1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
drek231 [11]
4 years ago
10

You are given a file consisting of students’ names in the following form: lastName, firstName middleName. (Note that some studen

ts may not have a middle name.) Write a program that converts each name to the following form: firstName middleName lastName. Your program must read each student’s entire name into a variable and must contain a function that takes as input a string, consisting of a student’s name, and returns a string consisting of the altered name. • Use the string function find to find the index of , • the function length to find the length of the string • the function substr to extract the firstName, middleName and lastName. Output the altered name into a file. This program has no user interface.a. Banks,John Williamb. Barret,Ronc. Drew,Lucy Maried. Perry,Mark Ge. Smith,John Carr
Computers and Technology
1 answer:
pishuonlain [190]4 years ago
5 0

Answer:

#include <iostream>  // header file for input output functions

#include <string>  // header file for string manipulation

#include <fstream>  // for handling file functions  

using namespace std;  //namespace is used to identify objects like cout, cin

void NamesFunction()  {

// Function to convert names to format firstName middleName lastName    string Name;  //String type variable to store full name

ifstream DataFile;   //used to read input from a file

ofstream OutputFile;  // used for writing in a file

string lastName;  // string type variable to store last name

string firstName;  // string type variable to store first name

int position;  // used to store position of a specified character in the string

int size;  // stores length of full name

DataFile.open("inputtexthere.txt");

//opens text file using object DataFile

OutputFile.open("outputext.txt" );

//opens the text file using object OutputFile

do  {  //start of Do while loop

getline(DataFile, Name);  //reads full names from input stream

position = Name.find(",");  // stores position of the , in the name

lastName = Name.substr(0, position);  

// stores substring last name from full name

size= Name.length();  //store the length of the entire name

firstName = Name.substr(position + 2, size);  

/* stores first name substring from entire name string with the help of specified position */

OutputFile<< firstName << " "; //output first name  in text file

cout << firstName << " ";  

OutputFile<< lastName << endl;  //outputs last name in text file

cout << lastName << endl;   }

    while (DataFile.eof() == false);  

//loop continues until the end of input file is reached

DataFile.close();  //closes input file

OutputFile.close();  }  //closes output file

int main(int argc, char *argv[])  //start of main function

{   NamesFunction();  // calls NamesFunction()

}

Explanation:

The brief description of included header files is mentioned in the comments added to the program. Lets begin from the NamesFunction()  function.

The string variable Name contains the entire string of full names. Then ifstream class is used which is used to read the input file using an object. The object here is DataFile. ofstream is used to write on a file using an object which is named as OutputFile here. firstName and lastName holds first and last names. position variable stores the specified position. Here the  position stores the index position of comma (,) in the string which comes between the lastName and firstName in the input file. size variable holds the length of the Name string.

The function substr is used here to divide the string into substring which is the part of the string that starts at character position and traverses through the specified length of characters.

Here to get the last name in the Name string, substr is used which has two parameters 0 and position means that the substring is obtained starting from 0 position of string and ends where it encounters (,).

Similarly to get the first name, this function is used and it has two parameters; position+2 and size which states that substring will start from two places after (,) and ends till the length of the string. Here position+2 means that it will skip the space between the first name and last name.

Next the names are displayed and stored in the output file via the OutputFile object in the format : firstName middleName lastName

close function will close both the input and output files

Main function calls this function NamesFunction to execute.

You might be interested in
True or false? Compared to verbal language a shot is like a word
Nikolay [14]

Answer:

it is true according to me

hope it helps!!!

4 0
3 years ago
C
Paraphin [41]
The answer is Document Inspector
5 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Brilliant_brown [7]

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

7 0
3 years ago
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
Plato :
ddd [48]

Answer:

filler content

Explanation:

Isabel must use some sort of filler content while creating a wireframe that she is up with. For the banner, she can make use of the placeholder, and for the text, she can make use of the lorem ipsum. Also, if the wireframe is low fidelity then only she can use above. And if the wireframe is high fidelity then she should use the original banner and text.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Why are prepositions, conjunctions, and pronouns usually considered poor choices to use as key words?
    5·2 answers
  • Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
    10·1 answer
  • Software that instructs the computer how to run applications and controls the display/keyboard is know as the
    8·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • What is required to contain warnings, after several studies that have shown that they are a suffocation risk?
    15·2 answers
  • Which of the following is the definition of registration authority ( RA)?
    10·1 answer
  • Create a function called "strip_r_o" that takes in a STRING and strips all the Rs and Os from the string. Also use a FOR loop in
    7·1 answer
  • Which job role requires you to create user guides for computer products and services?
    11·1 answer
  • 8.11 LAB: Filter and sort a list
    8·1 answer
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!