answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
2 years ago
3

The function below takes one parameter: a string (full_name) consisting of words separated by whitespace. Make an acronym from t

he words by making a new word by selecting the first letter of each word, and then capitalizing the new word. For example, if given the string 'international business machines', your function would return 'IBM'.
To implement this, split the given string to get a list of strings (one string per word). Iterate through the words, building a string from the first letters of each word. Then convert the result to upper case letters using the upper() function.
Computers and Technology
2 answers:
krok68 [10]2 years ago
7 0

Answer:

The python program is given below

Explanation:

def make_acronym(full_name):

#initialize a local with empty string

  final=""

#split the word with spaces into list

  wordList=full_name.split()

#for loop the wordList list

  for word in wordList:

#convert the first character to upper case

#and add to local variable final

       final=final+ word[0].upper()

#return the abbreviation

  return final

#invoke the api using print function

print(make_acronym("international business machines"))

print(make_acronym("tamil nadu"))

print(make_acronym("indian legend"))

<u>OUTPUT</u>

IBM

TN

IL

goblinko [34]2 years ago
3 0

Answer:

// Import Scanner class to allow program receive user input

import java.util.Scanner;

// Class definition

public class Solution {

   // Main method which begin program execution

   public static void main(String args[]) {

     // Scanner object scan is defined

     Scanner scan = new Scanner(System.in);

     // Prompt telling the user to enter a sentence

     System.out.println("Enter your sentence: ");

     //User input is assigned to userInput

     String userInput = scan.nextLine();

     //The userInput is split into Array and store with inputArray variable

     String[] inputArray = userInput.split(" ");

     //The outputed abbreviation

     String shortCode = "";

     //for loop to go through the inputArray

     for(int i = 0; i <inputArray.length; i++){

         //temporary variable to hold each array element

         String temp = inputArray[i];

         shortCode += temp.charAt(0);

     }

     // The shortcode is displayed in upper case

     System.out.println(shortCode.toUpperCase());

   }

}

Explanation:

The solution is implemented using Java.

First the Scanner class is imported to allow the program receive user input. Then inside  the main method, we declared a scanner object 'scan', then prompt the user to enter input.

The user input is assigned to 'userInput', then the input is splitted and assigned to 'inputArray'. A 'shortCode' variable is declared which hold the abbreviation.

Then a for-loop is use to go through the inputArray and concatenate the first letter of each word to shortCode.

The shortCode is displayed in upper case.

You might be interested in
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
Blababa [14]

DDoS - Distributed Denial of Service

<u>Explanation:</u>

  • In DDoS attack, the attack comes from various system to a particular one by making some internet traffic.
  • This attack is initiated from various compromised devices, sometimes distributed globally through a botnet. It is different from other attacks  such as (DoS) Denial of Service attacks, in which it utilizes an unique Internet-connected device ( single network connection) to stream a target with the malicious traffic.
  • So in DDoS, multiple systems are involved in the attack and hence we can conclude that as the answer.
8 0
2 years ago
The ratio of Chris an iood Dom's ages is
irinina [24]

Answer:

28 years

Explanation:

Let's represent present age of Chris and Dom as C and D respectively. Then since ratio of present age of Chris and Dom is 3:4. Therefore,

\frac{C}{D}=\frac{3}{4}

C=\frac{3}{4}D   ...(1)

Now, it is given that in 7 years their age ratio will become 4:5. Therefore,

\frac{C+7}{D+7}=\frac{4}{5}

5C+35=4D+28\\

Using value of C from equation(1),

5\times\frac{3}{4}D-4D=28-35

15D-16D=-28\\-D=-28\\ D=28

Thus, present age of Dom is 28 years.

8 0
3 years ago
Kris, an IT manager at Park Infosystems, is handling four projects simultaneously. Each project has loaned and shared resources
Natalija [7]

Answer:

many-to-many relationship

Explanation:

They are different types of relationship between projects. A many-to-many relationship occurs when a row in a table associates with many related rows in another table. For example the relationship between an employee and a project, An employee can work on many projects and a project can have many employees working on it.

8 0
2 years ago
Read 2 more answers
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no
elena55 [62]

Answer:

d. Port mirror

Explanation:

Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.

4 0
2 years ago
Declare a struct named PatientData that contains two integer data members named heightInches and weightPounds. Sample output for
boyakko [2]

Answer:

struct PatientData{

   int heightInches, weightPounds;

};

Explanation:

In order to declare the required struct in the question, you need to type the keyword <em>struct</em>, then the name of the struct - <em>PatientData</em>, <em>opening curly brace</em>, data members - <em>int heightInches, weightPounds;</em>, <em>closing curly brace</em> and <em>a semicolon</em> at the end.

Note that since the object - lunaLovegood, is declared in the main function, we do not need to declare it in the struct. However, if it was not declared in the main, then we would need to write <em>lunaLovegood</em> between the closing curly brace and the semicolon.

8 0
2 years ago
Other questions:
  • Which technology had the same effect in the 1920s as the internet did in the 2000s? the widespread effect of technology 1920s 20
    8·1 answer
  • Richard uses Microsoft outlook as his email client. He wants to check whether he has received any new mail. Identify which key R
    12·1 answer
  • For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distribute
    6·1 answer
  • Suppose that f is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointer
    6·1 answer
  • Assume there is a machine with the IP address 129.82.102.63 with netmask /23, and with a parent NW whose netmask is 255.255.224.
    9·1 answer
  • Juan, a network user, sends an email to you, the IT admin of the network, stating that his account is locked because he has lost
    14·1 answer
  • 4. When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirem
    13·1 answer
  • Which two statements are true regarding online professional identity?
    10·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    12·1 answer
  • Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non-negative" otherwise.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!