here is a super short one using regex:

import re

s = input("Enter a sentence: ")

print ("There are %d vowels." % len(re.findall("[aeiou]",s.lower())))

You might be interested in
Why have countries requested for the removal of content?
Kipish [7]
These links should help u:
https://support.google.com/transparencyreport/answer/7347744?hl=en

https://searchengineland.com/most-censorship-and-content-takedown-requests-come-from-us-says-google-...
5 0
3 years ago
What is modem please give me answer​
rjkz [21]

Answer:

a combined device for modulations and demodulations

4 0
3 years ago
What project started the development of inter-network connections using tcp/ip that has evolved into the internet today.?
rosijanka [135]
Dial Up, help start it
3 0
3 years ago
A firewall relies on or a that determine what traffic should or should not be allowed to pass through
likoan [24]
A firewall determines what external network traffic(internet) should or should not be allowed to pass internal network(computer). A firewall is network security that protects software and hardware from untrusted sites that may have viruses, worms, and bugs that are detrimental to the computer.
5 0
3 years ago
Who i am<br> I have buttons showing the icons for the corresponding tools.
nata0808 [166]

Answer:

<h3>Windows 10</h3><h3 /><h3> </h3><h3>To enable the Home Button > Click ellipses > Select Settings </h3><h3> </h3><h3>Enable Show Favorites Bar </h3><h3> </h3><h3>Settings > Select View Advanced Settings </h3><h3> </h3><h3>Enable Show the Home Button </h3><h3> </h3><h3>Downloads are automatically saved to your Downloads Folder </h3><h3> </h3><h3 />

Explanation:

<h3>#hopeithelps</h3><h3>stay safe and keep well</h3><h3 /><h3>mark me as brain liest pls</h3>
7 0
3 years ago
Other questions:
  • An email address is made up of all of the following parts except
    13·2 answers
  • “Green Technology” is also known as what?
    11·1 answer
  • What names of websites of presentation or visualization <br>​
    15·1 answer
  • Within an event-driven program a component from which an event is generated is the ____
    10·1 answer
  • Consider three different processors P1, P2, and P3 executing the same instruction set. P1 has a 3 GHz clock rate and a CPI of 1.
    8·1 answer
  • A type of touch screen that can be up to four feet by six feet is a(n) _____.
    12·2 answers
  • In order for the image tag in an HTML file to function properly, the file named square.png must be located where?
    5·2 answers
  • When you login to your blogging account. The first screen with all controls, tools and functions is called .... Select one: a. D
    10·1 answer
  • 1. Using a microphone to create an audio file to accompany a message is an example of how data is processed and sent to an outpu
    9·1 answer
  • Can you predict what changes will come to data storage in the next decade? 
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!