1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
4 years ago
5

Write an application named EnterUppercaseLetters that asks the user to type an uppercase letter from the keyboard. If the charac

ter entered is an uppercase letter, display OK; if it is not an uppercase letter, display an error message. The program continues until the user types an exclamation point. Grading When you have completed your program, click the Submit button to record your score.
Computers and Technology
1 answer:
aleksandrvk [35]4 years ago
5 0

Answer:

Program is in C++

Explanation:

C++ Code:

#include <iostream>

#include <cctype>

using namespace std;

int main(){

char ch;

do{

 cout<<"Enter Character: ";

 cin>>ch;

 if (isupper(ch)){

  cout<<"OK"<<"\n";

 }

}

while(ch!='!');

return 0;

}

_______________________________________

Code Explanation

First execute a do while loop as we want user to enter at least first character to check whether its upper case or not. If user enters exclamation character then this loop will terminate along with the program.

To check whether the entered character is upper case or not we will be using isupper(ch) method defined in cctype library.

If the character is upper case then if condition will show Ok by printing it using cout and this program will show nothing if the character is not upper case.

Sample Output

Enter Character: A

OK

Enter Character: b

Enter Character: c

Enter Character: d

Enter Character: E

OK

Enter Character: G

OK

Enter Character: F

OK

Enter Character: !

You might be interested in
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
What's the full form of CPU?​
Bas_tet [7]

Answer:

Central processing unit

5 0
3 years ago
Read 2 more answers
In a(n) ____ design, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back
Harrizon [31]

Answer:

I think it would be centralized

4 0
3 years ago
The computer that has been traditionally found on the desks in many offices and homes is the ___ computer.
Sladkaya [172]

Answer:

<u> Personal</u> computer

Explanation:

I.d.k the answer so don't blame me if its incorrect

7 0
3 years ago
Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Re
asambeis [7]

The correct answers are A.  For extending the learning experience for students. C. So students can use the Slides for review and can go to additional resources outside of the presentation. D. To make the presentation more graphically appealing

Explanation:

The use of hyperlink objects in presentations means objects such as images, texts, or icons are associated with links or websites students can easily access by clicking on the specific image or element. This might be used in educational contexts to allow students to have a complete learning experience by providing alternative and external sources outside the presentation. For example, if the topic is space hyperlinks to NASA website can be included. This means, hyperlink objects extend learning experiences and provide additional resources (Option A and D).

Besides this, this resource can make a presentation more appealing as links to images, videos, and other visually interesting resources can be included (Option D). However, it also breaks the linearity of the presentation as students will need to move to other websites as they go through the presentation.

5 0
3 years ago
Other questions:
  • What is the output after the following code executes?
    14·1 answer
  • Given two variables hasToner and hasPaper of type bool, that have been declared and given values, write a code block that will o
    15·1 answer
  • Barr the Bear has started a business to sell fish to Poe and his fellow penguins. The penguin customers submit many fish orders,
    12·1 answer
  • Write a C# program named InchesToCentimeters that declares a named constant that holds the number of centimeters in an inch: 2.5
    14·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • What is it with the order of operations
    9·1 answer
  • Why should you be chosen over someone else? *
    5·2 answers
  • Why should you list more than one font if you are formatting some text using CSS?
    10·1 answer
  • Using AI to filter potential job applicants might be considered _____
    11·2 answers
  • GUYS I NEED HELP!!!! Every time pc resets it clears all of my data files and content how do you fix this. Pls help
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!