Answer:
Option A
Availability
Explanation:
The implementation of too many security protocols will lead to a reduction of the ease at which a piece of information is accessible. Accessing the piece of information will become hard even for legitimate users.
The security protocols used should not be few, however, they should be just adequate to maintain the necessary level of confidentiality and integrity that the piece of information should have, While ensuring that the legitimate users can still access it without much difficulty.
You are in the process of building a computer for a user in your organization. You have installed the following components into the computer in Support:AMD Phenom II X4 quad core processor8 GB DDR3 memoryOne SATA hard drive with Windows 7 installedYou need to make sure the new components are installed correctly and functioning properly. You also need to install a new SATA CD/DVD drive and make sure the computer boots successfully.Perform tasks in the following order:Identify and connect any components that are not properly connected.Use the PC tools on the shelf to test for components that are not functioning. Replace any bad components with the known good parts on the shelf.Install the required CD/DVD drive in one of the drive bays and connect the power cable from the power supply.
Answer:
i would check all connections from the hard drive and power supply and check your motherboard for any missing sauters and or loose no contact connections
Explanation:
An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. Which of the following would BEST meet this goal?a. Split tunnelb. Full tunnelc. IPsec using Tunnel moded. IPsec using Transport mode
Answer:
B. Full tunnel.
Explanation:
In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.
A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.
On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.
Hence, the full tunnel method is the most secured type of virtual private network.
Where can you find detailed information about your registration, classes, finances, and other personal details? This is also the portal where you can check your class schedule, pay your bill, view available courses, check your final grades, easily order books, etc. A. UC ONE Self-Service Center B. Webmail C. UC Box Account D. ILearn
Answer:
A. UC ONE Self-Service Center
Explanation:
The UC ONE Self-Service Center is an online platform where one can get detailed information about registration, classes, finances, and other personal details. This is also the portal where one can check class schedule, bill payment, viewing available courses, checking final grades, book ordering, etc.
it gives students all the convenience required for effective learning experience.
The UC ONE platform is a platform found in the portal of University of the Cumberland.
Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Sample output with inputs 2014 777:
Answer:
I am writing the program in JAVA and C++
JAVA:
public int createLicenseNum(int customID){ //class that takes the customID as parameter and creates and returns the licenseNum
licenseNum = (100000 * customID) + licenseYear; //licenseNum creation formula
return(licenseNum); }
In C++ :
void DogLicense::CreateLicenseNum(int customID){ //class that takes the customID as parameter and creates the licenseNum
licenseNum = (100000 * customID) + licenseYear; } //licenseNum creation formula
Explanation:
createLicenseNum method takes customID as its parameter. The formula inside the function is:
licenseNum = (100000 * customID) + licenseYear;
This multiplies 100000 to the customID and adds the result to the licenseYear and assigns the result of this whole expression to licenseNum.
For example if the SetYear(2014) means the value of licenseYear is set to 2014 and CreateLicenseNum(777) this statement calls createLicenseNum method by passing 777 value as customID to this function. So this means licenseYear = 2014 and customID = 777
When the CreateLicenseNum function is invoked it computes and returns the value of licenseNum as:
licenseNum = (100000 * customID) + licenseYear;
= (100000 * 777) + 2014
= 77700000 + 2014
licenseNum = 77702014
So the output is:
Dog license: 77702014
To call this function in JAVA:
public class CallDogLicense {
public static void main(String[] args) {//start of main() function
DogLicense dog1 = new DogLicense();//create instance of Dog class
dog1.setYear(2014); // calls setYear passing 2014
dog1.createLicenseNum(777);// calls createLicenseNum passing 777 as customID value
System.out.println("Dog license: " + dog1.getLicenseNum()); //calls getLicenseNum to get the computed licenceNum value
return; } }
Both the programs along with the output are attached as a screenshot.
Answer:
public int createLicenseNum(int customID){
licenseNum = (100000 * customID) + licenseYear;
return(licenseNum);
}
Explanation:
Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public static integer named d. Which of the following are legal statements in a class named ClassB that has instantiated an object as ClassA obA =new ClassA();?
a. obA.b 12;
b. obA.c 5;
c. obA.d 23;
d. ClassA.b=23;
e. ClassA.c= 33;
f. ClassA.d= 99;
Answer:
b. obA.c 5;
d. ClassA.b=23;
f. ClassA.d = 99;
Explanation:
Java is a programming language for object oriented programs. It is high level programming language developed by Sun Microsystems. Java is used to create applications that can run on single computer. Static variable act as global variable in Java and can be shared among all objects. The non static variable is specific to instance object in which it is created.
In the three As of security, which part pertains to describing what the user account does or doesn't have access to
Answer:
Authorization
Explanation:
Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to group them, or classify them.c. Discuss whether you believe the control or display is suitable for its purpose.
Answer:
Open ended investigation
Explanation:
The above is an example of an open ended investigation. In understanding what an open ended investigation is, we first of all need to understand what open endedness means. Open endedness means whether one solution or answer is possible. In other words it means that there may be various ways and alternatives to solve or answer a question or bring solution to an investigation.
From the definition, we can deduce that an open ended investigation is a practical investigation that requires students to utilize procedural and substantive skills in arriving at conclusion through evidence gathered from open ended research or experiment(as in not close ended, not limited to ready made options, freedom to explore all possibilities). This is seen in the example question where students are asked to explore the different examples of physical controls and displays and also discuss their observations. Here students are not required to produce a predefined answer but are free to proffer their own solutions
How does the teacher know you have completed your assignment in Google Classroom?
Answer:
When students have completed the assignment, they simply click the Mark As Done button to let the teacher know they have finished.
Explanation: Note: The teacher does NOT receive an alert or email notification when work has been turned in, or marked as done.
Hello, I am having trouble adding a txt file into a array, so I can pop it off for a postfix problem I have uploaded what I have so far. I need help please
Answer:
#include <stack>
#include<iostream>
#include<fstream> // to read imformation from files
#include<string>
using namespace std;
int main() {
stack<string> data;
ifstream inFile("postfix.txt");
string content;
if (!inFile) {
cout << "Unable to open file" << endl;
exit(1); // terminate with error
}
while (getline(inFile, content)) {
data.push(content);
}
inFile.close();
return 0;
}
Explanation:
You were very close. Use the standard <stack> STL library, and make sure the stack elements are of the same type as what you're trying to add, i.e., std::string.
Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Incremental Development d. Linear Development
Answer:
b. Both incremental and iterative development.
Explanation:
Agile software development is based on both incremental and iterative development. It is an iterative method to software delivery in which at the start of a project, software are built incrementally rather than completing and delivering them at once as they near completion.
Incremental development means that various components of the system are developed at different rates and are joined together upon confirmation of completion, while Iterative development means that the team intends to check again components that makes the system with a view to revising and improving on them for optimal performance.
Agile as an approach to software development lay emphasis on incremental delivery(developing system parts at different time), team work, continuous planning and learning, hence encourages rapid and flexible response to change.
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0
Answer:
def pyramid_volume(base_length,base_width,pyramid_height):
return base_length * base_width * pyramid_height/3
length = float(input("Length: "))
width = float(input("Width: "))
height = float(input("Height: "))
print("{:.2f}".format(pyramid_volume(length,width,height)))
Explanation:
This line declares the function along with the three parameters
def pyramid_volume(base_length,base_width,pyramid_height):
This line returns the volume of the pyramid
return base_length * base_width * pyramid_height/3
The main starts here
The next three lines gets user inputs for length, width and height
length = float(input("Length: "))
width = float(input("Width: "))
height = float(input("Height: "))
This line returns the volume of the pyramid in 2 decimal places
print("{:.2f}".format(pyramid_volume(length,width,height)))
Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:
42 seconds
import java.util.Scanner;
public class PopcornTimer {
public static void printPopcornTime(int bagOunces) {
/* Your solution goes here */
}
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
int userOunces;
userOunces = scnr.nextInt();
printPopcornTime(userOunces);
}
}
Answer:
Replace
/* Your solution goes here */
with
if (bagOunces < 2) {
System.out.print("Too Small");
}
else if(bagOunces > 10) {
System.out.print("Too Large");
}
else {
System.out.print((bagOunces * 6)+" seconds");
}
Explanation:
This line checks if bagOunces is less than 2;
if (bagOunces < 2) {
If yes, the string "Too Small" is printed
System.out.print("Too Small");
}
This line checks if bagOunces is greater than 10
else if(bagOunces > 10) {
If yes, the string "Too Large" is printed
System.out.print("Too Large");
}
The following condition is executed if the above conditions are false
else {
This multiplies bagOunces by 6 and adds seconds
System.out.print((bagOunces * 6)+" seconds");
}
If the data rate is 10 Mbps and the token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle network with 40 stations? (The average number of stations the token must pass through is 40/2 = 20.) Ignore the propagation delay and the gap Ethernet requires between packets.
Answer:
1.024x10^-5
Explanation:
To calculate the transmission delay bytes for the token,
we have the token to be = 64bytes and 10mbps rate.
The transmission delay = 64bytes/10mbps
= 51.2 microseconds
A microsecond is a millionth of a second.
= 5.12 x 10^-5
The question says the average number of stations that the token will pass through is 20. Remember this value is gotten from 40/2
20 x 5.12 x 10^-5
= 0.001024
= 1.024x10^-5
Therefore on an idle network with 40 stations, the average wait is
= 1.024x10^-5
mplement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the integers within this file, close the file, and then return the sum.If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.Please Use This Code Template To Answer the Question#include #include #include //needed for exit functionusing namespace std;// Place fileSum prototype (declaration) hereint main() {string filename;cout << "Enter the name of the input file: ";cin >> filename;cout << "Sum: " << fileSum(filename) << endl;return 0;}// Place fileSum implementation here
Answer:
Which sentence best matches the context of the word reticent as it is used in the following example?
We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.
Explanation:
Which sentence best matches the context of the word reticent as it is used in the following example?
We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.
You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component should you check first
Answer:
Pick up roller
Explanation:
you should first check the pickup roller component. This component is the part of the printer that picks paper up from the paper tray. The pickup roller links the printer and the paper. When the printer printer is running, the roller would take paper from the paper tray for the printer to print on. One of the issues it can have is Paper jam where the roller would stop turning so that it will no longer be picking papers up from the tray.
Determine the median paycheck from the following set:
{$100, $250, $300, $400, $600, $650}
$300
$350
$450
$600
Answer:
My answer to the question is $350.
The middle numbers are $300&$400.
300+400=700/2=350.
Answer:
$350
Explanation:
Bharath has made a table of content for his document in Open Office, in which he wants to make few changes, but he is unable to make the changes. Give reason. Explain how he can make the necessary changes
Answer:
H cannot update it because it is probably protected.
If you cannot click in the table of contents, it is probably because it is protected. To disable this protection, choose Tools > Options > OpenOffice.org Writer > Formatting Aids, and then select Enable in the Cursor in protected areas section. If you wish to edit the table of contents without enabling the cursor, you can access it from the Navigator.
Explanation:
. To update a table of contents when changes are made to the document:
Right-click anywhere in the TOC.
From the pop-up menu, choose Update Index/Table. Writer updates the table of contents to reflect the changes in the document.
You can also update the index from the Navigator by right-clicking on Indexes > Table of Contents1 and choosing Index > Update from the pop-up menu.
Scams where people receive fraudulent emails that ask them to supply account information are called ________.
Answer:
"Phishing" will be the correct approach.
Explanation:
This aspect of cyber attacks or fraud is called phishing, whereby clients or users are questioned for personally identifiable information about them.Attackers could very well-currently the most frequently use phishing emails to exchange malicious programs that could operate effectively in what seems like several different ways. Others would get victims to steal user credentials including payment details.Each time we add another bit, what happens to the amount of numbers we can make?
Answer:
When we add another bit, the amount of numbers we can make multiplies by 2. So a two-bit number can make 4 numbers, but a three-bit number can make 8.
The amount of numbers that can be made is multiplied by two for each bit to be added.
The bit is the most basic unit for storing information. Bits can either be represented as either 0 or 1. Data is represented by using this multiple bits.
The amount of numbers that can be gotten from n bits is given as 2ⁿ.
Therefore we can conclude that for each bit added the amount of numbers is multiplied by two (2).
Find more about bit at: https://brainly.com/question/20802846
Write a Bash script that searches all .c files in the current directory (and its subdirectories, recursively) for occurrences of the word "foobar". Your search should be case-sensitive (that applies both to filenames and the word "foobar"). Note that an occurrence of "foobar" only counts as a word if it is either at the beginning of the line or preceded by a non-word-constituent character, or, similarly, if it is either at the end of the line or followed by a non-word- constituent character. Word-constituent characters are letters, digits and underscores.
Answer:
grep -R '^foobar'.c > variable && grep -R 'foobar$'.c >> variable
echo $variable | ls -n .
Explanation:
Bash scripting is a language used in unix and linux operating systems to interact and automate processes and manage files and packages in the system. It is an open source scripting language that has locations for several commands like echo, ls, man etc, and globbing characters.
The above statement stores and appends data of a search pattern to an already existing local variable and list them numerically as standard out 'STDOUT'.
Write a method that accepts a String object as an argument and returns a copy of the string with the first character of each sentence capitalized. For instance, if the argument is "hello. my name is Joe. what is your name?" the method should return the string "Hello. My name is Joe. What is your name?" Demonstrate the method in a program that asks the user to input a string and then passes it to the method. The modified string should be displayed on the screen.
Answer:
The programming language is not stated; However, the program written in C++ is as follows: (See Attachment)
#include<iostream>
using namespace std;
string capt(string result)
{
result[0] = toupper(result[0]);
for(int i =0;i<result.length();i++){
if(result[i]=='.' || result[i]=='?' ||result[i]=='!') {
if(result[i+1]==' ') {
result[i+2] = toupper(result[i+2]);
}
if(result[i+2]==' ') {
result[i+3] = toupper(result[i+3]);
}
} }
return result;
}
int main(){
string sentence;
getline(cin,sentence);
cout<<capt(sentence);
return 0;
}
Explanation:
The method to capitalize first letters of string starts here
string capt(string result){
This line capitalizes the first letter of the sentence
result[0] = toupper(result[0]);
This iteration iterates through each letter of the input sentence
for(int i =0;i<result.length();i++){
This checks if the current character is a period (.), a question mark (?) or an exclamation mark (!)
if(result[i]=='.' || result[i]=='?' ||result[i]=='!') {
if(result[i+1]==' '){ ->This condition checks if the sentence is single spaced
result[i+2] = toupper(result[i+2]);
-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized
}
if(result[i+2]==' '){ ->This condition checks if the sentence is double spaced
result[i+3] = toupper(result[i+3]);
-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized
}
}
} The iteration ends here
return result; ->The new string is returned here.
}
The main method starts here
int main(){
This declares a string variable named sentence
string sentence;
This gets the user input
getline(cin,sentence);
This passes the input string to the method defined above
cout<<capt(sentence);
return 0;
}
What is resource management in Wireless Communication? Explain its advantages
Answer:
This is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel.
Explanation:
Radio Resource Management is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel. Its aim is to effectively manage the radio network infrastructure. Its advantages include;
1. It allows for multi-users communication instead of point-to-point channel capacity.
2. it increases the system spectral efficiency by a high order of magnitude. The introduction of advanced coding and source coding makes this possible.
3. It helps systems that are affected by co-channel interference. An example of such a system is the wireless network used in computers which are characterized by different access points that make use of the same channel frequencies.
Given an array of integers check if it is possible to partition the array into some number of subsequences of length k each, such that:
Each element in the array occurs in exactly one subsequence
For each subsequence, all numbers are distinct
Elements in the array having the same value must be in different subsequences
If it is possible to partition the array into subsequences while satisfying the above conditions, return "Yes", else return "No". A subsequence is formed by removing 0 or more elements from the array without changing the order of the elements that remain. For example, the subsequences of [1, 2, 3] are D. [1], [2], [3]. [1, 2], [2, 3], [1, 3], [1, 2, 3]
Example
k = 2.
numbers [1, 2, 3, 4]
The array can be partitioned with elements (1, 2) as the first subsequence, and elements [3, 4] as the next subsequence. Therefore return "Yes"
Example 2 k 3
numbers [1, 2, 2, 3]
There is no way to partition the array into subsequences such that all subsequences are of length 3 and each element in the array occurs in exactly one subsequence. Therefore return "No".
Function Description
Complete the function partitionArray in the editor below. The function has to return one string denoting the answer.
partitionArray has the following parameters:
int k an integer
int numbers[n]: an array of integers
Constraints
1 sns 105
1 s ks n
1 s numbers[] 105
class Result
*Complete the 'partitionArray' function below.
The function is expected to return a STRING
The function accepts following parameters:
1. INTEGER k
2. INTEGER ARRAY numbers
public static String partitionArray (int k, List
public class Solution
Answer:
Explanation:
Using Python as our programming language
code:
def partitionArray(A,k):
flag=0
if not A and k == 1:
return "Yes"
if k > len(A) or len(A)%len(A):
return "No"
flag+=1
cnt = {i:A.count(i) for i in A}
if len(A)//k < max(cnt.values()):
return "No"
flag+=1
if(flag==0):
return "Yes"
k=int(input("k= "))
n=int(input("n= "))
print("A= ")
A=list(map(int,input().split()))[:n]
print(partitionArray(A,k))
Code Screenshot:-
what level of security access should a computer user have to do their job?
Answer:
A computer user should only have as much access as required to do their job.
Explanation:
A computer user should not be able to access resources outside of their job requirement, as this poses a potential attack vector for an insider threat. By limiting the scope of resources to just what is needed for the user's specific job, the threat to the system or company can be mitigated with additional access control features for the computer user. Never allow permission higher than what are needed to accomplish the task.
Cheers.
Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
entering and exiting indicate a
A. construction zone.
B. railroad crossing.
C. school zone.
D. none of the above
Answer:
Explanation:
Hello friend !!!!!!!!!!!!
The answer is school zone
Hope this helps
plz mark as brainliest!!!!!!!
Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).
A school zone is a specific urban area where can be found a school and/or is near a school. A school zone shows an accessible parking area for the use of individuals (e.g. parents) holding valid accessible parking passes.Moreover, a school zone sign refers to a warning signal because children cannot be as alert as adults when they cross a road.In conclusion, children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).
Learn more in:
https://brainly.com/question/8019372
Speeding is one of the most prevalent factors contributing to traffic crashes.
A. TRUE
B. FALSE
Answer:
A true
Explanation:
Speeding leads to an increase in the degree of crash severity, possibly resulting in more fatalities or injuries. More damage is caused to the vehicles involved at higher speeds, increasing likelihood vehicle will not be drivable after a crash.
The statement "Speeding is one of the most prevalent factors contributing to traffic crashes" is true.
What is speeding?Speeding causes crashes to be more severe, which could lead to more fatalities or injuries. Higher speeds result in more damage to the involved vehicles, increasing the risk that the vehicle won't be drivable following a collision. There are many accidents increasing because of high speed.
The term "speeding" refers to moving or traveling swiftly. He paid a penalty for speeding. For many American drivers, speeding has become the standard, whether it is going over the posted speed limit, driving too quickly for the road conditions, or racing. Nationwide, speeding contributes to road fatalities.
Therefore, the statement is true.
To learn more about speeding, refer to the link:
https://brainly.com/question/15297960
#SPJ2
Briefly describe the importance of thoroughly testing a macro before deployment. What precautions might you take to ensure consistency across platforms for end users?
Answer:
Answered below
Explanation:
A macro or macroinstruction is a programmable pattern which translates a sequence of inputs into output. It is a rule that specifies how a certain input sequence is mapped to a replacement output sequence. Macros makes tasks less repetitive by representing complicated keystrokes, mouse clicks and commands.
By thoroughly testing a macro before deployment, you are able to observe the flow of the macro and also see the result of each action that occurs. This helps to isolate any action that causes an error or produces unwanted results and enable it to be consistent across end user platforms.
Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU
Answer:
mouse printer CPU touch screen
Explanation:
on a tablet computer hope this helps you :)
Which of the following statements is true of an encrypted file? * The file can be read only by a user with the decryption key The file can be read by the creator and system administrator The file can not be opened again The file can be opened but not read again
Answer:
The file can be read only by a user with the decryption key
Explanation:
The way encryption works is it scrambles the data in a file following the rules of the encryption algorithm using a certain key to tell it how to scramble everything.
Without the key, the computer doesn't know how to decrypt it.
This is true no matter who has access to the file, be it a system administrator, a hacker, or even a legitimate user who has somehow lost access to the key
Strictly speaking, encryption can be broken, but, especially with modern encryption, that's a matter of centuries, and isn't really feasible
The statement that is true of an encrypted file is that The file can be read only by a user with the decryption key.
What is decryption key?A decryption key is known to be a key that is given to Customers by a specific Distributor.
This key allows Customers to open and access the Software that they bought. The decryption key is a mechanism that permit that a file can be read only by a user.
Learn more about decryption key from
https://brainly.com/question/9979590
The intention of this problem is to analyze a user input word, and display the letter that it starts with (book → B).
a. Create a function prototype for a function that accepts a word less than 25 characters long, and return a character.
b. Write the function definition for this function that evaluates the input word and returns the letter that the word starts with in capital letter (if it’s in small letters).
c. Create a function call in the main function, and use the function output to print the following message based on the input from the user. (Remember to have a command prompt in the main function requesting the user to enter any word.)
Computer starts with the letter C.
Summer starts with the letter S.
d. Make sure to consider the case where a naughty user enters characters other than the alphabet to form a word and display a relevant message.
%sb$ is not a word.
$500 is not a word.
e. Have the program process words until it encounters a word beginning with the character
Answer:
Here is the C++ program:
#include<iostream> // to use input output functions
using namespace std; //to identify objects like cin cout
void StartChar(string str) { // function that takes a word string as parameter and returns the first letter of that word in capital
int i;
char c;
do //start of do while loop
{
for (int i = 0; i < str.length(); i++) { //iterates through each character of the word str
if(str.length()>25){ //checks if the length of input word is greater than 25
cout<<"limit exceeded"; } //displays this message if a word is more than 25 characters long
c = str.at(i); // returns the character at position i
if (! ( ( c >= 'a' && c <= 'z' ) || ( c >= 'A' && c <= 'Z' ) ) ) { //checks if the input word is contains characters other than the alphabet
cout<<str<<" is not a word!"<<endl; break;} //displays this message if user enters characters other than the alphabet
if (i == 0) { //check the first character of the input word
str[i]=toupper(str[i]); //converts the first character of the input word to uppercase
cout<<str<<" starts with letter "<<str[i]<<endl; } // prints the letter that the word starts with in capital letter
} cout<<"Enter a word: "; //prompts user to enter a word
cin>>str; //reads input word from user
}while(str!="#"); } //keeps prompting user to enter a word until the user enters #
int main() //start of the main() function body
{ string str; //declares a variable to hold a word
cout<<"Enter a word: "; //prompts user to enter a word
cin>>str; //reads input word from user
StartChar(str); } //calls function passing the word to it
Explanation:
The program prompts the user to enter a word and then calls StartChar(str) method by passing the word to the function.
The function StartChar() takes that word string as argument.
do while loop starts. The for loop inside do while loop iterates through each character of the word string.
First if condition checks if the length of the input word is greater than 25 using length() method which returns the length of the str. For example user inputs "aaaaaaaaaaaaaaaaaaaaaaaaaaa". Then the message limit exceeded is printed on the screen if this if condition evaluates to true.
second if condition checks if the user enters anything except the alphabet character to form a word. For example user $500. If this condition evaluates to true then the message $500 is not a word! is printed on the screen.
Third if condition checks if the first character of input word, convert that character to capital using toupper() method and prints the first letter of the str word in capital. For example if input word is "Computer" then this prints the message: Computer starts with the letter C in the output screen.
The program keeps prompting the user to enter the word until the user enters a hash # to end the program.
The output of the program is attached.