subject

Prompt the user for a string that contains two strings separated by a comma. (1 pt) examples of strings that can be accepted: jill, allen jill , allen jill, allen ex: enter input string: jill, allen (2) report an error if the input string does not contain a comma. continue to prompt until a valid string is entered. note: if the input contains a comma, then assume that the input also contains two strings. (2 pts) ex: enter input string: jill allen error: no comma in string. enter input string: jill, allen (3) extract the two words from the input string and remove any spaces. store the strings in two separate variables and output the strings. (2 pts) ex: enter input string: jill, allen first word: jill second word: allen (4) using a loop, extend the program to handle multiple lines of input. continue until the user enters q to quit. (2 pts) ex: enter input string: jill, allen first word: jill second word: allen enter input string: golden , monkey first word: golden second word: monkey enter input string: washington, dc first word: washington second word: dc enter input string: q

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 03:50
You are working as a security analyst in a company xyz that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. while monitoring the data, you find a high number of outbound connections. you see that ip's owned by xyz (internal) and private ip's are communicating to a single public ip. therefore, the internal ip's are sending data to the public ip. after further analysis, you find out that this public ip is a blacklisted ip, and the internal communicating devices are compromised. what kind of attack does the above scenario depict?
Answers: 3
question
Computers and Technology, 22.06.2019 04:30
Ryan is working on the layout of her web page. she needs to figure out where her header, navigation bar, text, and images should go. what technique can her?
Answers: 1
question
Computers and Technology, 22.06.2019 12:10
Linux is distributed under gnu gpl. why is this important? a. it ensures that only torvalds can profit from the sale of linux b. it prevents unknowledgeable users from downloading programs they don't know how to operate. c. it provides protection for the developers who created linux. d. it states that anyone can copy, modify, and share the program if changes are made public.
Answers: 1
question
Computers and Technology, 23.06.2019 07:30
What part of the interface displays the external references contained in a selected cell? the status bar the review tab the scroll bar the formula bar
Answers: 1
You know the right answer?
Prompt the user for a string that contains two strings separated by a comma. (1 pt) examples of stri...
Questions
question
Mathematics, 31.03.2021 02:30
question
Mathematics, 31.03.2021 02:30
Questions on the website: 13722363