1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
2 years ago
13

Calculate the number of Characters and the size of words “Caleb University Imota, Lagos”using Taro Yamen​

Computers and Technology
1 answer:
Fantom [35]2 years ago
6 0

The code to calculate the number of characters and the size of words is as follows:

x = input("Enter your text here: ")

char=0

word=1

for i in x:

   char = char+1

   if(i==' '):

       word=word+1

print("Number of words in the given string ",word)

print("Number of characters in the given string ",char)

   

<h3>Code explanation:</h3>

The code is written in python

  • The first line of code, we store the users input in a variable called x.
  • Then we initialise the variable char to zero.
  • The variable word is also initialise to zero
  • The we loop through the user's input and count the character
  • We also look for space to know the word, then count the words .
  • Finally, we print the number of word and the number of character.

learn more on python code here: brainly.com/question/20379340

You might be interested in
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
3 years ago
DHCP and FTP servers listen for and send network traffic on:
julsineya [31]

Answer: Well known ports

Explanation:

DHCP server transmit the response to the dynamic host configuration server protocol (DHCP) clients. DHCP default port is 67 and its port number is greater than the user data-gram specific port.

FTP server has its default listen at port 21 and file transition protocol(FTP) uses two transmission control protocol(TCP) connection for communication in the network. FTP passes information in port number 21, which is only used to send control information.

Well known port are use to identify the service of network on the public internet and private internet network. Therefore, port 21 and 67 are the well known ports.

 

5 0
4 years ago
Select four programs that make up system software.Select four programs that make up system software.
Alenkasestr [34]

Operating system

Boot code

Device drivers

Utilities

5 0
3 years ago
A person is trying to remember a list of 12 different items:
erastova [34]

Answer:

for me personally, it would help if the items were rearranged with like items, for example: snow, sleet, rain, and hail would go together.

so the list should look something like this:

    <u>weather conditions</u>

  • snow
  • sleet
  • hail
  • rain

    <u>fruits</u>

  • strawberry
  • banana
  • apple
  • orange

   <u>sports</u>

  • football
  • soccer
  • tennis
  • rugby

hope i helped <3 have a nice day

5 0
3 years ago
Read 2 more answers
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. Wh
fgiga [73]

Answer:

Financial identity theft

Explanation:

Financial identity theft is a fraudulent act that involves accessing someone's personal information without their consent or approval for fraudulent financial gain.

A typical financial identity theft is someone stealing your credit card information such as pin, cvv, etc. to make other financial transactions without your knowledge.

7 0
3 years ago
Other questions:
  • Judy forgot where she saved a certain file on her computer. Therefor, she searches for all files with a jpg file extension. Whic
    11·2 answers
  • Will upvote all answers
    7·1 answer
  • Într-o curte sunt G găini și O oi. Să se determine numărul de capete și numărul de picioare din curte.
    13·1 answer
  • All of the following are recommended to secure a wireless network EXCEPT:
    5·2 answers
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • List three tacos there are several from the opening page of the help and support center.
    5·1 answer
  • A process that rearranges the data and objects in a database to decrease its file size, thereby making more space available on y
    11·1 answer
  • I'm stupid and Idk how to take a pic on a Chromebook so, I want to know how to take a pic on a cromebook.
    11·1 answer
  • What do you call a collection of pre-programmed commands and functions used in programs?
    10·1 answer
  • A. Get a value for x from the user.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!