Drag the tiles to the correct boxes to complete the pairs.
Match each task to the type of control structure represents.
switch case
sequence
repetition
if else
assembling structure step by step
choosing between two subjects
selecting a color out of five colors
testing a product until free of bugs

Answers

Answer 1

Answer:

A structure choosing between two subjects - Switch case sequence

Selecting a color out of five colors - If else assembling

Testing a product until free of bugs - Repetition


Related Questions

Assume that c is a char variable that has been declared and already given a value. Write an expression whose value is true if and only if c is what is called a whitespace character (that is a space or a tab or a newline-- none of which result in ink being printed on paper).

Answers

The expression whose value is true if and only if c is what is called a whitespace character is ( c == " II c== '\n' || c == '\t').

The "white-space character" space, tab, line feed (newline), carriage return, form feed, and vertical tab serve the same function as the spaces between words and lines on a printed page: they facilitate reading. White-space characters and other tokens, including operators and punctuation, serve as token delimiters (bounded spaces).

The C compiler ignores white-space characters while parsing code unless you use them as separators, as parts of character constants, or as literal strings. To make a program easier to read, use white space characters. Take note that comments are also treated as white space by the compiler.

Any character or string of characters used to represent horizontal or vertical space in typography is known as whitespace in computer programming. A whitespace character usually takes up space on a page even though it does not correlate to a mark when it is rendered.

For instance, the standard whitespace symbol U+0020 SPACE (also known as ASCII 32) is a punctuation mark for a blank space that is used to separate words in Western scripts.

To know more about whitespace character click on the link:

https://brainly.com/question/14936585

#SPJ4

What is SDLC & Agile Development

Answers

In software engineering, a software development process is a process of dividing software development work into smaller, parallel, or sequential steps or sub-processes to improve design, product management. It is also known as a software development life cycle.

What building on the Castle Crasher Playground will be the THIRD knocked over according to this project?

Answers

5 buildings on the Castle Crasher Playground will be the THIRD knocked over according to this project.

Project

A project is any individual or collaborative undertaking, possibly involving research as well as design, that is carefully planned to achieve a specific goal. An alternative viewpoint regards a project as a series of events: a "set of interrelated tasks to be completed over a fixed period of time and within certain cost and other constraints." A project is a temporary (rather than permanent) social system (work system) that may be staffed by teams (within or across organisations) to complete specific tasks under time constraints.

The algorithm should be written in such a way that the VR Robot can knock down all five buildings regardless of the layout of the Playground. Without modifying the project, knock down all buildings in five Castle Layouts.

To learn more about project

https://brainly.com/question/25009327

#SPJ9

Effective PivotCharts should include as many metrics as possible.
O True
O False

Answers

It is true that effective pivot charts should include as many metrics as possible. Hence, the statement is true.

What is a Pivot Chart?

A PivotTable to compile, examine, research, and display summary data In order to help you quickly see comparisons, patterns, and trends, PivotCharts add visualizations to the summary data in a PivotTable. You can use both pivot tables and pivot charts to make well-informed judgments regarding important business data.

You can connect to PivotTables in order to access other data sources such SQL Server tables, SQL Server Analysis Services cubes, Azure Marketplace, Office Data Connection (.odc) files, XML files, Access databases, and text files. Additionally, you can create new tables by utilizing already-existing pivot tables.

To get more information about Pivot Chart :

https://brainly.com/question/13198104

#SPJ1

Which of the following is NOT true of summary notes?
a. They can be created with a computer.
b. They tie together content from all readings, lectures, and lab sessions.
c. They are the same as the notes you take throughout the term in class.
d. They are created specifically for test reviews.

Answers

The incorrect statement about the summary notes is they are the same as the notes you take throughout the term in class. The correct option is c.

What are summary notes?

Summary notes are compact notes that are made for revision of purposes. These notes are the extract of all your studies. They contain main things and important subjects and topics.

They can be created on computers and phones, and they are smaller than the notes that are prepared in class.

Therefore, the correct option is c. They are the same as the notes you take throughout the term in class.

To learn more about summary notes, refer to the below link:

https://brainly.com/question/28176775

#SPJ1

You see a picture of three people having fun in an IG post. Beneath the photo is a text about a prty. You wrongly assume this picture was taken at a prty when it was actually taken during a family dinner. This type of misunderstanding is an example of

Answers

From the information given this type of misunderstanding is an example of: Communication Barrier.

What are communication Barriers?

Communication obstacles prohibit us from accurately receiving and accepting the messages used by others to transmit their information, thoughts, and ideas. Communication difficulties include information overload, selective perceptions, workplace gossip, semantics, gender disparities, and so on.

It is to be noted that the Assumption that you comprehend what the other person is saying is one of the most significant communication barriers. People frequently make assumptions based on their own experiences and interpretations. You don't always know you're not talking about the same subject.

Learn more about Communication Barrier:
https://brainly.com/question/8588667
#SPJ1

Answer:

error, i think.

This code is giving no error but is not printing my "goal." Which is to print a year of highschool when a number is input. Instead the code is only printing "Not in High School" every time, every number. Can someone please explain to me what I did wrong?


grade_number = input("What year of high school are you in? ")


if grade_number == 9:

print("Freshman")


elif grade_number == 10:

print("Sophomore")


elif grade_number == 11:

print("Junior")


elif grade_number == 12:

print("Senior")


else:

print("Not in High School")

Answers

Answer:

You must convert your input to an integer before the if statements.

Explanation:

input() returns a string, which should be converted to your desired type, OR you should compare against string literals.

See below for working code.

What malware is similar to a virus but is transmitted over a network?
A) anti-malware
B) adware
C) worms
D) spyware

Answers

the Answer is C worms

Answer:Worms

Explanation: Worms are self replicating. Worms also don’t need a host computer to run like viruses do.

answer in java.
Write a class named TestScores. The class constructor should accept an array of test scores as its
argument. You will need to do a deep copy of the array, don’t just copy the address of the array. The
class should have a method that returns the average of the test scores. If any test score in the array is
negative or greater than 100, the class should throw an IllegalArgumentException.
Write an exception class named InvalidTestScore. Create a setScores() method in TestScores which
accepts an array of test scores. Validate each item in the array and if any test score in the array is
negative or greater than 100, the class should throw an InvalidTestScore Exception.
Next create another method in TestScore called getScoresFromFile(). This method should open a file
that you created in Notepad and it should contain a list of test scores, some valid and others not. Read
in each of these test scores and store into an array. The first entry in the file should be the number of
scores that should be read. This number should be used to properly create the test score array. The
method should properly handle the potential FileNotFoundException. If file does not exist the program
should stop and exit with your own error message. As each score is read from the file (use nextInt())
throw either an IllegalArgumentException or an InvalidTestScore if the number read is not between 1
and 100 inclusive. You also need to handle an InputMismatchException. This means that either a
string was encountered or a floating-point number was encountered while reading the file. When this
happens issue an error message, but continue processing the file until you reach end of file. Note:
When this happens the entry you will add to the test score array will contain 0. How you accomplish
this is up to you. Feel free to discuss with your instructor.
Demonstrate all this functionality in a main() program

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that a class named TestScores. The class constructor should accept an array of test scores as its argument.

Writting the code:

import java.util.Scanner;

class TestScores

{

int scores[];

TestScores(int array[])

{

scores=new int[array.length];

for(int i=0;i<array.length;i++)

{

scores[i]=array[i];

}

}

double calAverage()

{

double avg;

int sum=0;

for(int i=0;i<scores.length;i++)

{

sum=sum+scores[i];

}

avg=sum/scores.length;

return avg;

}

}

class TestDriver

{

public static void main(String args[])

{

try

{

Scanner s=new Scanner(System.in);

int count;

System.out.print("Enter number of test scores : ");

count=s.nextInt();

int array[]=new int[count];

System.out.println("\nEnter test scores ");

for(int i=0;i<count;i++)

{

array[i]=s.nextInt();

if(array[i]<0||array[i]>100)

{

throw new IllegalArgumentException("Test scores must have a value less than 100 and greater than 0.");

}

}

TestScores ts=new TestScores(array);

double avg=ts.calAverage();

System.out.println("\n Test Scores average is : "+avg);

}catch(IllegalArgumentException e)

{

System.out.println(e.getMessage());

}

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Design a flowchart and code for a program that tabulates contributions collected by an organization. The organization wishes to accept contributions until a total of $10,000,000 is met. Once this total is hit, no further contributions should be accepted.


The organization wants the program to read data from an input file (input.in). The following data should be written to a file called results.out

a.The total number of contributions needed to meet the goal of 10 million dollars

b.The amount of the largest and smallest contribution accepted

c.The average contribution size

d.The final total of the contributions accepted

Answers

In this exercise we have to use the knowledge of computational language in JAVA to write a code that Design a flowchart and code for a program that tabulates contributions collected by an organization.

Writting the code:

import java.io.*;

import java.util.Random;

import java.util.Scanner;

class Contribution {

   public static void main(String[] args) {

       String fileInput = "contributions.txt"; // input file

       String fileOutput = "results.out"; // the output file to write the result

       final double UPPER_LIMIT = 10000000; // declare constant for 10,000,00

       double min = 0, max = 0;

       double contribution, total = 0;

       int counter = 0;

       try {

           // read the input file using scanner class

           Scanner fileReader = new Scanner(new File(fileInput));

           // loop as long total contribution is less than max there are contributions in the file

           // read line by line

           while (fileReader.hasNextDouble() && total < UPPER_LIMIT) {

               // read the contribution amount from the file

               contribution = fileReader.nextDouble();

               // increment counter

               counter += 1;

               // update the min value

               if (counter == 1 || min > contribution) min = contribution;

               // update the max value

               if (counter == 1 || max < contribution) max = contribution;

               // running total of all contribution so far

               total += contribution;

           }

           // close the input file

           fileReader.close();

           // write the data to the output file now

           double average = total / counter;

           FileWriter writer = new FileWriter(new File(fileOutput));

           writer.write(String.format("It took %d contributions to reach the goal.\r\n", counter));

           writer.write(String.format("The maximum contribution received was $%,.2f\r\n", max));

           writer.write(String.format("The minimum contribution received was $%,.2f\r\n", min));

           writer.write(String.format("The average contribution received was $%,.2f\r\n", average));

           writer.write(String.format("A total of $%,.2f was collected.\r\n", total));

           writer.flush();

           writer.close(); // close the output file

       } catch (IOException e) {

           System.out.println("Error: could not read/open file: " + fileInput);

       }

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to fix and it dosent work i even resatrt my computer and scan for malware what shoul i do? and every day i fix it but then the next day it happens again pls help. and dont tell me to get a computer.

Answers

Answer:

1 Broken or malfunctioning keyboard: A broken key in your keyboard or a malfunctioning keyboard can cause such issues.

2 Problematic Keyboard Drivers: Outdated or corrupted keyboard drivers may trigger actions that make your computer alt tab on its own.

3Problematic Graphics Drivers: Corrupted graphics drivers may bug the overlay, which is likely why your games keep alt tabbing.

4Virus Or Malware: Virus and malware are known to take over applications and make them behave wierdly. This can be one of those situations.

5 A Task is running in the background: A task may be running in the background while you are playing a game on fullscreen. This may bug the task window and make it alt tab every few seconds.

6Background applications and services: Similar to a task running in the background, other applications, and services running in the background can also get bugged and alt tab on their own.

7Corrupted system files and outdated Windows: Outdated Windows and corrupted system files are also known instigators for such issue.

have great day

Ashan Bhetwal wants to create a personal website to display and sell his artwork. He also wants to show the location of his studio, and a video of him painting. What features might he want to add to his website? What tools might he use to build the website?

Answers

The  features and  tools that might he use to build the website is the  use of video embed and go ogle maps features.

What is the easiest method of website design?

Using a website builder is the simplest approach to make a website. Utilizing one of their pre-made templates, you may build a website using these interactive, browser-based tools. However, just because the templates are "ready-made" doesn't imply you'll end up with a generic website.

A website, often known as a web site, is a collection of web pages and related material that is published on at least one web server and given a shared domain name.

Therefore, In social media posts or other web media, embedding describes the incorporation of links, photographs, videos, gifs, and other content. The inclusion of embedded content gives posts a visual component that promotes more clicks and engagement.

Learn more about website from

https://brainly.com/question/28114357
#SPJ1

Some one please help me​

Answers

Answer:

Makes no sense

Explanation:

please i need help asap i will mark brainlest
Which of the following are notes which can be electronically entered into documents without changing the content of the document?
Question 1 options:

Comparisons


Comments


Changes


Reviews

Answers

Comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.

What are the characteristics of word documents?

The characteristics of word documents are as follows:

It allows a user to construct professional write-ups.It has editing and formatting tools that modify the existing documents.It authorizes the user to insert charts, tables, diagrams, etc. within the document to make it more attractive.

In this question, the significance of a comment is better understood by the fact that it represents the notes a reader can normally insert within the existing document in order to modify or highlight the required text in the document.

Therefore, comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.

To learn more about Documents, refer to the link:

https://brainly.com/question/1218796

#SPJ1

Add the 3 program comments at the top of the program with the information needed:
Name:
Date:
Program:
Set appropriate variables for the maximum and minimum order amounts
Set an appropriate variable for the price per pound of 7.99
Get the order amount input and cast to a number and store it in a variable (Since it can contain decimals, what kind of number cast should you use?)
Write an if structure that compares the input value with the minimum and maximum values according to the creiteria below:
if over the maximum of 100 return a message indicating that
if under minimum of 0.25 return a message indicating that
if within the allowed range return a message with the calculated price rounded to 2 decimal places!
Test your program extensivel and compare with the example output below

Answers

C++:

#include <bits/stdc++.h>

typedef long double d;

int main(int argc, char* argv[]) {

 d a=0.25,b=100,c;

 std::cout << "Enter amount: "; std::cin>>c;

 if(c>b) std::cout << "Huge amount!";

 else if(c<a) std::cout << "Insufficient amount!";

 else std::cout << "The price is: $" << std::ceil((c*7.99)*100.0)/100.0 << std::endl;

 return 0;

}

For Python code, check the attachments.

Q1:most common cybercrimes?
Q2: Difference between Hacker and crackers ​

Answers

Q1: phishing and similar fraud

Q2: Hackers are good people who hack devices and systems with good intentions. They might hack a system for a specified purpose or for obtaining more knowledge out of it. Crackers are people who hack a system by breaking into it and violating it with some bad intentions.

Which of the following people will benefit the most from using a B2B website?

Answers

A person who would benefit the most from using a B2B website is: A. Akiko, who provides services to other smaller businesses which helps them establish themselves in the market.

The types of business models.

Generally speaking, e-commerce comprises of four (4) main business models and these include the following;

Business to Consumer (B2C).Business to Government (B2G).Consumer to Consumer (C2C).Business to Business (B2B).

What is B2B?

B2B is an abbreviation for business-to-business and it can be defined as a type of market in which a business (manufacturer or producer) sells its products directly to other business agents such as:

RetailersWholesalers

In this context, we can reasonably infer and logically deduce that Akiko would benefit the most from using a business-to-business (B2B) website because she is a service provider to other smaller businesses.

Read more on B2B here: https://brainly.com/question/26506080

#SPJ1

Complete Question:

Which of the following people will benefit the most from using a B2B website?

A. Akiko, who provides services to other smaller businesses which helps them establish themselves in the market

B. Rahim, who wants to sell his old furniture before he moves to a different city

C. Rohan, who runs a company that sells organic cosmetics directly to consumers

D. Mika, who sells hand-made and inexpensive jewelry to college students

Please help

When communicating online, it is important to understand there is no vocal tone or body language, as there is in face-to-face conversation. What are some things you can do when communicating online to maintain appropriate netiquette? Use details to support your answer.

Answers

You can use proper grammar and punctuation to maintain a neutral tone. Also, justify your opinions instead of arguing pointlessly.

In addition, you should address others by their appropriate title and name. Sarcasm should be avoided at all costs - it can be easily misinterpreted.

how often does windows automatically defragment a hard drive or trim a solid-state drive

Answers

If there is extraordinary fragmentation that is getting close to the "maximum fragmentation threshold," Windows will automatically consider partially defragmenting an SSD once a month.

In this post, we define defrag and discuss why doing it on an SSD is often a terrible idea.

However, that is a pretty straightforward response to a much more complex reality that most websites and forums get incorrect. If you want to know that, when left to Microsoft, defragging and optimizing an SSD are both excellent things, keep reading this article.

It saves time, energy, and wear and tear for disk read heads to not have to skip around your spinning disk in search of all the pieces by moving the thousands of file parts into sequential order during defragmentation of a spinning hard drive.

However, if there is extraordinary fragmentation that is getting close to the "maximum fragmentation threshold," Windows will automatically consider partially defragmenting an SSD once per month. After that point, the SSD will stop reading and writing because the "meta data" for the file fragments is too much for the SSD to manage. Microsoft will cautiously defrag the seldom potentially dangerous files because this is a negative thing.

To know more about fragmentation click on the link:

https://brainly.com/question/14127090

#SPJ4

An attacker discovered an input validation vulnerability on a website, crafted a URL with additional HTML code, and emailed the link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking on the malicious URL. No other malicious operations occurred outside of the web application’s root directory. This scenario is describing which type of attack?

Answers

This scenario is describing attack of:

Computer BotsCommand & Control

What are computer bots?

A computer programme known as a "bot," short for robot, executes automatic, repeated operations. Usually, bots mimic or take the place of human users. As automated systems, they perform tasks considerably more quickly than do consumers who are humans.

Which types of bots are there?

Bots come in two flavours: good bots and bad bots, both of which are relevant to web security. Both make attempts to use web resources (such as websites, web applications, APIs, etc.) or carry out other normal human user actions on the web, but for quite different reasons.

How do computer bots work?

A bot (short for robot) is a software application programmed to perform tasks through Robotic Process Automation, or RPA. Bots work by automatically going through a set of instructions, and they carry out tasks and processes much faster, more accurately, and at a higher volume than it would otherwise take humans.

What is computer bots malware?

Here's a quick malicious bot definition: A malicious bot is an automated malware program that can infect a system, steal data, or commit other fraudulent activities.

To learn more about computer bots visit:

https://brainly.com/question/28540266

#SPJ10

Answer:  (D) Cross-site scripting (XSS)

Explanation: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

You're installing a new network for CSM Tech Publishing, a new publisher of technical books and training materials. There will be 10 client computers running Windows 10, and CSM Tech Publishing plans to run a web-based order processing/inventory program that for now is used only by in-house employees while they're on site. CSM Tech Publishing wants to be able to manage client computer and user policies and allow employees to share documents. Sign in and security should be centrally managed. What network model, workgroup, or domain, should be used? Explain your answer, including any server roles you may need to install.

Answers

The network model, workgroup, or domain, that should be used include TCP, Microsoft, and Windows domain respectively.

How to illustrate the information?

The TCP/IP paradigm is employed in this scenario because it requires established protocols for packet and data transmission over a network of 10 clients and in-house personnel. TCP/IP is a connection-oriented protocol that aids in packet transport.

The workgroup that adheres to Microsoft Windows guidelines can be used. These workgroups play a significant role in the management of LAN PCs by offering peer-to-peer connectivity. Peer-to-peer networking facilitates file sharing and local resource sharing.

The PCs can be managed via the Windows Domain. The Windows Domain also aids in resource sharing. The network administrator plays a vital role in network monitoring by using a monitoring tool. The administrator scans the network for various vulnerabilities.

Learn more about network on:

https://brainly.com/question/1027666

#SPJ1

A while loop reads characters from input. Write an expression that executes the while loop until character 's' is read.

Answers

An expression that executes the while loop until character 's' is read is given below:



The Expression

// Takes character input, tallies periods, stops on dollar sign

#include <iostream>

using namespace std;

int main() {

   char i; // input received

   int j = 0; // counter for # of periods

   cout << "This program will accept single-character entries and report the number of periods you've entered.\n";

   for (;;) {

       do {

           cout << "Please enter a single character, using $ to stop: ";

           cin >> i;

           if(i == '.')

               j++;

       } while(i != '$');

   if(i == '$')

       cout << "Total number of periods entered is " < < j < < " .";

       break;

   }

   return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Which of the following are notes which can be electronically entered into documents without changing the content of the document?


: Comparisons

Comments

Changes

Reviews

Answers

The option that are notes which can be electronically entered into documents without changing the content of the document is option B: Comments.

What type of word is comments?

As a noun and a verb, "comment" has numerous more meanings. When people comment on something, they are expressing their viewpoint or opinion about it in the form of an observation or a criticism. Short statements typically make up comments. Longer critique or a collection of remarks are referred to as a commentary.

Therefore, An explanation or annotation in a computer program's source code that can be viewed by programmers is known as a remark. Compilers and interpreters typically ignore them because they were introduced to make the source code simpler for humans to understand.

Learn more about Comments from

https://brainly.com/question/27798319

#SPJ1

Answer: comments

Explanation:

The Web Engineering methods landscape encompasses a set of technical tasks that enable a Web engineer to understand, characterize, and then build a high-quality Web Applications. Discuss the following Web Engineering methods:
a) Communication methods.
b)Requirements analysis methods.
c) Design methods.
d) Construction methods.
e) Testing methods.

Answers

Answer:

A

Explanation:

I did the test,

3. What is a process in software engineering

Answers

a process of dividing software development work into smaller,parallel, or sequential steps or sub-processes to improve design, product management

Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a single line separated by a space

Answers

The coding for completing the program is by using two words and a number, storing each into separate variables.

What are variables?

In coding or any computer language like python, the variables are the things that are taken in the subject.

def userdetails():

words = input("Enter a word: ")

word2 = input("Enter a word: ")

numm = input("Enter a number: ")

pw1 = words+"_"+word2

pw2 = numm+words+numm

print("You entered: {} {} {}" .format(words,word2,numm))

print("First password:",pw1)

print("Second password:",pw2)

print("Number of characters in",pw1,":",len(pw1))

print("Number of characters in",pw2,":",len(pw2))

Thus, the code for given words and numbers is given above.

To learn more about variables, refer to the below link:

https://brainly.com/question/14679709

#SPJ1

Que tecnología son afectadas por digital trust?

Answers

Así que primero tenemos que ver las consecuencias de la pregunta que le hiciste a la gente aquí. No sabemos el idioma que hablas, pero según lo que sé, jamal y tyrone escaparon de los campos anoche.

Estas 4 tecnologías de confianza digital monitoreo basado en IA, confianza de datos, cadena de bloques y tecnologías cuánticas pueden ser útiles cuando se usan en conjunto, ayudándolo a mejorar la reputación de su marca al proteger sus datos, además de mejorar y optimizar sus procesos.

(Monitoreo basado en IA, fideicomisos de datos, blockchain y tecnologías cuánticas)

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario?

Answers

The first action in such a scenario would be to Troubleshoot the software. This will yield insight into what the issue is and give more understanding of the problem.

What are the steps to solving a software problem?

In general, fixing a software challenge may be separated into four steps:

Determine the issueObtain informationIterate on possible solutions.Try out your solution.

A problem does not always manifest itself with flashing red lights—the software simply does not perform as expected.

Even if this is the case, you should do your best to describe the issue. Ask yourself (and perhaps write down your replies) the following questions:

What am I attempting to accomplish?What have I already done?What do I believe the program should accomplish?What exactly is it doing?

Learn more about software problems:
https://brainly.com/question/13533992
#SPJ1

in java, when a character is stored in memory, it is actually the ________ that is stored.

Answers

In java, when a character is stored in memory, it is actually the Unicode number that is stored.

Every character in Unicode has a unique number, regardless of the platform, language, or software it is used with. There were hundreds of distinct encoding techniques for allocating this number prior to the creation of Unicode. Not enough characters could fit in a single encoding: To cover all of its languages, for instance, the European Union alone needs a number of distinct encodings.

No one encoding was sufficient for all the letters, punctuation, and technical symbols in regular usage, not even for a single language like English. Additionally, several encoding techniques clash with one another. The same number may be used by two distinct encodings for two different characters or by a single character in both.

Data always runs the danger of damage when it is transferred between multiple encodings or platforms, even if any particular computer (especially servers) needs to support a wide variety of encodings.

Both students and working professionals can benefit from our fundamental Java programming tutorial. Java is a general-purpose, concurrent, secured, object-oriented, class-based, and computer programming language. It is an established, reliable technique.

A platform is any hardware or software environment in which a program is run. Java is referred to as a platform since it has a runtime environment (JRE) and an API.

To know more about unicode click on the link:

https://brainly.com/question/17147612

#SPJ4

a program to search words in c++

Answers

Answer:

a starting point might be after you get this working, you can allow them to enter more words and iterate your search,

for each argument (not counting the first one that is the file name)

search for the word, show the lines...

and more files too, for that matter, for each file, for all the words... (at this point you MUST put flags on what each thing is, up to now, you can use the order of args)

just note that arg[] are c-strings. you can assign a string a c-string, so promotion lets you do things more normally, or you can process it as-is depending on what you use it for (see how I just used it in the file name but moved it to a string in the target?). I plan to use target a lot, but the file name only in one statement ever, no need to upcast it.

Explanation:

int main(int argc, char* argv[])

{

   if(argc < 3) //if the user did not provide enough command line inputs.  

    //you can, and should probably, do more exhaustive input validation and maybe have them

    //do flags as well rather than rely on the order of the arguments to be correct.

     {

        cout << "usage:  mygrep filename word"

        return 1;

     }

   ifstream infile(argv[1]);  //attempt to open the first target as the file

   string target = argv[2];   //assign target from the second argument

   

   ...

Other Questions
Can someone please help ASAP!!!!PLEASE don't copy from the internet because my teacher will know and give me 0. Just write it in your own words please!! We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America.In three to five sentences, explain the significance of capitalizing the word "Welfare" in the Preamble. The measure of an angle is 136.8 more than the measure of a supplementary angle. What is the measure of each angle? A spherical tank for liquefied petroleum is 8.0 in. In diameter. What is the ratio of the surface area to the volume of tank In which of the following categories do the three families spend about the same dollar amount each month (within $25 of each other)? Select all that apply.HousingFoodChildcareTransportationInsuranceOther NeedsTaxes Who does gender affect Using a lower frequency of light in a slit diffraction experiment has what effect?Select one:a.There is no difference between frequencies of light.b.fewer bright bandsc.brighter patternsd.more bright bands coca-cola has a large amount of brand-loyal purchasers. which marketing strategy is most appropriate for this brand? Calculate the number of moles of gas necessary to create 1.62 atm of pressure in a 4.95 L rigid container at 44.1 C. Record your response to two decimal places. assessing the political and regulatory climate for marketing in a country or region of the world involves not only identifying the current climate but also ______. At a lacrosse tournament, students are charged $7 per ticket and adults are charged $10 per ticket. If 450 people attended the tournament, and a total of $4,200 was collected in ticket fees, how many students attended the tournament? 60 100 200 280 a client postoperatively reports to the nurse the need to urinate, but is unable to void. what should the nurse expect the healthcare provider to order? select all that apply. the fourth movement of bach's cantata wachet auf features the ______ singing in unison. What was the primary reason why George Washington was chosen to lead the Continental Army? His strong military record convinced Congress to choose him. He traveled to Philadelphia and personally asked Congress to choose him. He was from Virginia, and New England needed Virginias help to win the war. His successes during the French and Indian War impressed Congress.help asap Select the correct answer from each drop-down menu.In a chemical reaction at equilibrium, the rate of the forward reaction is the rate of the reverse reaction. If the rate of the forward reaction , more products are formed. A line has a slope of 0 and passes through the point (-13, -11). What is its equation inslope-intercept form?Write your answer using integers, proper fractions, and improper fractions in simplest form. how long did the omlec civilization what are the forces acting on the rock that is sliding at a constant speed on a frictionless surface? (ignore air resistance unless otherwise stated) 3. Rhombus KLMN with vertices K(-3, 2), L(1, 4),and N(-5, -2): (x,y) (x, y-5)M(-1,0) Your tractor broke down and was in the shop for 4 days.Mechanics worked on it for 21.4 hours at $48 per hour. Theyreplaced $1875.42 worth of parts. You lost $18 per hour by nothaving the use of the tractor. You work a 15 hour day. Howmuch did the labor cost? How much did you lose by not havingthe use of your tractor? The total cost (in dollars) to bowl n games is represented by C(n)=4.5n+2.5 . The shoe rental price increases 0.50. The new total cost is represented by T(n)=C(n)+0.5 . Describe the transformation from the graph of C to the graph of T .