1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
10

Write a program that prompts the user to input a string and outputs the string in uppercase letters. (Use a character array to s

tore the string.)
Computers and Technology
1 answer:
Nady [450]3 years ago
8 0

Answer:

Explanation:

The following code is written in Java. It asks the user for a string/sentence and then grabs every character in the string, capitalizes it, and saves it in a char ArrayList. Then it concatenates the char array into a String variable called output and prints the capitalized String.

public static void capitalizeMe() {

               Scanner in = new Scanner(System.in);

               System.out.println("Enter a String:");

               String inputSentence = in.nextLine();

               ArrayList<Character> capitalString = new ArrayList<Character>();

               for (int x = 0; x < inputSentence.length(); x++) {

                       capitalString.add(Character.toUpperCase(inputSentence.charAt(x)));

               }

               String output = "";

               for (char x: capitalString) {

                       output += x;

               }

               System.out.println(output);

       }

You might be interested in
Which term describes encryption that protects the entire original ip packet's header and payload?
mario62 [17]
The answer is <span> tunnel mode encryption.   This</span><span> describes encryption that protects the entire original ip packet's header and payload.  A tunnel mode encryption </span><span>protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by a another set of IP headers. .<span>Additional headers are added to the packet; so the payload MSS is less.</span></span>
7 0
3 years ago
Read 2 more answers
Describe accessibility in Windows 7 ​
satela [25.4K]

Answer:

Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.

7 0
3 years ago
Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appea
Jobisdone [24]

Answer:

Here you go :)

Explanation:

Change this however you'd like:

array = []

for n in range(10):

   x = int(input("Enter integer: "))

   array.append(x)

dup = set(array)

print(", ".join(str(i) for i in dup))

7 0
3 years ago
A technician is about to open a desktop PC to replace a video card. He shuts down the computer, opens it, grounds himself with t
AnnyKZ [126]

Answer:

Disconnect the power cable?

Explanation:

4 0
2 years ago
You need to have a password with 5 letters followed by 4 even digits between 0 and 9, inclusive. if the characters and digits ca
aleksandr82 [10.1K]
We all know that there are 26 letters available in the alphabet and there are just 5 even numbers between 0 and 9. We are now given the situation of how many passwords can we make out of the criteria of having 5 letters that cannot be repeated and 4 even digits from 0-9. We cannot repeat the numbers and letters, thus our password will look something like this, LLLLLNNNN, where L is a letter and N is a number. Let us note that  we cannot use the characters and digits more than once.This is how we will solve the probable number of passwords.

26 x 25 x 24 x 23 x 22 x 5 x 4 x 3 x 2

When we compute this formula, we will have the total number of possible passwords:

947,232,000.00

There are 947,232,000 possible passwords based on the given criteria.
8 0
3 years ago
Other questions:
  • In a doubly linked list, every nodecontains the address of the next node and the previousnode except for the ____ node.
    8·1 answer
  • Write a program that prompts the user for an integer and then prints all prime numbers up to that integer.
    7·1 answer
  • Is there any quantum computer in India?​
    9·1 answer
  • 12. ______ is considered to be the first video game mascot.
    7·1 answer
  • Nick is moving from Alabama to Texas. A friend of his remarked that Nick may have to pay higher taxes there. What is the cheapes
    7·1 answer
  • Define ulility software
    8·1 answer
  • What is one reason that many older PC games, when run on modern hardware, will run at high speeds? Include discussions of frame
    15·1 answer
  • What stage of the development process is often called the pre-alpha phase and is the "meat" of the design process where features
    5·1 answer
  • Which option identifies the type of engineers described in the following scenario?
    6·1 answer
  • Which of the following numbers is of type
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!