6. Create a function called word intersection that prompts the user for two English words, and displays which letters the two words have in common. Convert each string to a set type in order to solve this problem.
Q: What exactly are cyber threats?
A: Introduction: An online threat is any danger that makes use of the internet to assist criminality. O...
Q: Describe the difference between the phrases serial schedule and serializable schedule and how they a...
A: A Serial schedule is one in which no transaction begins until the previous one has completed. The Se...
Q: Give two examples of typical fingerprinting algorithms.
A: Fingerprinting Algorithms: An arbitrarily large data object (for example, a computer file) is mapped...
Q: (a) Write a linear time ( 6(n) ) divide and conquer algorithm to calculate x", that is x is raised t...
A: A int calculate(int x,int n) { if (n==0) return 1; else if (n%2==0) // if...
Q: Computer science What are the prerequisites for considering edge computing and cloud computing in a...
A: Introduction: IoT System: IoT systems are systems that operate on the internet of things and are li...
Q: What is the main purpose of ROM in computer
A: Given To know about the ROM(Read only memory) in computer.
Q: 8.11 LAB: Movie show time display Java Please Write a program that reads movie data from a csv (comm...
A: ANSWER:-
Q: Find n the node from the end of a Linked List?
A: A linked list is a sequence of data structures, which are connected together via links. each node in...
Q: write a program to enter two numbers and print the largest number.
A: In the above code, it has been asked to print the largest number out of the two numbers, in the foll...
Q: Consider the following scenario: a software creates and manipulates a linked list, like follows: The...
A: Linked list: The linked list is a data structure idea that represents items and their storage in the...
Q: Discuss the ways in which electronic communication across diverse development teams might aid in the...
A: Introduction: Electronic connection is critical for an organization's development process to be tra...
Q: What Is the Supervisor Mode and How Does It Work?
A: Introduction: In iOS 5, Apple added a new feature called Supervision, which allows administrators mo...
Q: How would you go about changing the structure of a table using SQL? What kinds of generic transforma...
A: SQL stands for Structured Query language.
Q: Describe three system development approaches in system analytics.
A: Introduction: Three methods for system development in system analytics includes:
Q: Why is there a modem between a phone line and a communication adapter?
A: Introduction: To determine the modem area between a phone line and a communication adapter
Q: In a database, explain the representations of Identifying Relationships, Non-Identifying Relationshi...
A: Introduction: A non-identifying connection is one between two entities. An instance of the child ent...
Q: What exactly does computer scalability imply?
A: Introduction: Scalability is tied to both computer systems and business change. It refers to the cap...
Q: What are the differences between Google Spreadsheets and Microsoft Excel
A: Please find the answer below :
Q: In what way does the SMTP protocol serve a purpose?
A: Introduction: Simple Mail Transfer Protocol- (SMTP) is an application layer protocol. It is used to ...
Q: How have new types of communities evolved online, therefore avoiding the requirement to be together ...
A: Online community At its root, an online community or internet community is a group of people with a...
Q: Which of the following is NOT a string in the language of (a+b)(ba)*(b+ε)* a)abbbb b) bbaba c) a...
A: Given Language: (a+b)(ba)*(b+∈)* (a+b) : It generates only one length of string either a or b. (ba)...
Q: Question: Write a Python program for finding the solution of a given function f(x) = 2x + 3 cos x – ...
A: We need to define the two functions that compute the function and its derivative and perform and pri...
Q: Password Spraying almost always causes account lockouts and therefore is not a popular attack tactic...
A: In Password Spraying, attackers uses brute force attack in which hackers test multiple user accounts...
Q: Imagine you are at an interview for an entry-level position in IT security. The interviewer asks you...
A: Security Testing: Security testing is a sort of software testing that identifies vulnerabilities, ha...
Q: Computer science What are some of the most common difficulties that affect software?
A: Introduction: A software bug is a mistake, error, or flaw in computer software that causes it to gen...
Q: Give an explanation of the three integrity rules. Explain why each rule is being enforced and why it...
A: Data integrity is normally enforced in a database system by a series of integrity constraints or rul...
Q: Problem 2 A number in base 2 (binary) is a number such that each of its digits is 0 or 1. To convert...
A: Introduction :
Q: Q3 Devise a context-free grammar that generates L {wiw2 : w1, w2 E {0, 1}* and wi # w2}.
A: Context Free Grammar : - It's a type of formal grammar that generates all conceivable strings in a f...
Q: H.W Find the inverse to the following matrices by using adjoint method. 1 a. A = 1 5 2 -5 -4 2. 3.
A: First Adjoint(A) and |A| needs to be calculated for getting the A-1.
Q: When would you choose tacacs+ over RADIUS or Kerberos?
A: Introduction: Tacacs+ which is - a terminal access controller access control server, provides centra...
Q: What can you do to keep a keyboard that is used in a dusty environment safe and protected?
A: We can use different methods to protect the keyboard in dusty environments: 1) Covering the keyboard...
Q: In this short introduction, consider the benefits and drawbacks of connectionless protocols as a pos...
A: A connectionless protocol is used to describe communication between two network endpoints that does ...
Q: All freshmen must take writing. Caroline is a freshman. Therefore, Caroline must take writing. Selec...
A:
Q: Find a Topological Ordering Consider the following graph: a b. C e f Provide a topological ordering ...
A: Below is the answer to above question. I hope this will be helpful for you....
Q: Create an MVC application that passes the data of the user through a blade and gets the same data in...
A: The Answer is in Below steps
Q: Discuss how memory mapped files may be utilised in memory management with appropriate illustrations.
A: Introduction: memory-mapped files can be used in memory management as explained in the steps below.
Q: What is the function of the R.java file, which is automatically produced by the Android SDK, and why...
A: EXPLANATION AND ANSWER: R.java is an Android Asset Packaging Tool-generated file containing all the ...
Q: Construct the NFA that w dclac)* dc (aglbh)"dc
A: given - Construct the NFA that will accept the string of (dclac)* dc (gg|bb)*dc.
Q: evaluate a int data type using switch, the evaluated variable needs to be enclosed in single quotati...
A: The idea is that when building text strings that contain quote marks and apostrophes, you must be ca...
Q: Computer science What is the name of the word processing programme that comes with Microsoft Office...
A: Introduction: We've requested the name of the word processing program that comes with Microsoft Offi...
Q: Which data formats utilize quadwords and how many bits do they need?
A: We need to identify which data formats utilise quad words and how many bits do they need.
Q: This type of data transmission allows data to be delivered in both directions on a signal carrier at...
A: Introduction: The data transmission mode in the present circumstance is full-duplex.
Q: Abstraction is an important tool against complexity. It helps encapsulate constructs which would be ...
A: #include<iostream.h>#include<conio.h>#include<math.h> struct complex{float rel;flo...
Q: 2. Because it's such an uncommon format, Python does not include a csv module to make reading and wr...
A: 2) False Python contains csv module in Python's standard library. 3) True Syntax is correct
Q: What command returns a large list of all the files in your current directory, complete with permissi...
A: Introduction: The ls command shows and provides detailed information about files and directories in ...
Q: cted in the internet so you will be able to update your MS Office * true false 5. Format initi...
A: given- 4. Be sure that you are not connected in the internet so you will be able to update your MS O...
Q: Assume a computer has two network interface cards, NIC1, a Wifi USB, and NIC2, an on-board Ethernet....
A: The network interface card (NIC) enables computers to interact across a computer network via wired o...
Q: Write 2 Java classes for a task to compute the area of a right triangle. The first Java class has th...
A: import java.util.Scanner; public class UsingRightTriangle{ public static void main(String[] args) { ...
Q: Is it faster or slower for user processes to communicate with shared memory? Under what circumstance...
A: Introduction: Communication between processes in shared memory occurs via shared address space. As a...
Q: When should a network update be scheduled?
A: Introduction: Network: It is a group of computers that pool their resources and make them available ...
Step by step
Solved in 3 steps with 1 images
- 9. Create a function called word_sdifference that prompts the user for twoEnglish words, and displays which letters are in either the first word or thesecond word, but not both words. Convert each string to a set type in order tosolve this.7. Create a function called word_difference that prompts the user for twoEnglish words, and displays which letters are in the first word but not thesecond. Convert each string to a set type in order to solve this.8. Create a function called get_missing_letters that prompts the user fortwo English words, and displays which letters of the alphabet are in neither ofthe two words. Convert each string to a set type in order to solve this.
- Create a function that accepts a string (of a person's first and last name) and returns a string with the first and last name swapped. Examples NameShuffle("Donald Trump") - "Trump Donald" NameShuffle ("Rosie O'Donnell") - "O'Donnell Rosie" NameShuffle ("Seymour Butts") - "Butts Seymour" • There will be exactly one space between the first and last name. In c#Question 3.3. Write a function called remove. The code will remove the nth index character from a non-empty string.Create a function that takes a number (int) and returns a corresponding string of dashes. Examples: num_to_dashes(1) ➞ "-" num_to_dashes(5) ➞ "-----" num_to_dashes(3) ➞ "---"
- Write a function, young_john(people), that returns True if the dictionary people contains the key "John" with a value of 19. It should return False otherwise. like this def young_john(people):Please fill the blanks for C. /*getchar VS scanf*/ #include<stdio.h> #define length 70 //Putting all function headers to top __1__ print_scanf(); __2__ print_getchar(); int main() { //print 2 sentences using getchar() for(int i = 0; i < 2; i++) { print_getchar(); } //print 2 sentences using scanf() for(int i = 0; i < 2; i++) { print_scanf(); } return 0; } //Function to print using getchar void print_getchar() { __3__ str[__4__]; //create a string called str with length defined above printf("Enter your sentence for getchar:"); int i = 0; while(1) //run forever,unless there's a break or return { /*save user's input to curChar since we need to check 2 cases: Case 1. if the inputted character is a letter we save curChar to our string (array of char) Case 2. if it's a new line character.…Write a program that reads in a line consisting of a students name, Social Security number, user ID, and password. The program outputs the string in which all the digits of the Social Security number and all the characters in the password are replaced by x. (The Social Security number is in the form 000-00-0000, and the user ID and the password do not contain any spaces.) Your program should not use the operator [] to access a string element. Use the appropriate functions described in Table 7-1.
- Exercise #3 o Write a program averageLuminance(picture) which takes as input a picture uses functional programming to calculate the average luminance of the picture’s pixels. Use the helper function def luminance(pixel): r = getRed(pixel) g = getGreen(pixel) b = getBlue(pixxel) y = 0.2126 * r + 0.7152 * g + 0.0722 * b return y Within your main program, use map and luminance to create a list of luminances from the list of pixels. This is an example answer to help you formulate an answer for the question above: # Exercise 3 def isDocument(fileName): listOfEndings = [ ".docx", ".txt", ".rtf" ] for ending in listOfEndings: if fileName.endswith(ending): return True return False def recursiveListDocuments(directory=os.getcwd()): files = os.listdir(os.path.normpath(directory)) for file in files: fileName = os.path.normpath(directory + "/" + file) if isDirectory(fileName): recursiveListDocuments(fileName) else: if isDocument(fileName): print fileNameExercise 1 Write a function that reads the words in words.txt and stores them as keys in a dictionary. It doesn’t matter what the values are. Then you can use the in operator as a fast way to check whether a string is in the dictionary.The name of the get line function won't print out in case: 3 It prints out the rest of the data but not the name. #include "stdafx.h" #include <iostream>#include <limits>#include <cstdlib> #include <ctime>#include <string>#include <vector>#include <cctype>#include <iterator>#include <algorithm>#include <cmath>#include<windows.h>#include <conio.h> using namespace std; struct donor{ string donor_name[50];double donor_amount[50];int department_donation[50];}; string find_name; double *NHTS;double *PBL;double *PTK;double *SEA;int search_display;int contributor;int display;int choice; int main(){here:cout << "\n";cout << " ************************************************************" << endl;cout << " ** ==Menu== **" << endl;cout << " ** **" << endl;cout << " ** **" << endl;cout << " ** **" << endl;cout << " ** 1. Add a contributor. **"…