Python dictionary object

Assignment Help Basic Computer Science
Reference no: EM132323046

1. You have been hired by a small software company to make a "thesaurus" program that replaces words with their synonyms. The company has set you up with a sample thesaurus stored in a Python dictionary object. Here's the code that represents the thesaurus:

# define our simple thesaurus

thesaurus = {

             "happy": "glad",

             "sad" : "bleak"

           }

The dictionary contains two keys - "happy" and "sad". Each of these keys holds a single synonym for that key.

Write a program that asks the user for a phrase. Then compare the words in that phrase to the keys in the thesaurus. If the key can be found, you should replace the original word with a random synonym for that word. Words that are changed in this way should be printed in

UPPERCASE

letters. Make sure to remove all punctuation from your initial phrase so that you can find all possible matches.

Here's the sample run of your program:

Enter a phrase: Happy Birthday! exclaimed the sad, sad kitten

GLAD birthday exclaimed the BLEAK BLEAK kitten

Comment your source code and describe your code to someone who may be viewing it for the first time.

Reference no: EM132323046

Questions Cloud

What is the amount of goodwill acquired by josef ltd : Josef Ltd acquired 90% of the share capital and reserves of Peter Limited for $170,000. Share capital was $100 000 and reserves amounted to $62 000.
Understanding of the mintzberg model : Objective: Students will demonstrate their understanding of the Mintzberg model and how it can be applied to improve performance.
Keep track of vendor email addresses : Using Python programmingYour company needs a way to keep track of vendor email addresses.
Describe the managements decision-making process : Describe the concepts: Terms sales mix and its effect on break-even sales, Activity Based- Costing and include a discussion on why you think these topics.
Python dictionary object : The company has set you up with a sample thesaurus stored in a Python dictionary object. Here's the code that represents the thesaurus:
Remediation tie into information security maintenance : Describe how planning, risk assessment, vulnerability assessment, and remediation tie into information security maintenance
Prepare a schedule for showing budgeted cash receipts : Prepare a schedule for each month showing budgeted cash disbursements for Cloaks Company. Prepare a schedule for each month showing budgeted cash.
Personal computer name the backup solution : On your personal computer name the backup solution that you rely on the most. Why do you use that specific solution(s)?
Higher-numbered items : Consider the following locking protocol. All items are numbered, and once an item is unlocked, only higher-numbered items may be locked

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw a tree diagram that describes the call setup procedure

Draw a tree diagram that describes the call setup procedure.

  Implementation of all of the computer systems

It has been argued that getting nursing involved in the implementation of all of the computer systems in healthcare is a good thing

  Pros and cons of increasing the retirement age

What do you think the pros and cons of increasing the retirement age from 65 to 67 would be?

  Preserve evidence in a forensic laboratory

What are some of the things that must be done to preserve evidence in a forensic laboratory?

  Find at least five different error messages

Make various changes to cause different error messages. Find at least five different error messages. Write down each error message and what change you introduced to provoke this error.

  The strike predicate need not work

Define a predicate strike(X,Y,Z) that succeeds if and only if the list Z would be obtained if one were to remove all occurrences of element X from list Y. The strike predicate need not work well when Y is an unbound variable.

  Describe the importance of variable naming and conventions

Describe the importance of variable naming and conventions. What makes this so important when working with a team to develop a game or application? What do you think are the implications of not naming, or not naming correctly, variables in the ..

  Determine writing skills

You must select 10 of the 13 essay questions to answer to determine your writing skills. How many ways can you select those questions?

  Highlighting the most important information security

Assume that the IT department of a business has hired you, and your first task is to ensure the department is following essential information security practices.

  How lseek call makes a seek to file

Where lseek call makes a seek to byte 3 of file. What does buffer comprise after the read has completed?

  Can anybody give me a snippet or a little guide

I need to calculate the hash of the file that its path is stored in fpath variable.I think it can be done via GetHashCode. Can anybody give me a snippet or a little guide?

  Concept of cryptograms

How to create a java code with the concept of cryptograms? If the text is long then how to use the frequency of occurrence of each character?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd