Hello again, just need help debugging-I honestly have no idea how the "isSpace" etc methods work and I've tried various syntaxes (string name, Character., etc.) to no avail. Also getting errors for the c= sections for converting between char, string, and boolean which I understand, just dont know how to fix. I'm aware I could condense my initial variables, I just like them laid out. The code aims to count lowercase vowels, all consonants, spaces, and punctuation. Anything else will get thrown into a misc count.


import java.util.Scanner;

public class MyClass {

public static void main(String args[]) {
Scanner s=new Scanner(System.in);
System.out.println("input the string");
String as=s.nextLine();

int cons=0;

int a=0;

int e=0;

int i=0;

int o=0;

int u=0;

int space=0;

int punc=0;

char c;

int misc=0;

for(int k=0;k(LESS THAN)as.length();k++){
if(as.isSpace(as.charAt(i))){
space++;
}

else if(as.isConsonant(as.charAt(i))){

cons++;

}

else if(as.isPunctuation(as.charAt(i))){

punc++;

}

else if(as.isVowel(as.charAt(i))){

c=as.charAt(i);

if (c="a"){

a++;

}

else if(c="i"){

i++;

}

else if(c="e"){

e++;

}

else if(c="o"){

o++;

}

else if(c="u"){

u++;

}

else{

misc++;

}

}

else{

misc++;

}

}

System.out.println(a+" a's");

System.out.println(e+" e's");

System.out.println(i+" i's");

System.out.println(o+" o's");

System.out.println(u+" u's");

System.out.println(space+" spaces");

System.out.println(punc+" punctuations");

System.out.println(cons+" consonants");

System.out.println(misc+" misc. (uppercase vowels, etc.");


}

}

Answers

Answer 1

import java.util.Scanner;

public class JavaApplication81 {

   

   public static void main(String[] args) {

       Scanner s = new Scanner(System.in);

       System.out.println("Input the string");

       String as = s.nextLine();

       int cons = 0;

       int a = 0;

       int e = 0;

       int i = 0;

       int o = 0;

       int u = 0;

       int space = 0;

       int punc = 0;

       char c;

       int misc = 0;

       String punctuation = ".!,?";

       String consonants = "bcdfghjklmnpqrstvwxyz";

       for (int k = 0; k < as.length(); k++){

           c = as.charAt(k);

       if (Character.isWhitespace(c)){

           space ++;

       }

       else if (punctuation.indexOf(c) != -1){

           punc++;

       }

       else if (consonants.indexOf(c) != -1){

           cons++;

       }

       else if (c == 'a'){

           a++;

       }

       else if(c == 'e'){

           e++;

       }

       else if (c == 'i'){

           i++;

       }

       else if (c == 'o'){

           o++;

       }

       else if (c == 'u'){

           u++;

       }

       else{

           misc++;

       }

       

   }

       System.out.println(a+" a's");

       System.out.println(e+" e's");

       System.out.println(i+" i's");

       System.out.println(o+" o's");

       System.out.println(u+" u's");

       System.out.println(space+" spaces");

   

       System.out.println(punc+" punctuations");

       System.out.println(cons+" consonants");

       System.out.println(misc+" misc. (uppercase vowels, etc.");

   }

   

}

This is one example of how it could be done.


Related Questions

Input a number and find the square root only if the number entered is greater than or equal to zero.

Answers

number = float(input("Enter a number: "))

if number >= 0:

   print(number**0.5)

I hope this helps!

Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be the bit sequence that actually gets transmitted?

Answers

Let the message be M : 1001 0001   and the generator function is G : 1001

Solution :

CRC sender

                                               

1001     | 1001  0001  000

             1001                            

            0000  0001            

                        1000

                       1001            

                        0001  000

                                 1 001  

                                 0001

Here the generator is 4 bit - 1, so we have to take three 0's which will be replaced by reminder before sending to received--

eg    1001  0001  001    

Now CRC receiver

                                                   

1001         | 1001    0001   001

                1001                          

                 0000 0001

                            1001                  

                            1000

                           1001              

                            0001  001

                           0001  001      

                                   0000

No error

help help help help​

Answers

Answer:

D i think............

Lucy completed her PowerPoint presentation and showed it to her teacher to review. Lucy's teacher said it needed to be more engaging for the audience. The teacher suggested making the slides push in. What feature is Lucy's teacher referring to?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Lucy completed her PowerPoint presentation and showed it to her teacher to review. Lucy's teacher said it needed to be more engaging for the audience. The teacher suggested making the slides push in.

The teacher referring to the Transitions effect that is push while making the slides.

You can insert different Transition effect on your slides while going through the Transitions tab on the ribbon, and then select your desired effect on the selected/active slide. There are tens of transitions effect, you can search for your desired effect on your slide, such as Lucy's teacher suggested to her to add a push-in effect.

Answer: Transition, I just finished my test for this lesson! I got an 100% on it!

Explanation: When you go and read through the lesson, there's a page telling you about each tab. When you go to "Transitions", there is an image that shows the features for transitioning your slides. The options shown in the picture is "existing", "none", "morph", "cut", "fade", "wipe", and "push".

Write a statement that calls the recursive function BackwardsAlphabet() with parameter startingLetter.

Answers

Answer:

Explanation:

The code can be computed as follows:

#include <stdio.h>

void BackwardsAlphabet(char currLetter){

if (currLetter == 'a') {

printf("%c\n", currLetter);

}

else{

printf("%c ", currLetter);

BackwardsAlphabet(currLetter - 1);

}

return;

}

int main(void) {

char startingLetter = '-';

startingLetter = 'z';

BackwardsAlphabet(startingLetter);

return 0;

}

Recursions are simply functions that calls and executes itself.

The statement that calls the recursive function is: BackwardsAlphabet(startingLetter);

From the question, we have the following parameters

Function name: BackwardsAlphabetFunction parameter: startingLetter

The syntax of calling a function is:

function_name(function_parameter);

So, the statement that calls the function is:

BackwardsAlphabet(startingLetter);

The above statement is true for several programming languages such as C, C#, C++, Java, Python, etc.

Read more about recursive functions at:

https://brainly.com/question/13657607

what are the characteristics needed in a secure hash function?​

Answers

Cryptographic hash functions are utilized in order to keep data secured by providing three fundamental safety characteristics: pre-image resistance, second pre-image resistance, and collision resistance.

The characteristic needed in a secure hash function is image resistance functions.

What are the characteristics?

Characteristics refer to any feature or trait of any object which provides any information about the concept. These are unique in nature and makes difference with one another.

A group of cryptographic operations called Secure Hash Algorithms is designed to safeguard data. It functions by hashing the data to change it. It applies a severe value to a text before using a private key to encrypt the hash code.

One of a good hash function's essential characteristic include  The data being hashed completely determines the hash result, and the hash function uses all of the input data.

The characteristics necessary for a secure hash function are Avoiding collisions Resistance to the preimage and subsequent resistance to the preimage.

Learn more about the Secure Hash function, here:

https://brainly.com/question/2642496

#SPJ6

How does entering search terms in quotation marks affect search results?

Answers

if it is in quotations someone said or wrote those words, so when you search in quotation those are someone’s words and it might show who’s words they are.

List 4 criteria of power your house with wind

List 3 contraints( limitations) of power your house with wind



Please help me

Answers

Answer:

1st Is that you don't need to pay for electricity.

2nd It's that yo don't poluate the nature.

3rd It depends of the country, in some of them you can get some support for this from the state , I mean you can get lower prices for water and staff like that.

Hope I helped you , have a nice da

What missing function will return the index of 7 in the list?

Answers

Answer:

The answer is: index function and it will be used in the following manner:

>>> myList.index(7)

Explanation:

List is one of the 4 built-in data types that are present in Python language. Lists are used to store same type of values. Indexes are used to access elements of lists in Python.

Various operations can be performed on the lists.

In the given question, we have to write the function that can be used to find the index of an element in the list.

Index function is sued for this purpose.

The syntax for index function is:

list_name.index(element)

So for the given list, to find the index of 7, the function will be written as:

>>> myList.index(7)

Hence,

The answer is: index function and it will be used in the following manner:

>>> myList.index(7)

Answer:

Index

Explanation:

Edge 2020

Which type of cut extends an audio clip from a preceding video clip to a subsequent video clip?

K-cut

J-cut

L-cut

A-cut



Adobe Premiere Pro cc 2018

Answers

Answer:

L-cut

Explanation:

In the field of cinematography, professional video editors use video editing software application such as Adobe Premiere Pro to create wonderful and remarkable videos with the aid of various video editing techniques such as J-cut, rolling edit, ripping edit, L-cut etc.

A L-cut can be defined as a split edit technique which typically allows the audio out point of a clip to be extended beyond the video out point of the clip in order to make the audio from the preceding video clip (scene) to continue playing over the beginning of a subsequent video clip.

Hence, L-cut is a type of cut that extends an audio clip from a preceding video clip to a subsequent video clip.

edhesive in JAVA Write a method that takes a String parameter. If the String has a double letter (i.e. contains the same letter twice in a row) then it should return true. Otherwise, it should return false.
This method must be named hasRepeat() and have a String parameter. This method must return a boolean.

Answers

I've included my code in the picture below. Best of luck.

The method is an illustration of loops and conditional statements.

Loops are used for repetitive operations, while the execution of a conditional statement is based on its truth value.

The hasRepeat() method in Java, where comments are used to explain each line is as follows:

   //This defines the hasRepeat() method

   public static boolean hasRepeat(String str){

       //This initializes the previous character

       char prevC = ' ';

       //This iterates through the characters of the string str

       for(int i = 0; i<str.length();i++){

           //This gets the current character

           char currC = str.charAt(i);

           //If the current character and the previous character are the same

           if(currC == prevC){

               //Return true

               return true;

           }

           //Assign the current character to the previous character

           prevC = currC;

       }

       //Return false, it the string contains no repetitive character

       return false;

   }

At the end of the method, the program returns true or false.

Read more about similar programs at:

https://brainly.com/question/14998938

a bus is full of passengers. if you count them by either twos, threes, or fives, there is one left. if you count them by seven there will be none left. find the least number of passengers in the bus?​

Answers

Answer:

91

Explanation:

You know that the number must end in 6 or 1 to get a left over of 1 when divided by 5. Six won't work because  2  divides evenly into a number ending into 6.

So the number ends in 1.

21 doesn't work because 3 divides into 21 evenly.

31 doesn't work because 7 does not divide into it.

41 doesn't work. 41 is prime. 7 won't divide into it.

51 is divisible by 3

61 seven does not evenly divide into 61.

71 seven leaves a remainder of  1

81 7 leaves a remainder.

91 Answer

Malware is any malicious software installed on a computer or network without the owner’s knowledge.
Question 4 options:
True
False

Answers

Answer: True

Explanation: Malware is literally short for malicious software. The name that is given to any type of software that could harm a computer system or collect a user's data.

Hope it helped please mark as brainliest!

Write a function that returns a pointer to the maximum value of an array of float ingpoint data: double* maximum(double* a, int size) If size is 0, return NULL.

Answers

Answer:

double * maximum( double arr[], int size){

   int max = 0;

   if ( size == 0){

       return 0;

   } else {

        for (int i = 1; i < size; i++){

           if (arr[i] > arr[0]){

               max = arr[i];

           } else {

               max = arr[0];

           }

         }

         return max;

   }

}

Explanation:

The C++ source code above returns the maximum value of an array as a pointer. The function accepts two parameters, the array in question and the size of the array. The for loop iterates over the items in the array and checks for the largest, which is returned as a pointer since the function "maximum" is defined as a pointer to the floating-point number memory location.

How are computers connected to one another?

through networks

through printers

through laptops

Answers

Answer:

They are connected through networks

Explanation:

N/A

Answer:

the other guy is correct

Explanation:

In the program below, which two variables have the same scope?
def subtract(numA, numb):
return numA - numB
def divide(numC, numD):
return numC/ numD
answer = divide(24,6)
print (answer)
numD and
num
numA
numB
Yeah

Answers

Answer:

Numc

Explanation:

Just did the quiz :]

Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
diagram be the best choice to represent her information?
O It is the best way to show how something functions.
O It is the easiest way to present complex scientific data.
O It is the best way to show how much energy can be produced.
O It is the easiest way to present large amounts of numerical data.

Answers

A.) it the best way to show how something functions

Answer:

a

Explanation:

what must be the same for each variable in an array in compiled languages?

Answers

The data type must be the same for each item in the array.

Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept odd numbers only. Print invalid input if given input is not valid.

Answers

Answer:

Bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept odd numbers only is explained below in detail.

Explanation:

Even digits at an even table and odd digits at an odd table

Given an array of size n comprising an equal number of odd and even digits. The difficulty is to manage the numbers in such an approach that all the even digits get the even table and odd digits get the odd table. The necessitated auxiliary space is O(1).

Examples :

Input : arr[] = {8, 5, 1, 12, 6, 3}

Output : 3 6 1 12 5 8

Input : arr[] = {7, 9, 10, 19, 13, 18, 21, 20, 4, 14}

Output : 18 9 10 19 20 7 14 13 4 21

Checkpoint 10.43 Write an interface named Nameable that specifies the following methods: _______{ public void setName(String n) public String getName()} Fill in the blank.

Answers

Answer:

Fill the blank with

public interface Nameable {

Explanation:

Required

Complete code segment with the interface definition

The given code segment is divided into three parts

1. The interface

2. The method that returns nothing

3. The method that returns string

The blank will be filled with the definition of the interface.

The definition is as follows:

public interface Nameable {

Analyzing the above definition

public -----> This represents the modifier

interface ------> This represents that the definition is an interface

Nameable ------> This represents the name of the interface

Write a function gcd(x, y) that returns the greatest common divisor of the parameters x and y. Use the Euclidean algorithm to do this. Return None if the gcd does not exist(i.e., if both parameters are 0)

Answers

Answer:

function gcd(x,y) {

if (!y && !x) return 'None';

if (!y) return x;

return gcd(y, x%y);

}

console.log(gcd(462, 910));

console.log(gcd(0, 0));

console.log(gcd(32, 40));

Explanation:

This example is in javascript.

what is the value of the variable double dNum=14/5?

Answers

Answer:

2.0

Explanation:

In the case where the result is cast to a double, the answer evaluated to an in type (2) then was cast to a double which gives you 2.0.

Which of the following file formats cannot be imported using Get & Transform?
A.) Access Data table
B.)CVS
C.)HTML
D.)MP3

Answers

Answer:

The correct option is D) MP3

Explanation:

According to the given scenario, The data that can be imported using get and transform is as follows:

a. CVS

b. Hypertext markup language (HTML)

c, Access data table

The Get and transform means first get the data and then modify according to your needs.

So as per given options, the option D i.e MPC i.e. file format this cannot be imported using Get & transform

Therefore the correct option is D) MP3

What game is this?????? ?

Answers

Answer:

name the emoji

Explanation:

Answer:

Stop wasting points

Explanation:

b) Machine cycle defines a loop process with four major components. Explain why machine cycle is important? If the components of machine cycle are inter-swapped, would that cause any problems?Can we add another module to rectify the problem caused by inter-swapping?

Answers

Answer:

Machine cycle defines a loop process with four major components is explained below in detailed explanation.

Explanation:

The machine cycle has four methods i.e. fetch method, decoding method, execute method, and store method. All these methods are essential for the preparation performance of the processor. By the machine cycle, the execution of the processor can be measured and the device can be decided.

Importance of Machine Cycle

The machine cycle is essential for the execution of machine direction by the computer processor as the device execution is based on the machine cycle. If the direction is not executed accurately the execution can be deteriorated by the processor.

write c++ program to get from user the user and print whether it is positive or negative

Answers

Answer:

I think this is positive

Explanation:

A motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors
R, T and W. The motor is switched off when the output from the logic circuit is 1.

Answers

Answer:

motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors

R, T and W. The motor is switched off when the output from the logic circuit is 1. wym

Alex has composed a layout with this Image for a magazine. Which rule of composition has Alex applied?
OA. alignment
OB. golden ratio
OC.unity
OD. contrast

Answers

Answer:

B. golden ratio

Explanation:

Golden ratio is a composition has Alex applied.

What is Golden ratio?

The Greek letter "phi" is used to represent the golden ratio, a specific number that is roughly 1.618.

It frequently appears in geometry, fine art, architecture, and other fields. Euclid referred to the golden ratio as the extreme and mean ratio, and Luca Pacioli referred to it as the heavenly proportion, among other titles.

Since ancient times, mathematicians have researched the characteristics of the golden ratio. It appears in the building of the dodecahedron and icosahedron as the ratio of a regular pentagon's diagonal to its side.

Therefore, Golden ratio is a composition has Alex applied.

To learn more about Golden ratio, refer to the link:

https://brainly.com/question/29567506

#SPJ2

JAVA Write code which prints every number from 1 to 20 a number of times equal to the number itself (e.g. one 1, two 2's...). Every individual number printed should be separated by a space, and there should be a new line each time the number changes. You should use nested loops to produce your output (it will result in far less code).

Partial sample run:

1
2 2
3 3 3
........

Answers

I've included my code in the picture below. Best of luck.

In cell D15, enter a formula using a counting function to count the number of cells in the Billable? column

Answers

The formula that could be entered as a counting function to count the number of cells would be COUNTA.

What formula can be used in cell D15?

If you want to count the number of cells that are not empty in the Billable column, you can go to cell D15 and type in =COUNTA(.

After that, you highlight the entire Billable column from D2 to D14 and then close the formula and press enter. It will return the number of cells that are not empty.

Find out more on the spreadsheet functions at https://brainly.com/question/1395170.

Other Questions
it is the intellectual labour which plays the key role in revealing human civilization Most earthquakes occur in the center of continental plates. True False Help me help me please Read the excerpt from a speech by US Secretary of Education Arne Duncan. What is the speechs purpose?A. to inform the country what students are learning in their local schoolsB. to gain support for a law that would improve student achievementC. to explain the roles of teachers in creating a better learning environmentD. to support a law that requires children to begin learning at a very young ageplz help The area of a rectangular park is same as area of a square park. If the lengthof the rectangular park is 24.5 m and the side length of the square park is 14m,find the breadth of the rectangular park? How would the number of oxygen atoms in a 16.00 pound sample compare to the number of sulfur atoms in a 32 pound sample? y = 5x + 3x(Find the axis of symmetry and the vertex of the graph of the function) Which of the following forms of water pollution is most associated with mining? what is the value of x? The domain is 0. 1, 2, 3, 4, and 5. What is the range? Find the slope of the lines that passes through the points (-8,-11) and (17,4). 20 facts about the day of the dead which of the following does not contribute to the formation of the mid atlantic ridge Why is scientific knowledge considered durable?A)It is open to change.B)It is the absolute truth.C)It outright rejects old ideas.D)It does not accept uncertainty The Following tile floor pattern is made of 36 square tiles.[][][][][][][][][][][][][][][][][][][][][][][][] 42.75 Inches[][][][][][][][][][][][][][][][]Which is the side length. in inches of one tile?A 1.25B 4.25 C 4.75D 10.75 How did Voltaire's ideas influence the French Revolution? PLZZZ HURRY IM ON TEST YOULL GET MArked brainLIST Which is not needed for a hurricane to form? 6x + 13 = 37 what is X?Provide reasoning 6. Who kept up the national struggle by staging his Polish operas and music against Russian domination? Which statement explains why the two excerptspresent conflicting views?O The first states that the American dream ofwomen's voting rights has yet to be achieved, whilethe second states that American women havealready paid the price for this right.O The first states that freedom was difficult toachieve, while the second states that Americansdream about freedom but are unwilling to pay theprice to achieve itO The first states that the American dream offreedom and equality has yet to be realized, whilethe second states that freedom and equality havealready been achieved.O The first states that dreams are rarely fulfilled inAmerica, while the second states that all peoplewho work hard can achieve their dreams in