1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
3 years ago
6

11.23. Sort the words in a sentence Define a function called sorted_word_list, which takes a sentence (a string) as a parameter.

Complete the function to make and return a list of the words in the sentence in sorted order.
Computers and Technology
1 answer:
anyanavicka [17]3 years ago
6 0

The function to make and return a list of the words in the sentence in sorted order is as follows:

def sorted_word_list(x):

   sorted_characters = sorted(x)

   return list(sorted_characters)

print(sorted_word_list("string"))

The code is written in python .

We declared a function named  sorted_word_list with a parameter x. The parameter accept a string.

sorted_characters is a variable that stores the sorted strings.

Then we return a list of the sorted string using the return statement.

Finally, we call the function using the print statement.

The values that are bolded in the code are python keywords.

read more: brainly.com/question/13973680?referrer=searchResults

You might be interested in
Question 4: What will be the output of the code? Show a complete analysis.
Eva8 [605]

Answer:

The output of the code is 8

4 0
4 years ago
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
Korolek [52]

Answer:

- agitator hacktivist

Explanation:

There are various terms which are described below:

activist cyber: when a person uses online campaigning by non-violation means like social media or other online platforms to create their activism is known as activist cyber.

agitator hacktivist: when a person uses illegal ways to bring change in political point by hacking or theft the information from the internet or bring the system down is known as agitator hacktivist.

ethical hacker: when a person uses legal ways to make a system safe from any type of malicious attack by removing the weakness of the system is known as the ethical hacker.

cybersquatter: when a person buys a domain name with the vision of selling it to the company needed it at very high prices, it is known as a cyber squatter.

so, according to the scenario the most appropriate answer is agitator hacktivist.

4 0
3 years ago
So im new how exactly does this point system work???​
lapo4ka [179]

Answer:

Ok so basicly every time you see a question and you can answer it you press on the answer bar you type in your answers then you will automaticly get points depending on the question you answer, you need to get more than 5+ to ask a question  of your own

Explanation:

5 0
3 years ago
Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
brilliants [131]

Answer:

False

Explanation:

The RAM does lose its memory when you turn off the computer, unlike hard drive which is slower but keeps memory

4 0
3 years ago
Read 2 more answers
How do i code........​
wlad13 [49]

Explanation:

What code are you talking about?

4 0
3 years ago
Read 2 more answers
Other questions:
  • Generally speaking, mobile sites are good for acquiring new customers and inspiring new relationships while mobile apps are good
    6·1 answer
  • Under what key category do page up and page down keys fall?
    15·1 answer
  • When paying bills online, a payee is:
    9·1 answer
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo
    9·1 answer
  • How does the financial market impact the economy?
    10·1 answer
  • Having friends who cause you stress can decrease your happiness, which can in turn
    13·2 answers
  • A customer is looking for a storage archival solution for 1,000 TB of data. The customer requires that the solution be durable a
    9·1 answer
  • What is the difference between a LAN and WAN? how do these two networks interact?​
    14·1 answer
  • Which of these can be a problem for people with accessibility issues? Select 4 options.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!