(C PROGRAMMING ONLY) 3. Starting My Business by CodeChum Admin I want to be an entrepreneur! But I don't have capital, could you help me find one? Hihi Instructions: Ask the user for an array of characters/string. For this program, it is guaranteed that the input of the user has one and only one capital character. Your task is to search for that one capital character and then print it and its index. Input 1. Inputted string Output Enter a string: jejuMar Capital M found at index 4
Q: indows, Mac, Android, etc.) are compared for multithreading approaches. The CPU Scheduling Algorithm…
A: Multithreading approaches for uniprocessor and multiprocessor systems in various working systems…
Q: What does the RAND study say exactly? What was the holdup? RAND Report R-609 sought to answer this…
A: Introduction:
Q: How do you use a computer
A: It might be intimidating to learn how to use a computer for the first time if you are a total…
Q: Given the below graph, show the minimum spanning tree (starting with node A). A B 1 5 E F D 6. 4 G
A:
Q: What part does artificial intelligence play in building databases? Incorporating artificial…
A: Introduction: The idea and emphasis of this explanation is to use a purpose-built database to speed…
Q: Do condition variables have any function? Exactly what is the purpose of a monitor? What do…
A: Introduction: Condition variables: Method data is loaded in software in page-sized chunks. The CPU…
Q: How do you connect with a computer that doesn't have an operating system?
A: The operating system is the most important piece of software for a computer to work properly. It's…
Q: lain what an intrusion dete
A: Introduction: Below an intrusion detection system
Q: Watchdog clocks are frequently used in embedded systems for a variety of reasons.
A: Introduction: An embedded system is a microcontroller or microprocessor-based system specifically…
Q: Are there any definitions available for the term "intrusion prevention system?"
A: Solution : Intrusion Prevention System : Intrusion prevention systems (IPS) are network security…
Q: Q2. Find out who got the highest score. Enter your formula into B13. 1 ID NAME SCORE 1 S1 93 2 S2 88…
A: Please find the answer below :
Q: How do the cohesion and coupling of a software design interact?
A: Introduction: "Low coupling and strong cohesion are required for good software design." When the…
Q: What is an intrusion prevention system specifically?
A: IPS is for intrusion prevention systems. It is a network security instrument (either hardware or…
Q: define the objective of the PMT function and the arguments in support of it
A: Beginning: A monthly payment for security or loans is known as a PMT. The interest rate is…
Q: In your opinion, what are the benefits and drawbacks of a global Internet?
A: Interview: As a consequence of the Internet and globalisation, the business world has changed…
Q: What are three reasons why web designers may build high-quality web design?
A: The following is the answer to the given question: Explanation The following are the top three…
Q: Is there a distinction between the two types of technology?
A: The solution is as follows: -
Q: Some of the ways in which internet is viewed as the apex of information and communication…
A: ICT is responsible for many communication operations, including telephone, broadcast media,…
Q: What is the difference between an intrusion detection system and an intrusion prevention system?
A: In the below can I explained compassion between intrusion detection system as well as intrusion…
Q: Is it feasible that Belady's oddity will effect the best way to replace pages? Your replies should…
A: DUCTION: This approach is used by the OS to replace pages that will not be used for the foreseeable…
Q: What distinguishes a computer?
A: What is a Computer? The computer is a data storage, retrieval, and processing device that can be…
Q: Problem 2: Using KMaps, find the simplest POS expression of F = Ew,x,Y,z(0, 1, 6, 7, 8, 9, 14, 15).
A: Given function F is for Sum of Products We can write the function for Product of Sums by replacing…
Q: Cybercriminals often attack web servers as a source of revenue. Assault prevention strategies should…
A: Prevention Strategies for cyber crimes are:1)Password should be strong We should always use the…
Q: 2.) Expected output is: 10 Chair 10 Table 20 Chair 20 Table
A: Answer the above program are as follows:
Q: (i.e., sum of the weight of th
A: Solution - In the given question, we have to find the cost of the minimum spanning tree of the given…
Q: Write a Program in C++ to copy two files contents and insert into the another file but will not…
A: Read both the files one after the other character by character Write it to the new file only if…
Q: In what way does it affect you if your data is stolen? What actually occurred, and how did it…
A: Information Secure: Techniques such as passwords, encryption, authentication, and security against…
Q: 1. Normalized the table.
A: Primary key for the given relation is (MemberNumber, DVD Code) The functional dependency are…
Q: Examine a method that you would use to manufacture a high-quality computer (machine) that is both…
A: Introduction: build a high-quality computer: (machine) that provides high performance at a modest…
Q: People of all ages use social networks to remain in touch with friends, family, colleagues, and…
A: Encryption: Social engineering assaults utilise psychological tricks to trick unwary users or…
Q: Description - displays all the odd numbers found in the array passed, starting from the end.
A: The array life is an integer datatype array whose size is 90.
Q: Conventional email is susceptible to denial of service attacks in a wide variety of methods. Use…
A: Answer: Attackers can utilize hijacked botnets to send out a vast volume of emails to a targeted…
Q: What are a website's fundamental components
A: Website: It is a group of interconnected web pages/electronic documents ordered in a certain…
Q: count = 0 sum = 0.0 while (count<10): number = float (input ("Enter a real number: ")) count=count+1…
A: Hello student Greetings Hope you are doing great Thank you!!!
Q: Bv The DNS is examined in detail, including requests that are iterated and those that aren't,…
A: DNS: DNS is the Internet's phone book, which is why it's so crucial. Humans utilize domain names…
Q: What factors contributed to the advancement of computer security into its current state?
A: Introduction: Computer security, often known as cybersecurity, refers to the safeguarding of…
Q: Write HTML code for the following given table
A: The HTML <tr> tag defines a row in an HTML table.
Q: How has OLED display progressed since its original idea in 1987? What OLED display types and specs…
A: The Answer start from step-2.
Q: Write a program that consists in three processes to print the message "ping-pong" two times on…
A: ANSWER:-
Q: How does a wi-fi evildirect attack work? Please do not use notes made by hand (Wi-Fi Direct…
A: In Wi-Fi Direct are vulnerable to the EvilDirect attack.
Q: Write the first three columns of an fstab entry that will mount the partition ext4 partition…
A: Yоur Linux system's filesystem tаble, аkа fstаb, is а соnfigurаtiоn tаble designed tо…
Q: Which Azure Domain features are most useful? Aside from Microsoft, there are various more cloud…
A: Introduction: Azure Active Directory (Azure AD) is a cloud-based identity and access management…
Q: Separate access control systems into their many subcategories using a variety of different…
A: Controlling access: Access control is a security mechanism that regulates the entry of employees…
Q: Create a simple java program that reads all the content in a .txt file, the user will enter the…
A: Answer:
Q: LDiscuss the following possible classification of outcomes in an AI experiment and provide 2…
A: Answer :
Q: Given the graph below: which node should be the source node ("x") in finding the shortest path tree…
A: The question is to choose the correct option from the given four options.
Q: Workers of Maunlad Canning Inc. have 40 regular working hours per week and are paid with an hourly…
A: The asked webpage has been coded using HTML and JavaScript languages and the if-else structure is…
Q: Take a sufficient sample of Gutenberg's couple of digital books of your choice. Create (random?!)…
A: import nltknltk.download('punkt')nltk.download('stopwords')from nltk.tokenize import…
Q: Why is the implementation of anomaly-based intrusion detection systems inherently more challenging…
A: Introduction: There are two sorts of detection in reality. (i) based on anomalies ii) Detection…
Q: Select ALL invalid binary search trees. A)
A: Rule of binary search tree:- Left child node must be less than parent node and right child node…
(C
3. Starting My Business
by CodeChum Admin
I want to be an entrepreneur! But I don't have capital, could you help me find one? Hihi
Instructions:
Ask the user for an array of characters/string. For this program, it is guaranteed that the input of the user has one and only one capital character.
Your task is to search for that one capital character and then print it and its index.
Input
1. Inputted string
Output
Enter a string: jejuMar
Capital M found at index 4
Step by step
Solved in 4 steps with 2 images
- JAVA CODE PLEASE FINAL EXAM Part 3 Instructions: Create a java program that asks & accepts input from the user (must be int value). Then depending on the number of inputs, the program will ask the user to enter string value/s. After, the program will print the strings entered by the user line-by-line. Constraints: Create a function and call it in the main function. Use Functions With No Parameters and Return Values Use for Loop Use String Array Use Scanner Input 1. One line containing an integer Sample 2 2. One line containing string Sample Funny 3. One line containing string Sample Sadly Output Enter·the·number·of·string·array:·2 Enter·string·#1:·Funny Enter·string·#2:·Sadly You've·entered: Funny Sadly(Numerical) Write and test a function that returns the position of the largest and smallest values in an array of double-precision numbers.Option #1: String Values in Reverse Order Assignment Instructions Write a Python function that will accept as input three string values from a user. The method will return to the user a concatenation of the string values in reverse order. The function is to be called from the main method. In the main method, prompt the user for the three strings.
- Strings and string manipulation Part A: Building upon an Existing Solution Redesign the solution in the following manner. Ask the user for their name and their email addresses before you display the results of the conversions. When the user enters their email address search the string for the @ symbol. If the symbol is not found, ask the user to re-enter their email address till they get it right. When you display the conversion output to the user, you must include the user’s name in the output. Part B: Write Something New! Write a complete and syntactically correct Python program to solve the following problem: Input a date in numeric format from the user e.g. mm/dd/yy. Examine the month entered by the user, if it is larger than 12 or smaller than 1, issue an error message and ask for input again. Perform similar validation tests for the date and year. Year must be 2015. (Any other year is invalid). In addition, the year must only be two digits long.. Once all input has been…Rest of code in image / This is a bad programming style since it is using goto. // This is an spagetti code and not working.// Use function to display menu, and display game rules,// Use different color for text display.// fix it so it works any way you like./*HANDLE screen = GetStdHandle(STD_OUTPUT_HANDLE); // Write 16 lines in 16 different colors. for (int color = 0; color < 16; color++) { SetConsoleTextAttribute (screen, color); cout << " Hello World!" << endl; Sleep(400); // Pause between lines to watch them appear } // Restore the normal text color) SetConsoleTextAttribute(screen, 7);*/#include <iostream>#include <windows.h>using namespace std;int main(){ //textbackground(WHITE); //textcolor(RED); system("cls"); char ch, a[20], ch2; int num = 100, rnum, guess, count, ch1, c = 0; cout << "**********************************************************"<<endl; cout << "*…C Language You are conducting a linguistic study and are interested in finding words that contain the letter 't' or 'T' in the first half of the word (including the middle letter if there is one). Specifically, if the first half of the word does contain a 't' or a 'T', your program should output a 1. If the first half does not contain the letter 't' or 'T', but the second half does, then your program should output a 2. Otherwise, if there is no 't' or 'T' in the word at all, your program's output should be -1. You may assume that the word entered does not have more than 50 letters. Examples Input: apple Output: -1 Input: raincoat Output: 2 Input: enter Output: 1 Input: Taylor Output: 1
- Questions: Computer-Assisted Instruction) The use of computers in education is referred to as computer- assisted instruction (CAI). Write a program that will help an elementary school student learn multiplication. Use the rand function to produce two positive one-digit integers. The program should then prompt the user with a question, such as How much is 6 times 7? The student then inputs the answer. Next, the program checks the student’s answer. If it’s correct, display the message "Very good!" and ask another multiplication question. If the answer is wrong, display the message "No. Please try again." and let the student try the same question repeatedly until the student finally gets it right. A separate function should be used to generate each new question. This function should be called once when the application begins execution and each time the user answers the question correctly. PLEASE IN C++ LANGUAGEC++ Programming Instructions Write a program that prompts the user for a sequence of characters (all typed on a single line) and counts the number of vowels ('a', 'e', 'i', 'o', 'u'), consonants, and any other characters that appear in the input. The user terminates input by typing either the period (.) or exclamation mark character (!) followed by the Enter key on your keyboard. Your program will not count white space characters.I.e., you will ignore white space characters.Though, the cin statement will skip white space characters in the input for you. Your program will not be case-sensitive. Thus, the characters 'a' and 'A' are both vowels and the characters 'b' and 'B' are both consonants. For example, the input How? 1, 2, 3. contains one vowel, two consonants, and six other kinds of characters. IMPORTANT: Your program must use the while statement only when looping. I.e., do not use a for statement or any other looping statement. Test 1 > run Enter text: . Your sentence has 0…Use C Language Airline Reservation System A small airline has just purchased a computer for its new automated reservations system. The president has asked you to program the new system. You are to write a program to assign seats on each flight of the airline's only plane (capacity: 10 seats). Your program should display the following menu of alternatives: Please type 1 for "first class" Please type 2 for "economy" If the person types 1, then your program should assign a seat in the first class section (seats 1-5). If the person types 2, then your program should assign a seat in the economy section (seats 6-10). Your program should then print a boarding pass indicating the person's seat number and whether it is in the first class or economy section of the plane. Use a single-subscripted array to represent the seating chart of the plane. Initialize all the elements of the array to 0 to indicate that all seats are empty. As each seat is assigned, set the corresponding elements of…
- C programming The field of astronomy has been significantly advanced through the use of computer technology. Algorithms can automatically survey digital images of the night sky, looking for new patterns. For this problem, you should write such an analysis program which counts the number of stars visible in an bitmap image. An image consists of pixels, and each pixel is either black or white (represented by the characters # and -, respectively). All black pixels are considered to be part of the sky, and each white pixel is considered to be part of a star. White pixels that are adjacent vertically or horizontally are part of the same star. Input Each test case begins with a line containing a pair of integers 1≤m, n≤100. This is followed by mm lines, each of which contains exactly nn pixels. Input contains at least one and at most 50 test cases, and input ends at the end of file. Output For each case, display the case number followed by the number of stars that are visible in the…Grade Book A teacher would like to assign a letter grade to a student, based on student's test score. Write a program to help this teacher managing her students' test score. Use the following grading scale to assign a letter grade to a student. Test Score Letter Grade 80 - 100 A 70 - 79 B 60 69 C 50 - 59 0- 49 F Your program must have an array of string objects to hold the student names and an array of int to hold the student scores. Let the teacher determines the number of students and ask the teacher to enter the information for each student. Your program should have the following programmer-defined functions: getInput () - to read the students name and scores from user getGrade () - to determine the letter grade corresponding to the score getReport () - to determine the maximum, minimum, average and standard deviation of the scores Display an error message if the teacher enter mark below 0 or above 100, and keep asking for a valid value. The program should also be capable of…esktop/CSE110%20OLab%20Assignment%203.ipynb Search b Assignment 3- er CSE110 Lab Assignment 3 (auftosaved) Lo View Insert Cell Kernel Help Pythons Not Trusted M Run Markdown bangla Task 2 Write a Python program that will ask the user to enter a word as an input. • If the length of the input string is less than 4, then your program should print the same string as an output. If the input string's length is greater than 3, then your program should add "er" at the end of the input string. • If the input string already ends with "er", then add "est" instead. • If the input string already ends with "est", then your program should print the same input string as an output. Example 1: Input: strong REDMI NOTE 9 AI QUAD CAMERA