Answer:
Seeing as i don't know what language you want this made in, so I'll do it in two languages, Py and C++.
Here is a solution in C++:
#include <iostream>
#include <string>
#include <map>
int main() {
// prompt the user for a string
std::cout << "Enter a string: ";
std::string input;
std::getline(std::cin, input);
// convert the input string to lowercase
std::transform(input.begin(), input.end(), input.begin(), ::tolower);
// create a map to keep track of the frequency of each letter in the string
std::map<char, int> letter_counts;
for (const char& c : input) {
letter_counts[c]++;
}
// create a string of the five most common letters in the English alphabet
// (e, t, a, i, o)
std::string most_common_letters = "etai";
// remove the five most common letters from the input string
for (const char& c : most_common_letters) {
input.erase(std::remove(input.begin(), input.end(), c), input.end());
}
// print the resulting string
std::cout << "Resulting string: " << input << std::endl;
return 0;
}
Here is a solution in Python:
import string
# prompt the user for a string
input_str = input("Enter a string: ")
# convert the input string to lowercase
input_str = input_str.lower()
# create a string of the five most common letters in the English alphabet
# (e, t, a, i, o)
most_common_letters = "etai"
# remove the five most common letters from the input string
for c in most_common_letters:
input_str = input_str.replace(c, "")
# print the resulting string
print("Resulting string: ", input_str)
Explanation: Hope this helped
What are movies filmed before 1990's?
Answer: Once Upon a Time in the West (1968) PG-13 | 165 min | Western. ...
Cinema Paradiso (1988) R | 155 min | Drama. ...
Blade Runner (1982) R | 117 min | Action, Sci-Fi, Thriller. ...
2001: A Space Odyssey (1968) G | 149 min | Adventure, Sci-Fi. ...
Apocalypse Now (1979) ...
Chinatown (1974) ...
Stardust Memories (1980) ...
Le Notti Bianche (1957)
Explanation:
Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.
Answer:
NIST SP 800 30
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.
This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.
Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.
How does the Problem-solving Process help us to solve everyday Problems?
Answer:
Problem-solving gives us a mechanism for identifying these things, figuring out why they are broken and determining a course of action to fix them. Also Problem-solving helps us understand relationships and implement the changes and improvements needed to compete and survive in a continually changing environment.
How would be the human life in the absence of technology
Answer:
Horrible!
Explanation: this is because all of our food would go bad firstly. Refridegerators wouldn't work. Also NO social medie taking away social media is like cutting off your O2 supply. No phones, no TV, no computers etc... but also our planet would be a better place. No pollution, no batteries harming the enviornment .
Which statement best defines building blocks?
A. copied shapes that can be reused by a user
B. previously stored styles that can be reused by a user
C. built-in table of contents that can be reused by a user
D. formatted and stored content that can be reused by a user
Answer:
formatted and stored content that can be reused by a user (methods)
Answer:
D
Explanation:
Which of the following might cause a mobility impairment that limits computer use? Select 3 options.
a color blindness
Odyslexia
O neurological issue
injury
O genetic issue
Explanation:
A color blindness , injury .
Answer:
neurological issueinjurygenetic issueExplanation:
The question is about mobility impairment. Color blindness and dyslexia have to do with vision, so rarely cause mobility issues related to computer use. Rather they would cause issues related to reading the screen.
The remaining three choices are the ones you want.
Your programme coordinator asked you to create a database for your respective department at the university, you must populate a database and includea form, two queries, and a report
To create a database for your department at the university, you need to follow these steps: design the database structure, create a form, develop two queries, and generate a report.
1. Design the database structure: Identify the tables, fields, and relationships needed to store department information (e.g., students, courses, faculty, etc.).
2. Create a form: Design a user-friendly form to input and update data, such as adding new students or updating course information.
3. Develop two queries: Create two queries to retrieve specific data from the database (e.g., a list of students enrolled in a specific course or faculty members teaching a particular subject).
4. Generate a report: Design a report that presents the data from your queries in a well-organized and readable format.
By following these steps, you will have a functional and useful database for your department that includes a form, two queries, and a report.
To know more about database visit:
https://brainly.com/question/30634903
#SPJ11
For each item, identify the way it is usually addressed in the software industry. Applying a bug fix: Addressing a security flaw: Improving ease of use: Adding new features:
Answer:
(patch)
(patch)
(new version)
(new version)
Explanation:
gimme my 5 stars
Answer:
patch patch new new
Explanation:
i did it on edge
Hash functions use algorithms use a big chunk of data and squeeze it into a small amount to verify something like a file or an application.
A. True
B. False
Answer:
A. True
Explanation:
Identifying and verifying files/applications is one use of hash functions.
what are the chances of my bluetooth earbuds working if they stayed in the garbage disposal of my sink for 2 days but were in the case?
dont ask me how this happened, i have no idea either.
Answer:
This isnt an educational question, but ill answer it anyway.
Explanation:
It depends on what type of headphones you have, and if you turned on the garbage disposal in that time period. If you have turned it on, most likely not.
This was a really weird question lol
1 What do you understand by navigation through form?
Answer:
A navigation form is simply a form that contains a Navigation Control. Navigation forms are a great addition to any desktop database. Microsoft Access offers several features for controlling how users navigate the database.
what does the operating system do if you try to save a file with the same name into the same folder?
Answer:
It overwrites the original file, unless a number
date or initials are added to the file name, these are used for the differentiation of those files.
Sunil’s basketball coach asks him to prepare a presentation for his teammates on the proper way to shoot a basketball. After researching the topic online, Sunil decides to add a visual aide to his report.
Which visual aide is the best fit for Sunil’s presentation?
a podcast describing how to shoot a basketball
a video tutorial showing how to shoot a basketball
a graph showing how many players shot a basketball
a sound bite describing a player shooting a basketball
Answer: a video tutorial showing how to shoot a basketball
Explanation:
It will show them how to shoot the basketball
Answer:
a video
Explanation:
Does anyone play genshin impact here?
Answer:
what server are u on
Explanation:
yes i do play itttttttttttttttttttttt
computer science, a structured programming approach using c, forouzan and gilberg, third edition pdf
A Structured Programming Approach Using C" by Forouzan and Gilberg. This book focuses on the structured programming approach using the C programming language.
It covers topics such as algorithms, control structures, functions, arrays, pointers, and file processing. The third edition is an updated version of the book, providing more examples and exercises for students to practice. It is commonly used as a textbook in computer science courses. In conclusion, "Computer Science: A Structured Programming Approach Using C" by Forouzan and Gilberg is a valuable resource for learning about structured programming in computer science using the C programming language.
To know more about Structured Programming, visit:
https://brainly.com/question/33453996
#SPJ11
What are three options that can be added to the Excel Ribbon?
tabs, hyperlinks, and groups
users, file names, and tabs
tabs, groups, and symbols for groups
groups, symbols for groups, and users
Answer:
C. tabs, groups, and symbols for groups
Explanation:
Generally, workbooks are known as Microsoft Excel files. Excel workbook can be defined as a collection of one or more charts and worksheets (spreadsheets) used for data entry and storage in an excel file. In order to create a project on Excel you will have to use a workbook.
A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer software applications such as Microsoft Excel.
An Excel Ribbon refers to the row of tabs, icons and strip of buttons located at the top of the worksheet or work area.
The three options that can be added to the Excel Ribbon are tabs, groups, and symbols for groups.
what are overlapping geographical areas within a cellular network called?
What windows 8.1 feature provides a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure?
The Windows 8.1 feature that provides a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure is called "Offline Files." This feature allows users to access and work on their server files even when they are not connected to the network.
Here are the details of how Offline Files works:
Offline Files creates a synchronized copy of selected files and folders from a server onto the user's local computer. This copy is stored in a cache called the Files cache.. When the user is connected to the network, Offline Files automatically synchronizes the local copy with the server copy, ensuring that any changes made on either side are reflected in both locations.
In the event of a network service failure or loss of connectivity, the user can continue working on the files stored in the Offline Files cache. Any changes made during this time will be synchronized with the server once the network connection is restored. Offline Files also provides a feature called "Transparent Caching" which allows users to access files even when the server is unavailable. In this case, the user can open and modify the files, and any changes made will be synchronized with the server once it becomes available again.
In summary, Offline Files in Windows 8.1 is a feature that allows individual users to maintain access to their server files, even in the event of a network service failure. It creates a synchronized copy of selected files on the user's local computer, allowing them to work on the files offline. Once the network connection is restored, any changes made offline are automatically synchronized with the server.
To know more about network visit:-
https://brainly.com/question/27763234
#SPJ11
e. Define the term ‘user interface’, giving examples.
f. What is a mobile application?
g. Explain briefly what a multi-tasking system is and how it works?
Answer:
uExplanation:
iiiiiiiiiiiiiiiiiiii
Which of the following is a necessary step prior to replacing the removable battery pack in a laptop computer?
a. Remove the laptop keyboard bezel, and if needed, remove the keyboard.
b. Verify the computer system is configured in sleep mode.
c. Verify the laptop system is powered off and configured for Ship Mode.
d. Confirm the replacement battery is recommended by the laptop manufacturer.
Answer:
number c is the correct answer
What humidity level should be maintained for computing equipment? a. 50 percent b. 40 percent c. 60 percent d. 30 percent
Answer:
A. 50 percent
Explanation:
The correct option is - A. 50 percent
Another preventive measure you can take is to maintain the relative humidity at around 50 percent. Be careful not to increase the humidity too far—to the point where moisture starts to condense on the equipment.
Which address typ e is automatically created by defaukt on a host interface when no ras are received?
Answer:
Which address type is automatically created by default on a host interface when no RAs are received? global unicast address
Explanation:
65.1% complete question an attacker passes data that deliberately overfills an area of memory that the application reserves to store the expected data. which vulnerability exploit resulted from the attacker's actions?
The attacker's actions have resulted in a buffer overflow vulnerability exploit. A buffer overflow vulnerability is a type of software vulnerability that arises when an application does not properly check for the boundaries of an input buffer.
In such cases, an attacker can pass data that exceeds the size of the buffer, causing the extra data to overwrite adjacent memory locations. By overwriting memory locations that are not part of the buffer, the attacker can inject malicious code into the application's memory space, potentially leading to the execution of arbitrary code or a denial of service attack. Therefore, it is crucial to implement proper input validation and boundary checking to prevent buffer overflow vulnerabilities.
Find out more about buffer overflow vulnerability
brainly.com/question/30579296
#SPJ4
using the select statement, query the invoice table to find the average total cost for all orders purchased in the country usa, rounded to the nearest cent. a.) 6 b.) 5.8 c.) 5.80 d.) 5.7
To find the average total cost for all orders purchased in the country USA, rounded to the nearest cent, you can use the following SQL query: SELECT ROUND(AVG(total), 2) FROM invoice WHERE billing_country = 'USA'; The answer correct letter C.
Assuming the table name is "invoice" and the column name for the total cost is "total", you can use the following SQL query to find the average total cost for all orders purchased in the country USA:
SELEC
This query selects the average of the "total" column in the "invoice" table, rounded to two decimal places using the ROUND() function. It also filters the results to only include rows where the billing country is 'USA'.
Based on the options provided, the answer would be c.) 5.80, rounded to the nearest cent.T ROUND(AVG(total), 2) FROM invoice WHERE billing_country = 'USA';
Learn more about programming:
https://brainly.com/question/26134656
#SPJ11
A deleted view can be recovered by account administrators within how many days?.
Answer:
35 Days
Explanation:
It can be recovered in 35 days.
what is created once based on data that does not change? multiple choice question. A) Static report
B) Data report
C) Dynamic report
The correct option is A) Static report .A static report is created once based on data that does not change.
A static report refers to a document or presentation that is generated from a specific set of data at a particular point in time and remains unchanged thereafter. It is typically used to present historical or fixed information that does not require real-time updates. Static reports are commonly used in business, research, and other fields to summarize data, present findings, or communicate information to stakeholders.
Static reports are created by collecting and analyzing data, organizing it in a meaningful way, and then presenting the results in a report format. The data used in a static report is typically derived from sources such as surveys, databases, or historical records. Once the report is generated, it remains static and does not automatically update when new data becomes available.
These reports are valuable when there is a need to capture a snapshot of information or analyze historical trends. They can be shared electronically or in printed form, providing a reference point for decision-making or documentation purposes. However, it is important to note that static reports may become outdated as new data emerges, and they may require periodic updates or revisions to remain relevant.Therefore, correct option is A) Static report.
Learn more about static reports
brainly.com/question/32111236
#SPJ11
true or false: it is only possible to use a public cloud instance or vm on demand, rather than reserve one in advance.
False. It is possible to reserve a public cloud instance or VM in advance. Many cloud providers offer the ability to reserve instances or VMs for a certain period of time, which can be cheaper than using an on-demand instance. This is known as a "reserved instance" or "reserved VM instance" in cloud computing terminology. Reserving an instance or VM in advance allows users to plan their resource usage and potentially save money on their cloud bill.
Cloud providers offer the ability to reserve instances or VMs in advance, which is cheaper than using an on-demand instance. This allows users to plan their resource usage and potentially save money on their cloud bill. It is known as a "reserved instance" or "reserved VM instance".
To learn more about cloud; https://brainly.com/question/9759640
#SPJ11
what is the main circuit board inside the computer called?
Answer:
Motherboard is the main circuit board inside the computer.
Help help help pls and thank yewsssssssss
Answer:
the answer is similar to 1
find the output in python
a=10
b=8*2
c=9.0/4.0
d="All the best"
print("Values are: ", a,b,c,d)
This results in the output: `Values are: 10 16 2.25 All the best`.
The output of the given Python code would be:
```Values are: 10 16 2.25 All the best
```Explanation:
- `a` is assigned the value `10`.
- `b` is assigned the value `8 * 2`, which is `16`.
- `c` is assigned the value `9.0 / 4.0`, which is `2.25`. The use of floating-point numbers (`9.0` and `4.0`) ensures that the division result is a floating-point number.
- `d` is assigned the string value `"All the best"`.
- The `print()` function is used to display the values of `a`, `b`, `c`, and `d`. The output statement is `"Values are: ", a, b, c, d`, where the values are separated by commas.
For more such questions on output,click on
https://brainly.com/question/28498043
#SPJ8