1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
9

Write a C++ code that will read a line of text and echo the line with all uppercase letters deleted. Assume the maximum length o

f the text is 80 characters. Example input/output is shown below.
Input:

Today is a great day!

Output:

oday is a great day!
Computers and Technology
1 answer:
andriy [413]3 years ago
6 0

Answer:

#include<bits/stdc++.h>

using namespace std;

int main()

{

   string st;

   getline(cin,st);

   int i=0;

   while(i<st.length())

   {

       if(isupper(st[i]))

       {

           st.erase(st.begin()+i);

           continue;

       }

       i++;

   }

   cout<<st<<endl;

   return 0;

}

Explanation:

I have included the file bits/stdc++.h which include almost most of the header files necessary.

For taking the input as a string line getline is used.

For checking the upper case isupper() function is used. cctype header file contains this function.

For deleting the character erase function is used.

You might be interested in
Escribe 10 ejemplos de lo que consideras un byte
stira [4]

<u>Respuesta:</u>

Espero y te pueda ayudar: ).

4 0
3 years ago
It is not important to keep financial records since they can all be found online.
aleksandr82 [10.1K]

Answer:

False

Explanation:

Due to the fact that financial records can be erased. Also, I believe it is a law to keep financial records when doing business but I'm not too sure.

6 0
4 years ago
Read 2 more answers
What is it about Pinterest that makes it a good platform for ecommerce sites?
Inga [223]
With the large variance of items on the site it is easy to invest in an idea
5 0
4 years ago
Read 2 more answers
You've received an assortment of files along with accompanying hashes to guarantee integrity. Some of the hash values are 256-bi
Ad libitum [116K]

Assuming they all use the same basic algorithm, what might it be SHA-1.

c. SHA-1

<u>Explanation:</u>

As solution hash value for system will used only 160 bit even though performance is bit slower. Normally SHA-1 method been used. Basically there four methods

MD5 is a methods where it checked regularly whether the file system or altered or not. RIPEMD is a method where it store or converts value to 160 bits. SHA1 methods following some security algorithms where it keeps bits in 160 bits with some security crypto or signature

SHA2- this method following some security algorithms where it keeps bit in 256 bits and we have sha384 and sha512. SHA 2 method is not used now days.

3 0
3 years ago
Please help me with this
Masteriza [31]

Answer:

Explanation:

what?

6 0
4 years ago
Other questions:
  • A(n ________ cpu has two processing paths, allowing it to process more than one instruction at a time.
    15·2 answers
  • A(n) ____ is a collection of one or more program statements combined to perform some action
    14·1 answer
  • Identify characteristics of top-down programming design. Choose all that apply.
    13·1 answer
  • A robot can complete 7 tasks in hour. Each task takes the same amount of time.
    15·2 answers
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • How do you get a potion of fire-protection in the overworld because I am having a hard time in the Nether? I will give away 14 p
    8·2 answers
  • What line of code makes the character pointer studentPointer point to the character variable userStudent?char userStudent = 'S';
    5·1 answer
  • Is it possible to see who logged in in youre Microsoft teams account
    11·2 answers
  • The computer that has been traditionally found on the desks in many offices and homes is the ___ computer.
    8·1 answer
  • What is an example of using the Internet of Things (IoT) to deliver innovative Cloud based solutions to customers?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!