Design and implement an application that reads a string from the user, then determines and prints how many of each lowercase vowel (a, e, i, o, and u) appear in the entire string . Have a separate counter for each vowel. Also count and print the number of nonvowel characters .
SPECIFICATION OF PROMPTS, LABELS AND OUTPUT : Your code should use the prompt "enter string : ". After the input is read, there are six lines of output , each starting with a different label: "a: ", "e: ", "i: ", "o: ", "u: ", "other: " in that order. After each label is the required count.
For example: if "aardvark heebie jeebies" were read in,
Answer:
The biggest stressor in my life is certainly accountancy. I need to divide my earning among my family members, however, I had to work as well. and hence, I wanted to cover this automatically. I decided to surf the internet. I realized I need to first find the keyword. And I found it as budgeting and the monthly income. I got all my answers. The source explained to be how I can transfer a part of my income to each of my family members, and also to grocery sites like Amazon, the daily service provider who provide various home servants, for electricity bills, yearly water tax, house tax, and all my expenses. And now I can relax and work, as with one click, I can now pay all my bills, as well as I can order for instant food deliveries, call plumbers, electricians, etc any time and everything I can think of. I have no headache now, and I can devote all of my hours to work. And that has also increased my income since I went automatic.
Explanation:
Thus, we need to first find the keyword, and then find the best site from the list that appears. And then we need to research through that site and find the solution.We can make use of the search engine commands as well.
Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.
Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".
Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.
Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.
Answer:
A MIPS Assembly procedure return to the caller by having the caller pass an output pointer (to an already-allocated array).
Answer:
Following are the program in the Python Programming Language.
#set variable for input year by user
y=int(input("Enter year: "))
#set variable and initialize to 0
flag=0
#check condition that year is divisible by 4
if(y%4==0):
#check that the year is divisible by 100
if(y%100==0):
#check that the year is divisible by 400
if(y%400 ==0):
#then initialized flag to 1
flag=1
else:
#otherwise remain 0
flag = 0
else:
flag = 1
else:
flag = 0
#for break line
print()
#check that if flag is equal to 1
if(flag==1):
print("29 days in February")
#otherwise else
else:
print("28 days in February")
<u>Output</u>:
Enter year: 2020
29 days in February
Explanation:
<u>Following are the description of the program</u>:
- Set variable 'y' in which we get integer value as year from the user.
- Set variable 'flag' and initialize that variable to 0.
- Then, we set if-else conditional statements to check that the variable 'y' is divisible by 4 then, we check that the variable 'y' is divisible by 100 and we also check that the following variable is divisible by 400.
- Finally, we set if-else conditional statement to check that the variable 'flag' is equal to 1 then print about the leap year, otherwise it print about the non-leap year.