1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olchik [2.2K]
3 years ago
10

Assume that sentence is a variable of type String that has been assigned a value. Assume furthermore that this value is a String

consisting of words separated by single space characters with a period at the end. For example: "This is a possible value of sentence." Assume that there is another variable declared, firstWord, also of type String. Write the statements needed so that the first word of the value of sentence is assigned to firstWord. So, if the value of sentence were "Broccoli is delicious.", your code would assign the value "Broccoli" to firstWord.
Computers and Technology
1 answer:
disa [49]3 years ago
5 0

Answer:

//get the sentence from the user

          Console.WriteLine("Enter your sentence");

           //read the user information

           string ans = Console.ReadLine();

           //check if sentence ends with period

          if(!ans.EndsWith("."))

           {

               Console.WriteLine("Sentence should end with period");

               Environment.Exit(0);

           }

           //declear empty string firstword

           string firstWord = "";

           //split the requested sentence using single space character

          string[] splitans =  ans.Split(' ');

           //assign firstword

           firstWord = splitans[0];

           //print out firstword

          Console.WriteLine(firstWord);

Explanation:

The program uses c#.

You might be interested in
The attacker sent data that was able to manipulate the return address that is reserved to store expected data
KatRina [158]

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

3 0
3 years ago
the advertisement below is an example of a(n) the advertisement below is an example of a(n) informative advertising objective pe
vlabodo [156]

The advertisement below is an example of an <u>informative advertising</u>. Thus, option A is the correct option.

<h3>What is informative advertising?</h3>

Utilizing facts to highlight the advantages of a product's features rather than pandering to consumers' emotions is used in informative advertising.

Any advertisement has one main objective: to sell products. The choice of methods represents the only distinction. To achieve a particular objective, each of them offers unique opportunities. Additionally, different industries seem to benefit from particular techniques more than others.

Through the use of data and statistics that demonstrate the worth and applicability of a product, informative advertising attempts to influence a user's choice. The ability for users to verify any statement is crucial. Consumers are therefore more likely to trust a company when they are informed, and this increases the authority of brands.

Learn more about informative advertisement

brainly.com/question/15734780

#SPJ4

4 0
2 years ago
Fill in the sentences with the correct terms.
ololo11 [35]
<h2>[+] Hello ! [+]</h2>

Answer:

<em>Cells provide data to another cell. </em>

<em>Cells rely on the value of another cell. </em>

Explanation:

  • I hope this helped
  • Tell me if it's wrong
  • Thanks for your time
  • Brainliest is always appreciated!!
  • Have a wonderful and blessed day :D
5 0
3 years ago
Read 2 more answers
What are the programming concepts (within or outside the scope of IT210) that you would like to strengthen and delve into furthe
marin [14]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

I would like to reinforce in advanced or complex concepts such as documents as well as channels, internet programming, multi-threading, after that last lesson.

  • I am interested in learning web development to develop applications or software. I would also like to explore those concepts by using open source tools.
  • Course concepts will have to develop models for handling.
  • No there is no subject matter or definition you provide further clarity for.
  • I'm interested in studying java as well as web development in comparison to C++ so I can use it in my contract work.
4 0
3 years ago
Sherri has recently been injured. She is having a problem using her left hand and would like to use a stylus to move her mouse a
Alona [7]

Answer:

d) Digitizer

Explanation:

In computing a digitizer refers to a piece of hardware that converts analogue input to digits. Analog signals refers to signals that are in a continuous range such as light, sound and records. A digitizer therefore basically gets signals from (touch, sound, light etc.) and transforms and transports it to the CPU. On a tablet or laptop, the signals will received from the finger of a stylus (digital pen).

6 0
3 years ago
Other questions:
  • _____ was just a sophomore when he began building computers in his dorm room at the University of Texas. His firm would one day
    14·1 answer
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • Give an example of a situation in which shears would be the best choice and one in which scissors would suffice.
    14·1 answer
  • Explain the use of cache memory and the role it plays in improving processing speeds. Plz
    15·2 answers
  • What are the steps to creating a blank database? Use the drop-down menus to complete them.
    9·1 answer
  • How many characters should a strong password have? four six eight ten
    10·2 answers
  • _ is a term used for license like those issues by creative commons license as an alternative to copyright
    8·1 answer
  • 1. Assume that in an implementation of the RSA cryptosystem one modular squar- ing takes 75% of the time of a modular multiplica
    15·1 answer
  • Which of the following describe audio-editing software? Choose all that apply.
    5·2 answers
  • can people be nice and just r;p with me once im getting sad because everyone is rude about it im not a creep im really nice and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!