100 POINTS FOR ANYONE WHO CAN DO THIS!
Make the following modifications to the original sentence-generator program:

The prepositional phrase is optional. (It can appear with a certain probability.)
A conjunction and a second independent clause are optional: "The boy took a drink and the girl played baseball".
An adjective is optional, it may or may not be added to the sentence to describe a noun: "The girl kicked the red ball with a sore foot".
"Optional" is implying that the program should include these elements in a semi-random frequency.

You should add new variables for the sets of adjectives and conjunctions.

100 POINTS FOR ANYONE WHO CAN DO THIS!Make The Following Modifications To The Original Sentence-generator

Answers

Answer 1

Let's check what can be modified

Before calling def we need adjective and conjunctions stored inside variables

Store them(You may change according to your choice)

[tex]\tt adjectives=("foolish","bad","long","hard")[/tex]

[tex]\tt conjunctions=("and","but","for","after")[/tex]

We have to make optional ,easy way ask the user to do instead of yourself .

[tex]\tt con=input("Enter\: yes\: if \:you \:want \:to \:use \:conjunctions:")[/tex]

[tex]\tt adj=input("Enter\:yes\:if\:you\:want\:to\:use\: adjectives:")[/tex]

If they click then we can proceed else no problem let the program run

[tex]\tt def\: conjunctionPhrase():[/tex]

[tex]\quad\tt if\: con=="yes":[/tex]

[tex]\quad\quad\tt return\:random.choice(conjunctions)+"\:"+nounPhrase()[/tex]

[tex]\quad\tt else:[/tex]

[tex]\quad\quad\tt continue[/tex]

You may use pass also

[tex]\tt def\: adjectivePhrase():[/tex]

[tex]\quad\tt if\:adj=="yes":[/tex]

[tex]\quad\quad\tt return\:random.choice(adjectives)+"\:"+nounPhrase()[/tex]

[tex]\quad\tt else:[/tex]

[tex]\quad\quad\tt continue[/tex]


Related Questions

Human interest stories usually focus on:

OA. celebrities and politicians.

OB. a worldwide catastrophic event.

OC. animals in danger.

D. people's triumphs and struggles.

Answers

The human interest stories are found to be made focused on the people's triumphs and struggles. Thus, option D is correct.

What are stories?

Stories are the given as the part of the narrative tale comprising the events and the experiences presented with the sequence of words. The  stories can be fictional and nonfictional.

The humans found the stories that are related to the struggles and have the connections with the people's triumphs to be more focused. Thus, option D is correct.

Learn more about the stories, here:

https://brainly.com/question/11300469

#SPJ1                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      

3. What of the following is the main components of computer system?
a. CPU, Input unit, Output Unit, Memory Unit
b. CPU, Memory, System bus, Input, Output, Pen drive
c. Modem, Keyboard, Word Processor, Printer, Screen
d. Memory, Video Card, Monitor, Software, Hardware.

Answers

Answer:

CPU, input unit, Output unit, memory unit

It’s A. CPU, input unit, output unit, memory unit.

Question #1
Dropdown
Complete the sentence.
[_____] are essentials for the hearing impaired.

Answers

Answer:

The answer is Transcripts

Explanation:

I just got it wrong in Edge so I know trust me dude :)

Cybercrime is the illegal use of the internet, computers, or other digital technologies to harm or exploit individuals.

What is Cybercrime?

Cybercrime is illegal to use of computers, the internet, and other digital technology in order to harm or take advantage of people, businesses, or governments.

In the given case, the context is missing so the answer is written in a generalized manner by describing Cybercrime.

Serious repercussions from cybercrime can include monetary loss, damage to reputation, and legal accountability. People are becoming more concerned about it, and law enforcement organizations are concentrating more on looking into and investigating cybercrime incidents.

Cybersecurity is a precautionary practice that involves instructing users and commercial organizations' end users in order to safeguard their devices from potential threats to servers, networks, software, and sensitive data.

Read more on cybersecurity here:

brainly.com/question/14286078

#SPJ7


in which part of the scratch interface does a programmer combine code blocks to build the program?

a. sprite info pane
b. block palette
c. stage
d. scripts area

Answers

Answer:

D

Explanation:

The sprite info pane is for an overview over your sprites and their visibility, coordinates, etc.

The block palette is where you select blocks from.

The stage is where your figures move and do stuff.

The scripts area is where you combine blocks from the palette together.

Explain why the receptionist responded as indicated in the following scenario.

Situation: Jim and Roger are meeting with the executives of the company. They are both wearing blue jeans, polo shirts, and ties. As they walk past the receptionist, he stops them and reminds them the dress code is white collar.

Answers

The receptionist is aware of the every day attire as he works there. Jim and Roger are undressed, since they were wearing blue jeans. The receptionist lets them know of what’s expected.

Hope this helps!

Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONITOR CD Bay PRINTER TOWER CASE CENTRAL PROCESSINGENIT is an electronic device that retrieves, and processes shows you what is going on in the computer. is the first image you see on your screen when the computer is is used for telling the computer what to do. is used for typing documents. is used for putting documents on paper. you can insert a CD or Compact Disc. is is box inside and shaped 1) A 2) The 3) The data. switched on. 4) The 5) The 6) The 7) In the 8) The it​

Answers

Answer:

Explanation:

Monitor is an electronic device that retrieves, and processes shows you what is going on in the computer.

Desktop is the first image you see on your screen when the computer is is used for telling the computer what to do.

keyboard

is used for typing documents. Printer is used for putting documents on paper. CD Bay you can insert a CD or Compact Disc. is is box inside and shaped

The destination transmission control protocol (TCP) process has set a 1,000-byte receive buffer window. The source TCP sequence number starts at 23,100 and sends the following segments, in order: Segment 1-200 bytes; Segment 2-300 bytes; Segment 3-200 bytes; and Segment 4-300 bytes. The last acknowledgment the source received was sequence number 23,600 saying the receive buffer can now hold 800-300 byte streams. The retransmission timer for sequence number 23,600 has expired, so what will the source TCP do next

Answers

Because the retransmission timer for sequence number 23,600 has expired, the source TCP will trigger a process that resends segments 3 and 4.

What is TCP/IP?

A term in Computer Networking Protocol, it stands for Transmission Control Protocol/Internet Protocol.

It serves the function of indicating how data is transported over the internet by ensuring that there is communication from end to end.

This end-to-end communication process is able to spot how such data can be sectionalized into packets, addressed, routed, transmitted and how it is received when it gets to the terminal point.

Learn more about TCP at:
https://brainly.com/question/17387945
#SPJ1

An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a(n)

Answers

Answer:

Explanation:

A computer virus

How do people and computers approach problems differently

Answers

Answer:

These technologies can assist humans in problem-exploring. According to Whitworth and Ryu, some tasks difficult for humans may be easy for computers and vice versa. Emergent computational technologies under Industry 4.0 present an opportunity for application in problem-exploring.

Explanation:

There are numerous strict and steadfast rules when it comes to composition.

answers:
true
false

Answers

Answer:

false

Explanation:

none ¯\_(ツ)_/¯

Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. public b. protected c. private d. constant

Answers

When a member is declared as b. protected in the base class, it provides access to that member in the derived classes but not to anyone else.

What is a derived class?

A derived class can be defined as a type of class that inherits the information or members of a base (parent) class such as a car in a syntax.

Basically, a public class is accessible to everybody while a private class can only be accessed by users within the declared class. Also, a constant is a class whose value remains unchanged.

In Computer programming, when a member is declared as protected in the base class, it ultimately provides access to that member only in the derived classes but not to other members or anyone else.

Read more on data types here: brainly.com/question/20264183

#SPJ1

Differentiate between types of JavaScript object. Grade 9

Answers

Answer:

Object.

Date.

Array.

String.

Number.

Boolean

Def transfer(bank, log_in, usera, userb, amount): ''' in this function, you will try to make a transfer between two user accounts. bank is a dictionary where the key is the username and the value is the user's account balance. log_in is a dictionary where the key is the username and the value is the user's log-in status. amount is the amount to be transferred between user accounts (usera and userb). amount is always positive. what you will do: - deduct the given amount from usera and add it to userb, which makes a transfer. - you should consider some following cases: - usera must be in the bank and his/her log-in status in log_in must be true. - userb must be in log_in, regardless of log-in status. userb can be absent in the bank. - no user can have a negative amount in their account. he/she must have a positive or zero balance. return true if a transfer is made. for example:

Answers

Using the knowledge in computational language in python this code will be described for bank is a dictionary where the key is the username and the value is the user's account balance.

Writing code in python:

def transfer (bank, log_in, userA, userB, amount):

if userA in bank and log_in[userA]:

 if userB in log_in:

   if amount <= bank [userA]:

     bank [userA] -= amount

     bank[userB] += amount

     return true

 return false

 bank= {"Bradon": 115.5, "Patrick": 18.9, "Sarah": 827.43, "Jack": 45.0, "James": 128.87}

 log_in= {"Bradon": False, "Jack": False, "James": False, "Sarah": False}

 transfer(bank, log_in, "Bradon", "Jack", 100)

See more about python at brainly.com/question/18502436

#SPJ1

At what point in the app-development process is it essential to include the developer?

coding
marketing
programming
scripting

Answers

At coding in the app-development process, it is it essential to include the developer.

What comes first in app development?

The first stage is known to be Strategy where a person needs to work out everything from what they want the app to do.

Note that At coding in the app-development process, it is it essential to include the developer as one needs to ask them what the app is really made for and carry them along.

Learn more about app-development from

https://brainly.com/question/11352260

#SPJ1

Which option identifies the programming paradigm selected in thr following scenario? A student is writing a science fiction story that deals with artificial intelligence. He wants to be realistic. He decides to add computer terms to the story that pertain to his storyline.

A. Java
B. Python
C. Perl
D. Ruby

Answers

Answer:

java

Explanation:

Java es rápido, seguro y fiable. Desde ordenadores portátiles hasta centros de datos, desde consolas para juegos hasta computadoras avanzadas, desde teléfonos móviles hasta Internet, Java está en todas partes. Si es ejecutado en una plataforma no tiene que ser recompilado para correr en otra. Java es, a partir de 2012, uno de los lenguajes de programación más populares en uso, particularmente para aplicaciones de cliente-servidor de web

Pls help me po:{

I need the answer lang po talaga , pls:{

Answers

Answer:

for cutting it's scissors for measuring it's the tiny measurement spoonlikes for mixing it's the blender and preparatory

Suppose you need to create the variable fullname by concatenating the values of firstname, which contains first names, and lastname, which contains last names. what's the best way to remove extra blanks between first names and last names

Answers

The right way to remove extra blanks between first names and last names is

data temp;

set cert.maillist;length FullName $ 40;

fullname=trim(firstname)||' '||lastname;

run;

What is TempData?

This is known to be a term that is used to  transfer data from view to controller and it is one that saves the data temporarily.

Note that The right way to remove extra blanks between first names and last names is

data temp;

set cert.maillist;length FullName $ 40;

fullname=trim(firstname)||' '||lastname;

run;

Learn more about data from

https://brainly.com/question/25639778

#SPJ1

write the home cell of MS Excel.​

Answers

Answer:

MS Excel

Explanation:

introduce yourself by following the rule

Answers

My name is Trisha Davis, I am a first year medical student and i love to read and write books. I hate lies and i love anyone who is honest.

What is self introduction?

My name is Trisha Davis, I am a first year medical student and i love to read and write books. I hate lies and i love anyone who is honest.

My goal in life is to be a medical doctor and also an entrepreneur. I love to help others and put smile on people's face. What  i want from life is good health, favor and avenue to showcase my gifts to the world.

Learn more about self introduction from

https://brainly.com/question/26685169

#SPJ1

Convert the folllowing binary number to decimal:00101

Answers

Answer:

5

Explanation:

Each digit in binary is worth double the amount compared to the number to the right of it. This means the rightmost number is 1, the second rightmost is 2, the third rightmost is 4, and so on.

If a digit has a 1 in the place, you add however much it is worth to the decimal count.

For example, this number has a 1 in the third rightmost. The third place here means a 4, so we add 4 to the count. It also has a 1 in the rightmost place, so we add 1 to the count.

Any digit with 0 is simply there to hold the place and can be ignored.

A bit confusing but hopefully you understand

If there is no author to a website you are citing you cannot cite it.

Answers

This is false, if I remember correctly you are supposed to put ‘np’ or something along those lines to represent that there was no author name given. As long as you have other details you CAN cite the website.

(I don’t even know if this is a question but if it is I think was a true or false question?)

Designed to be small enough to be used on your lap:

A. Desktop
B. Laptop
C. Supercomputer ​

Answers

Answer:

B. laptop

Explanation:

hjji0hbvjjnh.

B. Laptop

It’s very easy to carry around and be used on your lap! I recommend a razor or an apple laptop!

Java Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both single words. Then the program outputs last name, first name. End with newline. Example output if the input is: Maya Jones Jones, Maya

Answers

Java Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both single words are CODE- //SpaceReplace.java import java. util.Scanner.

What is Java?

Developers use Java to assemble packages in laptops, information centers, recreation consoles, clinical supercomputers, molecular phones, and different devices. Java is the world's 0.33 maximum famous programming language, after Python and C – consistent with the TIOBE index, which evaluates programming language popularity.

CODE-//SpaceReplace.java import java.util.Scanner;public elegance SpaceReplace }.Maya Jones Jones, Maya Program completed with go out code zero Press ENTER to go out console. <CODE-//QuitScreen.java import java.util.Scanner;//Create a category QuitScreen.Public elegance Quit Screen the principle function public static void main(String[] args)in step with the letter to quit and the //numPresses.System.out.println("Press the "+letterToQuit+" key "+numPresses+" instances to quit.");   //Return, return;  }//End of the primary function.}//End of the elegance QuitScreen.

Read more about the Java :

https://brainly.com/question/25458754

#SPJ1

Answer:

import java.util.Scanner;

public class SpaceReplace {

  public static void main(String[] args) {

     Scanner scnr = new Scanner(System.in);

     String firstName;

     String lastName;

     firstName = scnr.next();

     lastName = scnr.next();

     

     System.out.println(lastName + ", " + firstName);

  }

}

Explanation:

If you accidently looked up a link, and the same link keeps popping up everywhere, how do you stop it? On a phone.​

Answers

Answer:

u go to your settings and stop notification

Answer:

On your Android phone or tablet, open the Chrome app Chrome · Go to a webpage. · To the right of the address bar, tap More More and then · Tap Site settings.

What will be the output, if any, when the user clicks the right mouse button?

from tkinter import
def clicked(event):
print("That hurt.")
widget = Button(None, text='Button')
widget.pack()
widget.bind('', clicked)
widget.mainloop()

O an error statement
O That hurt.
O no output
O Button

Answers

The output, if any, when the user clicks the right mouse button is (b) That hurt

How to determine the output?

The flow of the program implies that:

When the user clicks the button, the program prints "That hurt" without the quotes.

This action is on the third line of the program

Hence, the output, if any, when the user clicks the right mouse button is (b) That hurt

Read more about programs at:

https://brainly.com/question/16397886

#SPJ1

Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain controllers. the attacker initiated the query from a client computer. what type of injection attack did the attacker perform

Answers

Based on the above scenario, the type of injection attack that the attacker perform is LDAP injection

What is LDAP Injection?

This is known to be a  kind of  an attack where one do exploit web via the use of applications that create LDAP statements as a result of on user input.

Note that if an application fails to rightly sanitize user input, it's very easy to modify LDAP statements via the use of local proxy and as such, Based on the above scenario, the type of injection attack that the attacker perform is LDAP injection

Learn more about open connection from

https://brainly.com/question/5338580

#SPJ1

Which of the following choices is evidence that present-day vertebrates shared common ancestors?
They all have hearts and feet.

They display similar embryo development and share common genes that control development.

They have many bone structures that are unique to each species.

They all thrive in a single
ecosystem.

Answers

Answer:

B/Second

Explanation:

They display similar embryo development and share common genes that control development.

Which original VPN protocol is supported by most platforms but offers low levels of security?

IPsec
PPTP
L2TP
SSL VPN

Answers

Answer:

vpn

Explanation:

PPTP is the least secure. ...

L2TP/IPsec is a good VPN solution for non-critical use; however, this protocol, like PPTP, has been compromised as well. ...

Across many areas of the IT world, OpenVPN is easily the best all-around VPN solution.

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue

Answers

A command that should be used to remove these two print jobs from the print queue is cancel Printer1-17 Printer1-21.

What is printing?

Printing can be defined as a process that typically involves sending print jobs from a computer system to a printer, especially through the print queue.

In Computer technology, "cancel Printer1-17 Printer1-21" is a command that should be used to remove the two (2) print jobs from the print queue of Printer1 which is yet to start printing.

Read more on printer here: https://brainly.com/question/17100575

#SPJ1

help me my homework on tle

Answers

Answer:

from left to right

emergency telephone

first aid

caution (slip hazard)

not eating or drinking

toxic

wear shoes/boots

safety helmet

goggles

wear gloves

no access

Other Questions
a running relay team ran a 400 meter race in a record-setting time of 36 seconds.what was their average speed to the nearest tenth of a meter per second? 20 ftThe ceiling of Stacy's living room is a square that is 20 ft long on each side. Stacyknows the diagonal of the ceiling from corner to corner must be longer than 20 ft.but she doesn't know how long it is.Solve for the length of the diagonal of Stacy's ceiling in two ways:(a) Using the Pythagorean Theorem.(b) Using trigonometry.Round each answer to the nearest whole number and make sure to show all yourwork. (Hint: the answers should be the same!) what is the product of -2/7and-3/7 What popular form of entertainment drew from the immigrant experience a ragtime b baseball c vaudeville d basketball Giving sustained focus to things that are important is also known as. Determine the number of triangles that can be constructed given the conditions in a-d.a. mb. Three line segments measure 21 inches, 7 inches, and 4 inches _c. RS = 14 cm, md. m what is the answer?A. . declarative B. ? interrogative C. . imperative D. ! exclamatory Hey, that was such a loud clap _____ Choose the correct form of the verb to complete each sentence.1. T _____ despus de clase.A. PatinoB. PatinasC. Patina D. PatinamosE. Patinan 2. Nosotros _____ archivos. A. Bajo B. BajasC. BajaD. Bajamos E. Bajan3. Yo _____ videos. a. alquilo b. alquilas c. alquila d. alquilamos e. alquilan4. Ellos _____ al bsquetbol. a. juego b. juegas c. juega d. jugamos e. juegan5. Mara y yo _____ msica. a. escucho b. escuchas c. escucha d. escuchamos e. escuchan6. Elena _____ por telfono. a. hablo b. hablas c. habla d. hablamos e. hablan7. 7. Ustedes _____ los fines de semana. a. descanso b. descansas c. descansa d. descansamos e. descansan 1 tablespoon is equivalent to _____ ml. 1 1/2 + 1 x 2 + 1 1/2 solve w^2 + 7w - 18 = 0with the steps pls Which inequality has a solid boundary line when graphed?Y9x+9 Identify the choice that best answers the question. Which of these sentences is written in the passive voice? Do I have to be at least 18 to get my ged? what percentage of 2m is 40cm A leader who shields her workers from the negative consequences of an action is practicing ______. a. accountability b. decisiveness c. honesty d. vision please select the best answer from the choices provided a b c d Monica earned twice as much Samuel walking dogs. The amount Samuel earned was $7 more than Kara earned. Suppose Monica earned $48.50. Write and solve an equation to find the amount Kara earned. What is the difference between the greatest amount earned and the least amount earned walking dogs? When listening to a play rather than reading it, why is it important to focus on how characters deliver their lines 3^4 + 4 5 = ____. (Input whole numbers only.) Match each sentence with theindirect object pronounneeded to correctly completethe sentence.A losestudiantesnogusta la tarea.A ti y a minteresa el arte.A ellaaburre elftbol.A ti nofalta nada.