1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
5

An email address contains the @ character. Write a program that takes asks for an email address input from the user and determin

es whether it is a valid address or not. This is based on the presence of the @ character and no spaces in the string. You do not need to worry about any other characters in the input word. Output the result "The word IS an email address" or "The word IS NOT an email address"
Example -
Input: [email protected]
Output: The word IS an email address

Input: my123user
Output: The word IS NOT an email address

Your code should include comments to describe the program logic and use proper indentation for readability.
Computers and Technology
1 answer:
Dvinal [7]3 years ago
7 0

Answer:

Input: [email protected]

Output: the word is not an email adress

Explanation:

You might be interested in
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
3 years ago
On a timeline, a milestone 11 years in the future will be to the
aniked [119]

Answer:

D. Left,left

11 is less than 20 as well as it is less than 25 years. And we move from left to right on the timeline. Thus 11 is left of 20 and it is left of 25 years as well. And timeline is the core of a project management software. The Gantt and Pert chart are totally based on the timeline. Software like Microsoft project use the timeline quite a lot, and you cannot survive without the knowledge  of the timeline in software project management.

Explanation:

Timeline knowledge is a must for a software professional, and the above answer does not require explanation.

6 0
4 years ago
which of the following are advantages of a wide area network, as opposed to a local area network? select two options
AnnZ [28]

Answer:

Advantages of Wide Area Network as opposed to the Local Area Network:

Because of wide area network (WANs) connections are available from house to house, city to city, country to country. For ex: Internet.

WAN is connecting the devices with various wireless technologies such as: cell phone towers or satellites. All these are much harder to setup with LANs.

Local Area Network (LANs) connections can only operate in a local area, not bigger than a house or a floor in a office building and also you cannot buy a ethernet cable that can reach throughout entire building and Wi-Fi connection rapidly disconnected as you get further then few meters away.

3 0
3 years ago
Trisha's computer kept rebooting frequently. Therefore, she decided to call customer support. When he was checking the computer,
harkovskaia [24]
Answer: F10 or delete key. when you click these keys they usually will take you to the bios to look over the computers system to make sure that everything is working properly.
7 0
3 years ago
You can use a server-side script as a ____ to access data from another domain.
Mashcka [7]
I believe the answer your looking for is "Proxy"
0 0
3 years ago
Other questions:
  • What should you do when an error message pops up on the screen?
    7·2 answers
  • Kwan is using JavaScript extensively to add interactivity to his Web site. Contained within his script is a counter object that
    8·1 answer
  • Which of the following protocols is used to unsure secure transmissions on port 443?A. HTTPSB. TelnetC. SFTPD. SHTTP
    6·1 answer
  • Select the correct statement below about database services or database instances:
    5·1 answer
  • What shortcut keys are used to go directly from global configuration mode to privileged exec mode?
    12·2 answers
  • Raid level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows
    7·1 answer
  • In cell h13, insert a pmt function to calculate the payments for students who want to pay for their trips in three installments.
    11·1 answer
  • Why do we use antivirus program?<br><br>please tell fast​
    12·1 answer
  • Choose one skill needed to become Computer Network Administrator?
    10·2 answers
  • A pointer can be used as a function argument, giving the function access to the original argument.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!