Suppose a String name is given in a format where the firstname and lastname are separated by a semicolon like ‘Ziaul;Hossain’ ; the general format would be ‘firstname;lastname’ (firstname and lastname can be any String). Write a program which will separate the lastname into a different string. (Hint: use a function from String class to find the position of semicolon and then take substring from that position).
Q: What does this code accomplish? subi $sp,$sp,8 sw $3,4($sp) sw $4,0($sp) push the contents of...
A: push the contents of $3,then $4 onto stack Explanation:- subi $sp,$sp,8 this instruction will make a...
Q: ain and range in real life scenarios. Please highlight the domain and range in the example. MAKE SUR...
A: given - Make 3 unique examples of domain and range in real life scenarios. Please highlight the doma...
Q: Let A be an array of integers of size 10, whose ith entry is represented by A[i] for i = 0 to 9, and...
A: - According to the rules, we have to check for the element 85 position in the array.
Q: Write the sum -3+5 – 7+9 – 11+ 13 – 15 + 17 – 19 +21 using sigma notation. The form of your answer w...
A: Given series is, -3+5-7+9-11+13-15+17-19+21 This series contains the odd numbers one one starting fr...
Q: The assembler pseudoinstruction ble $20,$15,Label branches to Label if $20 ≤ $15 in signed integer...
A: To choose right option
Q: Question 5 Analyze the following code: Number[] numberArray new Integer[2]: numberArray[0] - new Dou...
A: The correct answer is
Q: the steps involved in programming binary search operation to search an element 56 in the following n...
A: Lets see the solution.
Q: ch8 1. Think of a time when you overlearned something. How did it happen? How was that overlearning...
A: Learning more than required is known as overlearning.
Q: You are required to use any OOP language(Java or any other) to create programs that contain differen...
A: According to the Question, we have to create programs that contain different types of coupling using...
Q: Show that a function y = n^4 + 3 can not belong to the set O(1) using the formal definition of Big-O
A: Show that a function y = n^4 + 3 can not belong to the set O(1) using the formal definition of Big-O
Q: What exactly is a server, and what is it often used for?
A: Intro A server is a central computer that stores data (databases) and applications for connecting to...
Q: A) Application Areas of Al includes Mundane tasks, Formal tasks and Expert tasks. Define and provide...
A: A) Introduction: Application areas of AI: The AI has three main domains where the use of AI is benef...
Q: 1. Name the four assumption of a criminal profile. 2. What is a cyber nomad? 3. What is multifactor ...
A: *As for company norms and guidelines we are providing first three sub parts of the given question so...
Q: Write down the source java code of the GUI shown by the pictures below. Make sure that the Create A...
A: import java.awt.BorderLayout;import java.awt.Dimension;import java.awt.Font;import java.awt.Image;im...
Q: What Is the Hierarchy of Data Warehousing?
A: Hierarchies play a crucial role in the processing and monitoring of data in data warehouse systems. ...
Q: Describe and explain the part of the menu bar and navigation tools in SAP Business One. Why do you t...
A:
Q: What are the three primary roles of database administration?
A: Introduction: Maintenance is handled by Database Administrators, which involves monitoring servers, ...
Q: What is the function of the PIC controller 8259A?
A: In either the 8085 or 8086 microprocessor, the 8259A PIC controller is utilized. It is used to incre...
Q: help with c++...paste working indented code plzz 2. Continuous of question 1. Implement operator ov...
A: Program Explanation:- Using the header file. Using standard namespace input/output function. Define...
Q: What is the most ubiquitous and portable of the four input/output levels in a computer system?
A: Introduction: When it comes to computer systems, there are four different levels of input/output: T...
Q: Create a toolbar and a layout.
A: Introduction: A toolbar (formerly known as a ribbon) is a graphical control element on which on-scre...
Q: Consider a database system for an airline that employs snapshot isolation. Describe a situation in w...
A: Given: Consider a database system for an airline that employs snapshot isolation. Describe a situati...
Q: Assumptions for this exercise. Alphabet E = { a, 6} To do in this exercise . • Construct a Nondeterm...
A:
Q: Simplify the following expression: (a) AB′C′ + A′B′C′ + A′BC′ + A′B′C (b) (A + B + C) (A + B′ + C′) ...
A: Introduction Simplify the following expression:(a) AB′C′ + A′B′C′ + A′BC′ + A′B′C(b) (A + B + C) (A ...
Q: Provide a comparison between a Hub, a Switch and a Router. no plagiarism work. thanks.
A: Introduction: Provide a comparison between a Hub, a Switch, and a Router.
Q: 6] Instructions: Underline the infinitive and box the infinitive phrase in each sentence and identif...
A: Megan is trying to practice the piano an hour a day.
Q: What are some of the advantages of compiling to bytecode instead than machine code?
A: Java uses bytecode before execution of actual program. Bytecode is processed source code by java.
Q: through the keyboard, write a function to calculate multiplication of digits of the 5-didit number (...
A: given - A 5-digit positive integer is entered through the keyboard, write a function to calculate mu...
Q: Define the Exception Classes? what are the characteristics of these classes?
A: Please refer below for explaination for both questions:
Q: 1. If a node x is the inorder successor of node y then node x must appear in y's subtree. (In Binary...
A: inorder traversal means traversal through left root right.
Q: In MIPS architecture, a pop causes $sp to:
A: $sp it is a stack pointer which is a general purpose register. Stack pointer always point to the t...
Q: Is the destination operand is the second operand in a MOV instruction ?
A: According to the information given:- We have to define the destination operand is the second operand...
Q: 1. Create a console program that will perform the following: Ask the user to enter the pieces of app...
A: I have explained the code in comments of the code itself Also attached the screenshots of program an...
Q: Which measures for usability and user experience were used in the review, and how were they distribu...
A: answer is
Q: Identify and describe the four key components of an information system.
A: Introduction: Here we are required to describe the four key components of an information system.
Q: Why, despite the additional work required to assur create difficulties, do database systems offer co...
A: Below the despite the additional work required to assure that concurrent execution does not create ...
Q: rite a program using function with return type and with parameter to check whether a number is palin...
A: Lets see the solution.
Q: The Harvard robotics club has organized a Robothon. n robots are placed along the edge of a circular...
A: Introduction: Now we can see that the most outstanding amount of money that the club could end up sp...
Q: What is the a) "The Weakest Link In Cybersecurity" and b) what can be done to prevent it?
A: a) "The Weakest Link In Cybersecurity Ans:- the weakest link is the employee of any organization. t...
Q: for Row = 2:N for Column = 2:N Pascal (Row, Column) = Pascal (Row-1, Column) + Pascal (Row, Column-1...
A: so in the above picture, a Matlab code is given for Pascal Triangle.
Q: Please convert the following segment of code into LEGv8/ARMv8. Assume g and h are in registers X19 a...
A:
Q: What is the main advantage of floats over ints? O They can be directly used as strings O Nothing, th...
A: Question given - What is main advantages of floats over ints? Right answer- option (4): They can dea...
Q: the program and the data it processed. Limit your paper to a single paragraph with at least 50 words...
A: given - Using Jcreator, open, compile, and run java and observe its runtime. Write your observation ...
Q: In python, create a code that accepts the size of a list as an input (n). It will print out all the ...
A: here in this question we have asked to write a program in python which take a list as input and prin...
Q: Note: I need only correct option with explanation. Don't give direct option and wrong answer. I'll g...
A: MIPS Programming - Functioning properly: The goals of just this class are to go through the fundame...
Q: Following are some of the attributes domain. Explain with the reasoning, which are and are not the a...
A: We need to explain with the reasoning for, which are and which are not the atomic domain: (a) Sets o...
Q: Hi, could help find the error in my code please. here what the exercise ask: Name the script for.sh...
A: Algorithm: Start Read space-separated items Iterate through the items and store each item in the fi...
Q: Describe the phenomena of phantoms. Why, despite the usage of the two-phase locking scheme, might th...
A: Phantom Phenomenon When there are multiple transactions that are taking place at the same time in an...
Q: Q3: complete the function that returns the area of a segment of a circle with radius r and angle the...
A:
Q: 21. Select from the list 3 ip address which belong to class C private (choose 3) 10.75.0.254 172.16....
A: As given, we need to find out the 3 ip address which belongs to class C private.
Suppose a String name is given in a format where the firstname and lastname are
separated by a semicolon like ‘Ziaul;Hossain’ ; the general format would be
‘firstname;lastname’ (firstname and lastname can be any String). Write a
will separate the lastname into a different string. (Hint: use a function from String class
to find the position of semicolon and then take substring from that position).
Step by step
Solved in 4 steps with 2 images
- Take a string input from the user and print a modified string where the characters in the multiple of 3 positions (index starts from 0) are at the beginning, followed by a separator hyphen (-) in the middle and the rest of the characters are at the end. Keep in mind that in the input string there can be characters with both uppercase and lowercase letters, but in the final output, all the characters should be in lowercase. [You can not use built-in function lower() in this problem.]Write a program that prompts the user to input a string. The program then uses the function substr to remove all the vowels from the string. For example, if str = "There", then after removing all the vowels, str = "Thr". After removing all the vowels, output the string. Your program must contain a function to remove all the vowels and a function to determine whether a character is a vowel.I am trying to understand what it means when a variable or a function is static, but still not sure as to what it is. I understand this theoratically, but not sure as to how to when I should use this and how to apply this even in OOP when using the :: symbol? For example class Box{ static string set_name(string n); }; main.cpp #include "Box.h" #include <iostream> int main(){ cout << Box::set_name("my_name") << endl; }
- uestion 42: Return whether a string consists of a single letter In the function below, return True if the input string parameter consists of a single uppercase letter; otherwise, return False. Most solutions would do this in two logical steps: first testing if the string consists of a single character and, second, testing whether that character is one of the uppercase letters (which can be done by seeing if it is alphabetically between A and Z, inclusive).Write a program that inputs a student's name in the following form: lastName, firstName middleName. The program will convert the name to the following form: firstName middleName lastName. Your program must read the student's entire name in one variable and must consist of a user-defined function that takes as input a string, consisting of a student's name, and returns the string consisting of the altered name. You can use the string function find to find the index of ,(the comma); the function length to find the length of the string; and the function substr to extract the firstName, middleName, and lastName.Write a python function that takes a string as an argument. Then converts this string using the following three rules and finally RETURNS a new string to the function call. If the string is one character long, leave it alone. If the string ends with a vowel (a, e, i, o, u), just add ‘yay’ to the beginning of the string. (e.g., “apple” => “yayapple”) Otherwise, the last letter of the string is moved to the front and ‘ay’ is appended to the end (e.g., “dalek” => “kdaleay”) Assume, the argument string will always be in lowercase letters without any spaces. [ You cannot use slicing. You cannot use any built-in functions except input(), len(), split(), list.append(). ] ================================================ Function call1: function_name("b") Sample Output 1: b Explanation 1: Here, the length of the string is 1, so no modification was done to it. ================================================ Function call2: function_name("apple") Sample Output 2: yayapple Explanation…
- please code in python Write a function that receives a string and a number (n) as parameters and returns a new string that contains only every nth letter from the given string. print(everyNth('banana', 2)) # should return aaaprint(everyNth('carrot', 3)) # should return rtprint(everyNth('pear', 1)) # should return pearWrite a program with a function that accepts a string as an argument and returns a copy of the string with the first character of each sentence capitalized. For instance, if the argument is “hello. my name is Joe. what is your name?” the function should return the string “Hello. My name is Joe. What is your name?” The program should let the user enter a string and then pass it to the function. The modified string should be displayedWrite a function sum(x,y) that returns a string indicating what the sum of x and y is. For example, when x=3 and y=17 your function should return the string 'The sum of 3 and 17 is 20.'
- In Python, write a function named cipher that takes a string. The function returns that string in a ciphered form by using the ord of the first letter of the string to cipher each letter including the first letter. Hence for abc, use the ord of 'a', and add it to the ord of 'a' and convert that result to a character use the chr function. This character should be concatenated to the same action on the letter b and so on. Hence the function returns: chr(ord('a')+ord('a')) + chr(ord('a')+ord('b')) + chr(ord('a')+ord('c')).Obviously you need a loop to iterate on each letter. Write another function to decipher (do the opposite of the previous function), given a string and returns the deciphered string. Obviously, the first letter's ord is halved to find the first letter, and that value is used to decipher the remaining letters. From main, write code to get a string, as input, then call the cipher function and print its output.Then call the decipher function and display its output. The…Write a function called extractor() that takes a name as a parameter and counts every vowel present in it. The function should also identify and contact the consonants in another string. Finally, RETURN the total number of total vowels present in the name and the consonant string.Note: The name could be a mixture of uppercase & lowercase letters.Sample Input 1:MuhaiminulFunction call 1:extractor("Muhaiminul")Sample Output 1:(5, 'mhmnl')Explanation 1:Here, in the given name, we have 5 vowels (uaiiu). That's why 5 in the output. 'mhmnl' are the consonants present in the name.Sample Input 2:iLiyanaFunction call 2:extractor("iLiyana")Sample Output 2:(4, 'lyn')Explanation 2:Here, in the given name, we have 4 vowels (iiaa). That's why 4 in the output. 'lyn' are the consonants present in the name.Do Programming Exercise 4 from Chapter 5 using a function acronym(phrase)that returns an acronym for a phrase supplied as a string.