1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
15

For this programming assignment, you have to write a Java program that tests whether a given input string represents a Valid E-m

ail address. If the input is not a valid e-mail address, it should print a message saying "Invalid Address". If the input is a valid e-mail address, it should print out the User name and the Domain name on separate lines. For purposes of this assignment and to keep the logic simple, a valid E-mail address will be of the form
Computers and Technology
1 answer:
Step2247 [10]3 years ago
8 0

Answer:

To check if the email address is correct it should have only one "@" symbol, we have to split the input string by this symbol. The code in java to achieve this is the following:

class Main {

 public static void main(String[] args) {

   String email = "[email protected]";

   String[] email_split = email.split("@");

   long count_a = email.chars().filter(ch -> ch == '@').count();

   if(count_a == 1){

     System.out.println("User name:   "+email_split[0]);

     System.out.println("Domain name: "+email_split[1]);

   }else{

     System.out.println("There is no valid email address.");

   }

 }

}

Explanation:

The explanation of the code is given below:

class Main {

 public static void main(String[] args) {

   String email = "[email protected]"; //input string to evaluate if is valid email

   long count_a = email.chars().filter(ch -> ch == '@').count(); //Count how many times the symbol @ appears

   if(count_a == 1){ //A valid email only contains one at

     String[] email_split = email.split("@"); //separate the values using the at in an array

     System.out.println("User name:   "+email_split[0]); //the first element is the username

     System.out.println("Domain name: "+email_split[1]); //the second element is the domain name

   }else{

     System.out.println("There is no valid email address."); //If there isn´t an at or are more than one then display a message saying the email is not valid

   }

 }

}

You might be interested in
In information systems, _____ is information from a system that is used to make changes to input or processing activities.
Tom [10]

Answer:

"Feedback" is the correct answer for the above question.

Explanation:

  • Feedback is used in any information system or any communication system to tells that any process is doing in the right direction.
  • It is used in communication channels to tell the sender that the message is received by the receiver.
  • It is a type of message which is sent by the user to the system that he gets the correct or wrong output by that system.
  • The above question asked about the term which is used in the information system which suggests changing the processing activity. This is known as feedback which is described above.
6 0
4 years ago
What is the disadvantages of using proprietary software
Snezhnost [94]

Answer:

Cost. One of the biggest drawbacks of any proprietary software is the licensing fee. ...

Developer Support. ...

Security Issues. ...

Customization.

Explanation:

5 0
3 years ago
Read 2 more answers
What are the advantages of using a vpn?​
Fantom [35]

Answer:

Changing ip address to avoid ip ban. keeping your personal info safe while on public connections

Explanation:

Looked it up.

5 0
2 years ago
List the seven basic internal components found in a computer tower
Softa [21]
The basic internal components found in a computer tower also called as computer case are the following:

1. The motherboard
2. The power supply
3. Hard drives
4. Fan
5. Random Access Memory - RAM
6. CD - Rom's and DVD - Rom's
7. Ports and Hubs

These are found inside your PC case.

6 0
3 years ago
Give state diagrams of DFAs that recognize the following languages.
k0ka [10]

Answer:

Following is attached the solution of each part step-by-step. I hope it will help you!

Explanation:

6 0
3 years ago
Other questions:
  • A network using multiple cell towers falls under which type of network?
    13·1 answer
  • Which WAN technology is designed to work with a variety of commonly used layer-2 protocols and is sometimes called a layer-2.5 t
    15·1 answer
  • Write a function called simulate_several_key_strikes. It should take one argument: an integer specifying the number of key strik
    7·1 answer
  • What operating system is an open source program
    15·1 answer
  • If you decide you want to meet someone you met online, what should you do first? A. Tell your best friend. B. Call the person yo
    12·1 answer
  • In confirmatory visualization Group of answer choices Users expect to see a certain pattern in the data Users confirm the qualit
    9·1 answer
  • 1. Distinguish between
    7·1 answer
  • How does applying Fontworks effects to text on an advertising flyer change the text?
    14·2 answers
  • What refers to a set of instructions executed in order?
    6·1 answer
  • 1. A _______ causes the computer program to behave in an incorrect or unexpected way.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!