1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
14

Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should d

etermine if the string begins with an uppercase letter and ends with a punctuation mark. The method should return true if the string meets the criteria; otherwise it should return false .
Computers and Technology
1 answer:
Contact [7]3 years ago
6 0

Answer:

The method in Python is as follows:

def checkStr(strng):

   if strng[0].isupper() and strng[-1] == "?":

       return True

   else:

       return False

Explanation:

This defines the method

def checkStr(strng):

This checks if the first character i upper and if the last is "??

   if strng[0].isupper() and strng[-1] == "?":

If the condition is true, the function returns true

       return True

Else, it returns false

<em>    else:</em>

<em>        return False</em>

You might be interested in
Q1: what is significant about the contents of the destination address field?
Stells [14]
<span>The destination address field must contain the MAC address.
The MAC address is needed to help find a device for an ARP request.</span>
All hosts on the LAN will receive this broadcast frame. The host with the IP address of 192.168.1.1 (default gateway) will send a unicast reply to the source (PC host). This reply contains the MAC address of the NIC of the Default Gateway.
5 0
3 years ago
Read 2 more answers
In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following
Airida [17]

The option that best explains why the error occurs is that The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.

<h3>Can programs represent integers?</h3>

An integer value is known to be often listed out in the source code of a program in a way called a sequence of digits that is said to be optionally prefixed with + or −. Note that some programming languages do use other notations, like hexadecimal.

Computers are known to use a a fixed number of bits to show an integer. The most -used bit-lengths for integers are known to be 8-bit, 16-bit, 32-bit or 64-bit.

Learn more about errors from

brainly.com/question/11472659

8 0
2 years ago
Who developed the Great Compromise ​
Nostrana [21]

Answer:

Roger Sherman

The solution came in the form of a compromise proposed by statesmen Roger Sherman and Oliver Ellsworth of Connecticut. The Great Compromise created two legislative bodies in Congress.

Explanation:

comment how it helps

7 0
3 years ago
The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
ad-work [718]

Answer:

Yes, this statement is completely true

Explanation:

Yes, this statement is completely true. A personal computer is a multimedia machine and can be used to complete an incredibly large number of tasks with ease. Such tasks include all of the ones listed in the question. Aside from that other tasks depend more on the skill level and understanding of the user. For example, an individual who has a vast understanding of technology and programming can create software to perform absolutely any task they may want or need to do.

5 0
3 years ago
The Counter Pattern
kumpel [21]
You'll probably see numbers counting up, like 1 2 3 4 ...
6 0
3 years ago
Other questions:
  • . Stress can affect not only your health, but also other aspectsof your
    15·1 answer
  • Which of the following is a characteristic of the internet today? distributed network central hub lack of protocols absence of c
    5·1 answer
  • Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    14·1 answer
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • Find a 95% confidence interval for the mean failure pressure for this type of roof panel.The article "Wind-Uplift Capacity of Re
    7·1 answer
  • Gina wants to consistently format the headings in all of her worksheets.. . Which is a quick way to do so?. A)Format the heading
    10·1 answer
  • Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
    10·1 answer
  • Write the definition of a function named fscopy. This function can be safely passed two fstream objects, one opened for reading,
    11·1 answer
  • Which of the following are characteristics of global variables? Check all that apply.
    5·2 answers
  • Primary memory consists of the various devices that are able to store data and programs even when the power is off. true or fals
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!