C++ question 1.) Write an iterative routine that will take a string, go through each character of the string and enqueue the character if it is a punctuation (.,?!), else toss the character. When end of string is reached, then dequeue the characters, count how many punctuations are there, then print the count.
Q: Why is it important for our digital documents to be well organized?
A: => A digital document refers to an electronic file that contains information in a digital…
Q: programing in c# Write a program that inputs the radius of a circle as an integer and displays the…
A: Answer is given below
Q: Why are CPUs needed in computers? Your views?
A: => A computer is an electronic device that is designed to process, store, and manipulate…
Q: Why do some people commit crimes online, and how can this be prevented?
A: There are several reasons why some people commit crimes online, including anonymity, ease of access,…
Q: The Internet has affected many aspects of our society. What are the most important benefits of the…
A: The Internet has transformed our society in numerous ways, bringing about significant benefits and…
Q: W
A: Time-sharing and distributed operating systems are two distinct types of operating systems that are…
Q: This is a fantastic chance to advise for a big beverage producer. Make sure your marketing plan…
A: Below is a marketing plan that focuses on increasing online visibility and improving the user…
Q: 1. Write a function that converts a phrase into pig Latin. A word is converted to pig Latin by…
A: As per guidelines we are supposed to answer only one question. Kindly repost other questions as…
Q: Why is multithreading so popular, and what makes it different from other OS operations? Explain.
A: Multithreading has gained popularity in contemporary computing due to its ability to execute…
Q: Is it possible to draw any conclusions or make any suggestions based on this information on…
A: Based on the information provided about cybercrime, it is possible to draw some conclusions and make…
Q: Acquire knowledge on social media. How does the concept of cloud computing use the concept of…
A: Social media includes websites, applications, and platforms that are used for social networking and…
Q: This article takes a very in-depth look at the phenomenon of cyberbullying and discusses its…
A: Cyberbullying is a form of bullying that takes place via digital communication technologies, such as…
Q: You are provided a list of projects as well as a list of dependencies (a list of pairs of projects…
A: In this question we have to write a code to find a valid construction order for a list of projects…
Q: Which features should you stress most when searching for a new laptop computer?
A: When looking for a new laptop computer, it's critical to evaluate a variety of characteristics to…
Q: What are the best practises for using the IT simulation viewer?
A: Information Technology refers to the use of digital technology to manage and process information. It…
Q: a) Provide the instruction type, assembly language instruction, and binary representation of…
A: In the field of computer architecture and assembly language programming, understanding the different…
Q: There are a lot of advantages to being able to communicate with other people via social media.
A: When programs use data efficiently, like when a user starts a piece of software, the data is kept in…
Q: Which characteristics of time-sharing and distributed system operating systems are distinct from one…
A: An operating system is a tool for dealing with hardware. An interface that enables complete system…
Q: 4. Consider two different implementations of the same instruction set architecture. The instructions…
A: Given that, Number of classes= 4 (Class A, B, C and D) Clock rate of P1= 2.5 GHz CPIs of P1 are 1,…
Q: This article discusses the history of cyberbullying, its effects, and possible remedies.
A: Information indicates that we must describe cyberbullying from every conceivable angle, including…
Q: Compare connection-based versus connection-less protocols, and briefly describe the advantages and…
A: You must comprehend and list the advantages and disadvantages of connection-based vs connectionless…
Q: The Association for Computing Machinery's (ACM) code of ethics and behaviour may be broken if public…
A: The ACM's Code of Ethics and Professional Conduct is a set of guidelines designed to help computing…
Q: How would you design a network to link 40 workstations to the outside world if your workplace were…
A: To manage the enormous volumes of data created by users, the world of social media Is, in…
Q: Interrupt methods for the FIQ must hook and chain at the appropriate offset in the Interrupt Vector…
A: Computers and microcontrollers use the Interrupt Vector Table (IVT) data structure to manage…
Q: "Internet of things" has arrived. "three fascinating new uses"?
A: The Internet of Things (IoT) has evolved as a formidable technology that is altering industries and…
Q: You clearly grasp social media basics. Cloud computing in self-driving computers? This proves my…
A: Social networking is essential in today's society for linking people and organisations. Developing…
Q: When we state that the requirements should be thorough and consistent, what exactly do we mean?
A: Requirements engineering is an essential phase in software development. It is a crucial step that…
Q: "Internet of things" arrived. "three fascinating new uses"?
A: 1) The Internet of Things (IoT) is a network of interconnected devices that are embedded with…
Q: This article takes a very in-depth look at the phenomenon of cyberbullying and discusses its…
A: Cyberbullying happens through social media, texting, online forums, and other technological ways.…
Q: Enter, compile, and run the following application. public class Test { public static void…
A: Given code: public class Test{ public static void main(String[] args) { System.out.println("An…
Q: Consider the Sailors-Boats-Reserves database. Which SQL queries answer this question? Find the names…
A: A join us used to get multiple columns from two or more tables having common column. Syntax:-…
Q: Does it indicate that programming has to be written such that it may be maintained even if the…
A: Yes, it is important to write programming code that can be maintained even if the corporation or…
Q: When sharing a printer and many PCs, how does one protect their privacy?
A: 1) A shared printer is a printer that can be accessed by multiple users on a network. This can be…
Q: three challenges connected to defining issues provide the greatest challenge to those who are…
A: The study of natural language is a complex field that involves understanding the intricacies of…
Q: The creation of new technologies is a process that can neither be halted nor slowed down. If you are…
A: The world of computer technology is constantly evolving and it is important to stay up to date with…
Q: Providers of services related to the administration of operations?
A: Here is your solution -
Q: Make an attempt to predict and assess two possible future OS changes that may be brought about by…
A: Virtualization, the technology that allows multiple operating systems (OS) to run on a single…
Q: Obtain the canonical SOP form of the following functions: (i)…
A: To obtain the canonical SOP form of a function directly from a truth table, follow these steps:…
Q: a) Define the following concept formally using description logics: A university has a female…
A: Part (a) of the question involves formalizing a set of assertions about a university using a formal…
Q: How quickly can information travel over an Ethernet local area network?
A: Local area networks (LANs) often use the Ethernet networking protocol. It enables wired networks…
Q: Learn social media. Cloud vs. self-driving? These are the ideals. Cloud computing and weblogs
A: Flexibility is essential for social media influencers to achieve success. The industry is…
Q: Acquire knowledge on social media. How does the concept of cloud computing use the concept of…
A: Social media plays a crucial role in contemporary society by providing platforms for communication,…
Q: Consider a difficulty that develops when a computer's operating system uses several threads to do…
A: When a computer program uses multiple threads to perform a task, it can cause a problem called…
Q: To which level of the network's hierarchical structure does the PPP protocol belong?
A: Through the use of a serial link and a specialised communication channel, it is possible to create a…
Q: Learn social media. Cloud vs. self-driving? These are the ideals. Cloud computing and weblogs?
A: Flexibility is essential for effective social media bloggers. To keep up with the quick expansion of…
Q: Make up your own words to describe the four parts of an IT system.
A: An IT system is composed of four main components: 1) Hardware, 2) Software, 3) Data, 4) People…
Q: In the present day, what broad principles and trends characterise the overwhelming majority of…
A: In the present day, there are several broad principles and trends that characterize the overwhelming…
Q: Days Out Write a program that calculates the average number of days a company's employees are…
A: In this question we have to write a Java Program for the Days Out probelm statement Let's code and…
Q: Write an application that prompts for and reads the numerator and denominator of a fraction as…
A: We are going to write a code that reads the numeratorand denominator of a fraction as integers and…
Q: Is Instagram's decentralized safety worth studying?
A: In this question we have to understand is Instagram's decentralised safety worth studying Let's…
C++ question
1.) Write an iterative routine that will take a string, go through each character of the string and enqueue the character if it is a punctuation (.,?!), else toss the character. When end of string is reached, then dequeue the characters, count how many punctuations are there, then print the count.
2.) Write a routine that would receive a pointer to the top of the linked list that has an integer for each node. Change all odd integers to even by adding one. But count the numbers you changed and print the count.
Step by step
Solved in 5 steps with 3 images
- Help make a C++ program that:1. Queries the user for the name of a file of text.2. Opens the file, and maintains two lists: one list for words beginning with the letter"D" or "d", and a second list for words beginning with any other letter. Each listmust maintain words in alphabetical order.3. Each node in the list must contain the word and the number of times that the word appears.4. Display (a screen at a time) each of the lists showing the alphabetized list of words and thenumber of times that each appears. Please have the main function as the first function in the programDO NOT COPY FROM CHEGG: write a c++ program by using the concept of double linked list you are required to implement a module for a social networking site. You have to keep track of user’s posts. A post is comprised of following: 1- Message 2- Shared with (Public, Friends, Private) 3- Date You have to provide a user friendly interface for the user 1. New post 2. View posts 2.1. View newer post 2.2. View by privacy 2.3. View all When user is viewing the post following options would be available for the user: Press N for next post Press P for the previous post Press E to edit the post Press D to delete the post 3. Exitpython programming Write a function that will insert a new value into the middle of a Linked List. INPUT: The head of the Linked List, the value to insert OUTPUT: Nothing is output RETURNED: Nothing is returned
- The function that will a single items to the list is Oextend (...) Oadd(...) Oappend(...) Olengthen(...)Contact list: Binary Search A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Define and call the following function. The return value of FindContact is the index of the contact with the provided contact name. If the name is not found, the function should return -1 This function should use binary search. Modify the algorithm to output the count of how many comparisons using == with the contactName were performed during the search, before it returns the index (or -1). int FindContact(ContactInfo contacts[], int size, string contactName) Ex: If the input is: 3 Frank 867-5309 Joe 123-5432 Linda…Write a function list2DigitOdd() that creates and returns a list that contain all positive 2-digit odd numbers. The function call list2DigitOdd() will return a list containing 11, 13, 15, ..., 99.
- In C++ Write a program that replaces words in a sentence. The input begins with an integer indicating the number of word replacement pairs (original and replacement) that follow. The next line of input begins with an integer indicating the number of words in the sentence that follows. Any word on the original list is replaced. Ex: If the input is: 3 automobile car manufacturer maker children kids15 The automobile manufacturer recommends car seats for children if the automobile doesn't already have one. then the output is: The car maker recommends car seats for kids if the car doesn't already have one. You can assume the original words are unique. For coding simplicity, follow each output word by a space, even the last one. Hint: For words to replace, use two vectors: One for the original words, and the other for the replacements. Your program must define and call the following function that returns index of word's first occurrence in wordList. If not found, then the function…Old MathJax webview Old MathJax webview In Java Some methods of the singly linked list listed below can be implemented efficiently (in different respects) (as opposed to an array or a doubly linked list), others not necessarily which are they and why? b. Implement a function to add an element before the first element. c. Implement a function to add an item after the last one element. d. Implement a function to output an element of the list. e. Implement a function to output the entire list. f. Implement a function to output the number of elements. G. Implement a function to delete an item. H. Implement a function to clear the entire list. I. Implement functionality to search for one or more students by first name, last name, matriculation number or course of study. J. Implement functionality to sort the records of the student, matriculation number and course according to two self-selected sorting methods.Note : It is required to done this by OOP in C++. Thanks Create a linked list, size of linked list will be dependent on the user. Insert the numbers in the linked list till the linked list reaches the size. Create a menu and perform the following function on that linked list. Traversal: To traverse all the nodes one after another. Insertion: To add a node at the given position. Deletion: To delete a node. Searching: To search an element(s) by value. Updating: To update a node.
- Please don't copy Write a C++ program that uses a linked list implementation The information for each toy product includes the product ID, product name, available quantity and price. Create a linked list node to store the information for each product. Provide a menu to perform the following actions. * Add a new product. Products are sorted according to the product ID in the linked list. * Sell a product. The available quantity of this product is reduced, based on the number of products that have been sold * Check if a product is available * Search if a product is sold by a shop * List the names of productscheaper than 50Q5: Write a C++ program to create a linked list contains 30 nodes, then print out the (طباعة عدد العقد التي تحتوي اعداد زوجية) .number of nodes that contain an even valueWrite C++ statements for the following tasks: i. Create X point to the link(node) that stores data 21.ii. Create list point to the link containing data14.iii. Create Y point to the last link in the list.iv. Create list point to an empty list.v. Set the value of the link containing 23 to 33.vi. Create and insert the link with data 8 after the link pointed to by X.vii. Delete the link with data 21. Also, deallocate the memory occupied by this link.