Question

goal is to allow the user to input two strings, a single letter to search for an arbitrary word, and then to print out the number of times that letter appears in the word.

must only use conditionals and while loops

needs to be case sensitive 

need help starting the code to read the letters

attached picture is what the program should accomplish 

Expand

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Science

Programing Language

Related Computer Science Q&A

Find answers to questions asked by students like you.

Q: Compute the sum of first 10 terms of Fibonacci series. Write a program in C++ language.  Note- Prin...

A: Write a program to compute the sum of first 10 terms of Fibonacci series and print the sum obtained ...

Q: Provide the details of 10 notable global IT and computer science firms

A: Here is the answer:  

Q: You are given a promotion to project management as a programmer, but you believe you can contribute ...

A: Introduction: There will be a distinct set of project management software for each business. Demonst...

Q: Consider the disk with following characteristics. Computer Network   • Transfer speed of 107 bytes...

A: Introduction : Given , Transfer speed of 107 bytes/sec Rotational Speed = 10000 RPM  Find the throug...

Q: You've been given four alternative machine learning algorithms to employ for supervised learning on ...

A: A subset of artificial intelligence and computer science, machine learning utilizes data and algorit...

Q: ple access system, each user is assigned an 80 kHz channel for full-duplex communication. There are ...

A: According to the question we need to answer- In an FDMA-based multiple access system, each user is a...

Q: e that a Bayesian classifier returns the following outcomes for a binary classification pro rted by ...

A: Q.

Q: plain the importance of the use of computer technology into your day to day life?

A: Required: Explain the importance of the use of computer technology into your day to day life?

Q: Data structure & Algorithum Java program Write code that accomplishes the following tasks: Consider...

A: Given, Requirements: Declare and initialize Bag object named letter. Add several one-letter strin...

Q: 3. Present the following numbers using floating point notation b. 3 00010 c. 65 50010 d. 3678.7510

A: Click to see the answer

Q: xplain why plagiarism is unethical.

A: Required: Explain why plagiarism is unethical.

Q: we discuss Predictive, Diagnostic, and Prescriptive in the context of Machine Learning

A:   Diagnostic Analytics help us to understand why something happened in the past. Predictive Analyti...

Q: final print statement.  When I plugged in print(2**3) or 2^3, the result was 8, which is accurate. W...

A: Q. Hi, I am working on a problem in beginner's Python and wanted to make sure I was explaining the r...

Q: Arrange the following activities to form a general software engineering process model: I. Manufactur...

A: The answer is

Q: For supervised learning on a dataset, you've been given four alternative machine learning algorithms...

A:   The algorithm which are best in Supervised learning are:Linear Regression, Naïve Bayes, KNN, LVQ, ...

Q: Please dont use any inbuilt method. Write a code in python to find the sum of. All values. Of an ar...

A: Required :- Please dont use any inbuilt method. Write a code in python to find the sum of. All value...

Q: Write a progprogram in python language that take a string from user and print that and then take a i...

A: Required :- Write a program in python language that take a string from user and print that and then ...

Q: How will you organize collected information?  Using papers  Using technology  Creating files and fol...

A: To Do: To choose correct options

Q: Consider the below sequential circuit to determine the values of state diagram of the circuit. Note:...

A: Lets see the solution.

Q: What are the two primary advantages of Software Defined Networking versus Hardware-Defined Networkin...

A: To be determine: What are the two primary advantages of Software Defined Networking versus Hardware-...

Q: RB4 is connected to a pulse generator and pin RB1 is connected to a led, write a program to toggle t...

A: Lets see the solution.

Q: What is the information-hiding concept in the class and how does it work?

A: Hiding information or hiding data in systems is about protecting data or data from any unexplained c...

Q: Write the function printJAVA that takes an integer n3 (n is equal or greater than 0) and returns a s...

A: Logic : Use one additional loop to check if current value from 0 to  n3 lies in range of power of 2 ...

Q: How can I restrict web access so users can't view sites unrelated to work? Explain.

A: Introduction :we have asked to explain how to  restrict web access so users can't view sites unrelat...

Q: 7. (a) What language is represented by the regular expression (((a*a)b) U b)? (b) Let E = (a, b) Wri...

A: a) Language represented by :  (((a*a)b)Ub) U means Union means Merging Note :  * means 0 or more occ...

Q: what is the domain and range of the : following function the function that assigns to each pair of p...

A: Here have to determine correct option for given range and domain function.

Q: What is the information-hiding concept in the class and how does it work?

A: Information-hiding:-  The process of concealing an object's or function's details is known as inform...

Q: In JAVA language. Given a string jv = "JAVA", write a program such that the string to be printed in...

A: Given String: "JAVA" Output String: "AVAJJAVA" Requirement: Write a program in JAVA language such th...

Q: In the continuation of previous question. Where we had finded even number of elements in this questi...

A: list =[1,2,3,4,5,6]print("odd numbers from list")for i in list:    if(i%2 !=0):        print(i, end ...

Q: How many different three-letter initials are there that begin with A 676 O 678 O 675 O 677 O

A: Product rule: Id one of the event occurring is in m ways and another event occurring is in n ways th...

Q: The dealer’s cost of a car is 85% of the listed price. The dealer would accept any offer that is at ...

A: # This is a commment # You can write code in any language you want. We will simply write its Algorit...

Q: How many strings are there of lowercase letters of length four or ?less, not counting the empty stri...

A: In this question, we have to count no of string of lowercase latter of length four or less.

Q: How do we create a new environment using baseenv() as the parent? A) e = new.env(parent = baseenv()...

A: Given:   How do we create a new environment using baseenv() as the parent? A) e = new.env(parent = b...

Q: machine learning algorithms

A: Machine learning (ML) is a sort of artificial intelligence (AI) that allows software applications to...

Q: Perform the complement: 7. perform subtraction using 10's complement 57580-182600

A: Here have to determine about substraction using 10's compliment.

Q: Test convergence, modify the system if necessary, and if possible apply an iterative method to solve...

A: Q: Solve the system of equations using fixed point iteration

Q: following questions: 0/0 1/0 1/0 0/0 1/0 A C D E 0/0 0/1 1/0 1/0 Reset Q1) What is the minimum numbe...

A: 1. Total number of flip flop required = ceil(log # of States)  = ceil(log 5)  = 3

Q: a) Why do Boolean functions play a central role in hardware architectures?

A: According to the guidelines I am allowed to solve only one question. In this answer I will be provid...

Q: Describe in depth with the aid of a diagram what a Distributed Denial of Service (DDoS) attack is. G...

A: A  distributed denial-of-service  (DDoS) assault is a noxious endeavor to disturb the typical traffi...

Q: space complexity is the amount of time in computer cpu O required for an algorithm to solve a proble...

A: Space complexity is an quantity of memory utilized by the set of rules (consisting of the input valu...

Q: Fill the gap:A computer that requests an ASP page from a Web server is called a_________computer.

A: To be determine: Fill the gap in given statement A computer that requests an ASP page from a Web ser...

Q: information-hiding concept in the class

A: Information hiding is a powerful OOP feature. Information or data hiding is a programming concept wh...

Q: 45.67 * 3.67 13. A5.912 * 3.A12 14. 1A.716 * 9.C16

A: Here have to determine about multiplication of given equation.

Q: How is multiplexer implemented in computer memory.

A: Introduction : We must examine how a multiplexer is implemented in computer architecture.

Q: How many different elements does A" have when A has m elements and ?n is a positive integer m*nO m*m...

A: Answer : option D (mn) is correct answer   

Q: Given the following figure, select from the options below the waveform that shows correctly the chan...

A: Following is the waveform that if you change the input M then output Q will change.      

Q: Processes are represented by which DFD symbol   Rectangles       Directional vectors       Circles  ...

A: Question about DFD Processes are represented by which DFD symbol

Q: What is computer engineering

A: Here have to determine about computer engineering.

Q: searching algorithm is the problem of sorting an procedure in a list the problem of locating an elem...

A: Here, Four options are given.

Q: Convert the hexadecimal expansion of each of these integers to a binary .expansion 16(DEFACED)

A: The hexadecimal expansion is given below:-