main.c 2. Capital - Small = ? by Jemar Jude Maranga Given a string that's guaranteed to only have alphabetical and space characters, compute for the difference between the number of capital letters and the number of small letters and the print that difference. Input A single line containing a string. Enter Sample Output A single line containing the difference -7
Q: Write a C++ program to “create” (i.e. display on the screen) an American Flag of dimensions: a. Widt...
A: Your C++ program is given below as you required with an output.
Q: Determine if the sum of two integers is equal to the given value Given an array of integers and a va...
A: Let us see the answer Code:- bool find_sum_of_two(vector<int>& A, int val) { unordered_se...
Q: 13. Give data memory location assigned to PIN registers of Ports A-C for the ATmega32. 14. Give data...
A: The four ports of the AVR ATmega16 are made up of 32 pins. Following is a list of ports to visit: 1....
Q: What is your opinion of the Internet's value to individuals? How essential do you believe the Intern...
A: Intro The Internet holds a significant value in our lives. We spend most of our time surfing on the ...
Q: Given the instruction: j Finish where its 32-bit format is 0x08100008 and its address in text segmen...
A: As mentioned above the user is using the Mips language, and in the pseudo direct addressing which us...
Q: What property can you use to change the appearance of the text displayed in a Label control?
A: Solution: Label control can be changed by applying various properties like BorderStyle, Font, TextAl...
Q: Define medium-risk initiatives.
A: Introduction the question is about Define medium-risk initiatives. and here is the solution in the n...
Q: nformation centers that want to automate their part recall operations must tackle the problem from a...
A: Information centres are the source of truth for the users relying on them.
Q: What are the Advantages of Developing an IT Strategy?
A: Intro Benefits of an IT strategy An IT strategy must set out a vision for the future. It helps to...
Q: Define the circumstance when smart cards are required for authentication but magnetic stripe cards a...
A: Introduction: Data is saved via a tiny microchip implanted in a smart card, which is comparable in s...
Q: The Turing Machine below starts with the input 1111 with the head on the left most 1. What will be i...
A: We need to provide solution for:
Q: Explain the Unicode Transformation Format in a few words (UTF)
A: Unicode Transformation Format (UTF) The Unicode transformation format is the format of characters en...
Q: Some observers anticipate that if the trend toward increasingly sophisticated CASE tools continues, ...
A: Introduction: CASE tool: Presently, the CASE tools are used to reduce the workload. For example, usi...
Q: Use the recursion tree method to guess tight asymptotic bounds for the recurrence T(n)=4T(n/2)+n. Us...
A: Recursion Tree Method may be a picturing of an iteration method which is within the sort of a tree w...
Q: What is DHCP and why do we need it?
A: let us see the answer:- Introduction:- Dynamic Host Configuration Protocol (DHCP) is a network manag...
Q: Write a C++ program that is concerned with employee's Salary .The Original Salary is entered through...
A: Start Accept number of emeployyes to read. Use for loop to read original salary from console. Cacula...
Q: What is information privacy? Describe five ways to keep your personal information protected.
A: Introduction: The right of an individual to access his or her personal information stored by a corpo...
Q: ython Programming: Write a program using unittest.TestCase methods to confirm that the addition and...
A: Lets see the solution.
Q: The distribution of keys was initially a problem that public key cryptography had to deal with. Make...
A: Introduction: Public key cryptography is a kind of encryption that necessitates the use of two separ...
Q: How can a Linux user get access to Microsoft Office documents?
A: Introduction: Microsoft Office may be installed on Linux using third-party tools like Wine or Cross ...
Q: What is the operation of MOVS instruction?
A: operation of MOVS instruction are :-
Q: When a view is deleted, what happens to the data that was displayed?
A: Introduction: When you delete a view, the definition and any information about the view are removed ...
Q: Determine the most important contrast between Internet access and phone service.
A: Introduction: There is a distinction to be made between Internet access and phone service.
Q: #include int main(void) { int sum = 0; int number = 0; while (number < 50) { ...
A: In this question, we are asked to modify the program so that it sums up-to 100 except 49, 50 and 51 ...
Q: Discuss four vocations that have been rendered obsolete by the arrival of multimedia in today's envi...
A: Introduction: Multimedia is an effective mode of communication because it enables simple conversatio...
Q: .Codomain is a subset of range true False
A: A function f:A→B, is a relationship from set A to set B. The restriction is, for every element a in ...
Q: What are your obligations as a Systems Analyst?
A: Introduction: An information technology system analyst's role is to analyse and create solutions to ...
Q: A Triangle will have 3 sides. The class will be able to keep track of the number of Triangle object...
A: Given The answer is given below.
Q: 1) into the data memory at address stored in ($s0). Hint: In this problem, the third byte value in ...
A: Note: We are given the data in bytes so de defined the variable size by bytes "db"
Q: Explain the operation of POP CX instruction.
A: Here in this question we have asked to explain the operation of POP CX instruction
Q: Prove that C = { |M(w) goes into state q4 during its computation} is undecidable.
A: Introduction Prove that C = { < M,w > |M(w) goes into state q4 during its computation} is ...
Q: What obstacles does the presence of diverse types of information systems in the enterprise pose? How...
A: Introduction: Integration and the entire firm viewpoint: Because of the diverse interests and viewpo...
Q: C++ Demonstration #3: What is the sample output of the program? int selection; do { // true for 1, 2...
A: The question is to write the output of the given C++ program.
Q: Find the sop (sum of Poreluet) of this follow ing Expresion. F(x4.Z)= Em[012, 3,5,6)
A: INTRODUCTION: Here we need to find SOP of the following expression.
Q: v) Write a Python program to input two strings s1 and s2 of lengths x1 and x2 respectively. Compute ...
A: Required:- v) Write a Python program to input two strings s1 and s2 of lengths x1 and x2 respectivel...
Q: Give examples of IT community resources that a systems analyst might find useful.
A: Introduction: IT community resources:- Community resources are the assets used to meet the necessar...
Q: Give a DFA (both state transition diagram and table as well as a description of each state) for the ...
A: The full DFA for the given problem statement is mentioned below. You can check for all cases the DFA...
Q: Part 1: Create a class named Supermarket representing an items show in a supermarket sections with t...
A: 1) Below is C++ Program to define Supermarket class with data memebers, constructor and methods It ...
Q: Write a class called Name that has one instance variable to store the full name of a person. A name ...
A: Program Explanation: Define a class for name Declare and define instance variables and constructors...
Q: o-day attacks" refer to cyber attacks that are so new to the Internet that no classification has bee...
A: In the cyber world, "zero-day attacks" refer to cyber attacks that are so new to the Internet that n...
Q: I know you guys can answer 3 Multiple choice at atime but please answer one extra so I do not have t...
A: The correct option is c that is String[] list = {"red", "yellow", "green"}; Solution 8: The correc...
Q: ERD 0 Business Rules -Orders can have many items -Restaurants can have many orders -Many custome...
A: We need to provide solution for : ERD 0 Business Rules -Orders can have many items -Restaurants can ...
Q: Is BGP more similar to RIP or OSFP in terms of functionality? Why?
A: BGP, Routing Information Protocol (RIP), and Open Shortest Path First (OSFP) are all protocols that ...
Q: Write a method to display the middle character of a string. Note: a) If the length of the string is ...
A: <?php$value = readline(); if((strlen($value) %2) != 0){ echo"The middle character in the strin...
Q: What exactly is array index out-of-bounds? Is C++ checking for array indices that are within bounds?
A: Intro Array index out-of-bound: The array is a collection of similar types of data. In an array, a...
Q: Python, using Conjunctive Normal Form formula, find a range of valeus of atomic proporsitions which ...
A: All of the following formulas in variables {\ displaystyle A, B, C, D, E} {\ displaystyle A, B, C, D...
Q: What is the best method for determining the function of an application that is currently executing o...
A: Introduction: Utility programmes are the tools that helped us analyse the programme and provide info...
Q: HelperMethods.java 1 public class HelperMethods 2 { 3 /** Gets the number of of times the charater c...
A: You have to provide one space between quotes in comparision if(str.charAt(i))==' ') //corrected area
Q: What is the difference between implicit and explicit locking in multiple-granularity locking?
A: Intro The multiple-granularity locking protocol ensures serializability by using various lock nodes....
Q: Which form of selection structure gives instructions that are only to be executed when its condition...
A: Intro There is three basic control structures in writing any procedure in an application: Sequence ...
Capital - Small = ?
Code in C language
Step by step
Solved in 3 steps with 1 images
- Section Test of Application... Note: You need to press "Final Submit" for your pr Given a string in which the same character occurs in many.consecutive character elements. Your task is to find the characters that have even frequency and are consecutive. Display the sum of every frequency count (For even frequency only). Example1: Input aaabbaccccdd Input String Output: Explanation: Input string "aabbaccccdd" contains 'a' 3 times, b' 2 times, again 'a' 1 time, 'c' 4 times, and 'd 2 times Here, the frequency of b.c and d is even and the frequency count is 2,4 and 2 respectively. Hence the output32-4-2%3D8 Example2: input: vdkkmmmnn Output Buns andur-Create a string from two given strings by concatenating common characters of the given strings. Sample Input harry, hermione dean, tom Sample Output hrrhr Nothing in common. Again, you have lost your USIS password!! You went to the registrar office and requested for a new password. This time, you need to follow some rules to set your password. Otherwise, they won't change it. The rules are At least one lowercase letter At least one uppercase letter At least one digit (0-9) At least one special character (_ , $ , #, @) Your task is to find whether a given password follows all those rules. If it breaks any rule, you have to print Lowercase Missing, Uppercase Missing, Digit Missing or Special Missing respective to the missing case. For more than one rule break, print all the rules that were broken (order doesn't matter). If the password is ok, print OK. Sample Input ohMyBR@CU ohmybracu OhMyBR@CU20 Sample Output Digit missing Uppercase character missing,…Lab Task 04: Include the methods in the file KMP_Implementation.txt in a complete Java program that prompts for and reads a text string and then a text pattern to search for in the text. It then displays the result of the search. Sample program runs: Enter the text: ABABСАВАВАВСАВАВСАВАВСАВАВКККАВАВСАВАВ Enter the pattern to search for: ABABCABAB Pattern found at these text starting indexes: 0 Enter the text: A KFUPM STUDENT Enter the pattern to search for: KFE Pattern not in text. 7 12 17 29
- public static String pancakeScramble(String text) This nifty little problem is taken from the excellent Wolfram Challenges problem site where you can also see examples of what the result should be for various arguments. Given a text string, construct a new string by reversing its first two characters, then reversing the first three characters of that, and so on, until the last round where you reverse your entire current stringDetermine if a string contain atleast 1 sandwich string. A sandwich string is a string with atleast 3 characters with first and last character being equal and the middle characters are all the same but not equal to the first and last characters. Print "True" if there is atleast one sandwich string, and False otherwise. Example: poooop - "True" holololaa - "True" Image - "False" Note: do not use def function in the program.Create a program that will accept any stringthat the user wanted to input. The program will segregate and display the letters in odd-places(1st, 3rd, 5th, ...) and even-places(2nd, 4th, 6th, ....) of the string. For example, the input string is “ArraysAndStrings”, the program will display the letters in odd-place as “AryAdtig” and in even-place “rasnSrns”.(C Language)
- Prompt for the user to enter their name. Print out their name forwards, backwards, vertically-forwards and vertically-backwards. You will need to declare a String variable, use Scanner to get input of a String, call a String method to isolate one letter and create a loop that traverses the name forwards and backwards. Sample Output: Enter your name: Florene Florene enerolF F l o r e n e e n e r o l F HINTS: Scanner input = new Scanner(System.in); String myName = input.nextLine(); // input is a Scanner object int len = myName.length() // len is the number of characters System.out.println (myName.substring(len-1, len)); // prints last letter I need help with coding the name "Pooja" vertically-forwards and vertically-backwards in java. If you could show me what codes to type in, that would be great. Thank you!A. Which statement about regular expressions is correct? a. To find all occurrences of a matching substring for a regular expression, you must add thegflag. b. By default, pattern matching using regular expressions locates all matches in the searched string. c. To find all occurrences of a matching substring for a regular expression, you must add theiflag. d. The default behavior of a regular expression is modified by adding flags to the beginning of the expression. B. After the following JavaScript statements execute, the value ofcrayonsis["pink", "blue", "green"]. let crayons = ["pink", "purple"];crayons.shift();crayons.unshift("blue", "green"); Select one: True False3. In a given string, there will be two uppercase letters in between some lowercase letters. Print the substring from the first uppercase letter to the last uppercase letter excluding them. If there are no letters in between them, print the word BLANK. It is guaranteed that there will be only two uppercase letters in the string. Sample Input baNgladEsh coDIng Sample Output glad BLANK
- The countSubstring function will take two strings as parameters and will return an integer that is the count of how many times the substring (the second parameter) appears in the first string without overlapping with itself. This method will be case insensitive. For example: countSubstring(“catwoman loves cats”, “cat”) would return 2 countSubstring(“aaa nice”, “aa”) would return 1 because “aa” only appears once without overlapping itself. public static int countSubstring(String s, String x) { if (s.length() == 0 || x.length() == 0) return 1; if (s.length() == 1 || x.length() == 1){ if (s.substring(0,1).equals(x.substring(0,1))){ s.replaceFirst((x), " "); return 1 + countSubstring(s.substring(1), x); } else { return 0 + countSubstring(s.substring(1), x); } } return countSubstring(s.substring(0,1), x) + countSubstring(s.substring(1), x); } public class Main { public static void main(String[] args) { System.out.println(Recursion.countSubstring("catwoman loves cats","cat"));…Read string integer value pairs from input until "Done" is read. For each string read: • If the following integer read is less than 40, output the string followed by ": low on stock". • Otherwise, output the string followed by ": well stocked". End each output with a newline. Ex: If the input is Oven 43 Curtain 7 Pillow 1 Done, then the output is: Oven: well stocked Curtain: low on stock Pillow: low on stock 1 #include 2 #include 3 using namespace std; 4 5 int main() { 6 7 8 9 10 } * Your code goes here */ return 0;Write a program that asks the user to enter a string, and then converts that string to Morse code. Use hyphens for dashes and periods for dots. Morse Code Table Character Code Character Code Character Code Character Code space space 6 - . . . . G --. Q --.- comma --..-- 7 -- . . . H . . . . R .-. period .-.-.- 8 ---.. I .. S . . . question mark ..--.. 9 ----. J .--- T - 0 ----- A .- K -.- U ..- 1 .---- B - . . . L .-.. V . . . - 2 ..--- C -.-. M -- W .-- 3 . . . -- D -.. N -. X -..- 4 . . . .- E . O --- Y -.-- 5 . . . .. F ..-. P .--. Z --..