1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
4 years ago
9

ProcessName2

Computers and Technology
1 answer:
RoseWind [281]4 years ago
5 0

Explanation:

This is easily solvable with a for loop. Something like:

(I assume c++)

#include <iostream>

#include <string>

int main() {

take_input: //tag

std::string input;

cin >> input; //take the input

int spaceCount = 0;

char checking;

for(unsigned int i = 0; i == input.length(); ++i) {

checking = spaceCount[i];

if(checking == ' ')

spaceCount++;

}

if(spaceCount >= 1 && input.length >= 5)

std::cout << "Your name is " + input;

else

goto take_input; // reasks for input if the conditions are not met

return 0;

};

**remove all spaces before using the code, the if statements are messed up

You might be interested in
Can you create energy?
Katarina [22]
There is a set amount of energy in the universe and you cannot destroy or create energy.
3 0
3 years ago
The file includes 4993 tweets including the keyword 'election'. Each tweet is represented in a separate line. Write a program to
Likurg_2 [28]

Answer:

import re

with open("../../Downloads/Tweets.txt","r", encoding="utf-8") as tweets:

   myfile = tweets.readlines()

   for item in myfile:

       item = item.rstrip()

       mylist = re.findall("^RT (.*) ", item)

       if len(mylist) !=0:

           for line in mylist:

               if line.count("#") >=1:

                   ln = line.split("#")

                   dm = ln[1]

                   print(f"#{dm}")

Explanation:

The python source code filters the document file "Tweets" to return all tweets with a hashtag flag, discarding the rest.

7 0
3 years ago
Can you get shocked from a breaker box?
Mashcka [7]
I dont think it would, but maybe you should Google it just in case.
4 0
4 years ago
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how
damaskus [11]

Answer:

The right approach is Option b (volume testing).

Explanation:

  • A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.
  • The application functionality has been analyzed by determining the maximum volume throughout the database.

Other options are not related to the given query. So the above is the right response.

5 0
3 years ago
Acme Widgets currently uses a 1024-bit RSA encryption standard company wide. The company plans to convert from RSA to an ellipti
nadya68 [22]

Answer:

The answer is "Option A".

Explanation:

The elliptical curve cryptography system needs much shorter keys for cryptography, and it is very powerful because of the RSA cryptography method. It is also known as a key of 1024-bit, which is in comparison is equal to the 160-bit ECC key for cryptographic, that's why other options are not correct, which is defined as follows:

  • In option B,  It is higher the ECC key system, that's why it's wrong.
  • In option C, It is a part of the RSA system but its value doesn't match the ECC system, that's why it is wrong.  
  • In option D, It's valued is just double to the RSA system, that's why it is wrong.

6 0
3 years ago
Other questions:
  • What type of elements are bridges exposed to yearly
    13·2 answers
  • Which of them does not support decision making? Options DSS, GDSS, ESS All of above
    10·1 answer
  • How are the internet and the World Wide Web different from each other
    14·1 answer
  • What names of websites of presentation or visualization <br>​
    15·1 answer
  • ​_____ was the first commercially successful computer. ​z3 ​eniac ​univac ​colossus
    13·1 answer
  • PLEASE HELP!!! THIS IS WORTH A TEST GRADE!!!
    13·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • Tim has several workbooks open in the Excel application. He would like to view them all at the same time, so he should use the _
    14·1 answer
  • -) An attribute is a(n)?
    5·1 answer
  • Which software development method uses highly skilled programmers to shorten the development process while producing quality sof
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!