[C++] 4.17 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Done", "done", or "d" for the line of text. Ex: If the input is: Hello there Hey done then the output is: ereht olleH yeH

Answers

Answer 1

The program illustrates the use of string manipulations.

String manipulation involves carrying out several operations (such as splitting and reversing of strings).

The program in C++ where comments are used to explain each line is as follows:

#include <bits/stdc++.h>

using namespace std;

int main(){

   //This declares a string variable

string str;

//This gets input for the variable

getline(cin, str);

//The following is repeated, until the user inputs "Done", "done" or "d"

while(str != "Done" && str !="done" && str !="d"){

    //This reverses the string

    reverse(str.begin(), str.end());

    //This prints the reversed string

    cout << str<<endl;

    //This gets another input

    getline(cin, str);

}  

return 0;

}

At the end of each loop, the reversed string is printed.

See attachment for sample run

Learn more about similar programs at:

https://brainly.com/question/24833629

[C++] 4.17 LAB: Print String In Reverse Write A Program That Takes In A Line Of Text As Input, And Outputs

Related Questions

Manufactured computers and cell phones are part of which industry? Electronics Chemicals Machinery Metal products

Answers

Answer:

The correct answer is the electronic industry

Hope this helps

Answer:

Electronics

Explanation:

To create a cell reference in another spreadsheet you must need to start with _______ sign.
a. = = b. & c. = d. $

Answers

Answer:

You need to start with c) =

What is the best Computer in the World?
Wrong answer will be reported!

Answers

Dell XPS Desktop Special Edition is the best Computer in the World

▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪

Cutest Ghost

▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪

how to calculate 3 X (50 + 40) ÷ 5 on excel 2016

Answers

Answer:

I think this might help, don't know much of this

Explanation:

How do you calculate 3.5 increase in Excel?

How To Increase a Number By a Percentage. If want to calculate a percentage increase in Excel (i.e. increase a number by a specified percentage), this can be done by simply multiply the number by 1 + the percentage increase. - which gives the result 60.

Explanation:

I am not sure what your problem is.

you don't know how to enter a formula into an Excel cell ? or you don't know how to combine the content of cells into one result in another cell ? or ... ?

but just answering literally this one-line-problem-definition

you click into an empty cell and type

=3*(50+40)/5

and press return.

and the cell will show you the result. 54

PYTHON- Credit card numbers follow a standard system. For example, Visa, MasterCard, and Discover Card all
have 16 digits, and the first digit serves to indicate the card brand. All Visa cards start with a 4;
MasterCard cards always starts with a 5; and Discover cards start with a 6. Write out a program that
prompts for a credit card number and emits the name of the brand. If the card brand cannot be
determined, the program should output "Unknown Card"

Answers

Answer:

ccard = input("What is your credit card #: ")

if ccard[0] == 4:

   print("Visa")

elif ccard[0] == 5:

   print("MasterCard")

elif ccard[0] == 6:

   print("Discover")

else:

   print("Unknown Card")

How can you legally use the search engine

Answers

To perform a search, you'll need to navigate to a search engine in your web browser, type one or more keywords, also known as search terms, then press Enter on your keyboard.

After you run a search, you'll see a list of relevant websites that match your search terms. These are commonly known as search results. If you see a site that looks interesting, you can click a link to open it. If the site doesn't have what you need, you can simply return to the results page to look for more options.

Most browsers also allow you to perform a web search directly from your address bar, although some have a separate search bar next to the address bar. Simply type your search terms and press Enter to run the search.

Hope my answer helped u :)

Briefly describe the following advanced database systems and applications: object-relational databases, spatial databases, text databases, multimedia databases, the World Wide Web

Answers

Object-relational databases (ORD) are a type of database management system (DBMS) designed based on an object-oriented database model. The database framework and query language of ORD support objects, classes, and inheritance.

Spatial database is a kind of database designed for keeping and querying data that depicts objects specified in a geometric area.

Text database is a type of database designed to handle the maintenance of huge text compilation, then create quick and valid access to it.

Multimedia database is a type of database that saves multimedia data, including text, images, graphic objects, animation, audio, video, etc.

The World Wide Web is an information system that connects several documents through hyperlinks and can be accessed or retrieved through the internet. It is usually termed as web.

Hence, in this case, it is concluded that this advanced database and applications are vital in the modern world.

Learn more here: https://brainly.com/question/13044551

measurement, analysis and iteration forms which stages of the strategy and planning process​

Answers

Answer:

science is what it is that science

Explanation:

2) RMU divides students into house groups based on the month that they were born in.
born in May, June, July or August are put into Bridge House. All other students are
Students born in January, February, March or April are put into Ship house. Students
put into Anchor house.
Design a flowchart that will:
. Ask the user to enter a number (1 to 12) relating to their birth month
Decide which house they are in and print this out.
Keep a running total of how many students are in each house.
Repeat the above for 20 students.
When 20 students have entered their details, print out how many students are in
each house

Answers

describe your childhood

How do you setup Synapse x? Please explain each step

Answers

1. You download the compressed file from the website

2. Create a new folder on your desktop, then copy the file location.

3. Right click on the compressed file that contains Synapse X

4. Select “Extract all,” then paste the file location of the folder you wish to keep it in, and click “Extract.”

5. Make sure Windows Real-time Protection is OFF before trying to run the .exe file, otherwise your OS will automatically delete the .exe file then you'll have to delete all the contents from your folder and restart from step 3.

You can find the Windows Real-time Protection option by going to the Windows search bar and typing "Virus and Threat Protection,"

then clicking on the "Manage Settings" button underneath the "Virus & threat protection" tab, then disabling Real-time Protection.

It will give you a prompt warning you that your PC could be open to threats, however as long as if you're not downloading shady things from shady sites, and you're not discoverable on your Wi-Fi network, you'll be fine without it.

Keep in mind, Real-time Protection automatically turns itself back on after a set amount of time of it being disabled. So you'll have to disable it every time you wish to use Synapse X.

6. Once you've done all of that, just follow the prompts that Synapse X gives you, give your whitelist code, log in, and you're set.

Question 3 A benefit of using online tools is that: O you have more privacy because the information is stored locally on your computer. they are accessible anywhere you have the internet. it is the only way to utilize essential business software. everything is stored in the same place. Question 4​

Answers

Answer:

False, it doesn't mean that if a application is stored on a device, it can't steal any data. Take cloud service for example it is not locally stored on your computer it is stored on the huge amount of databases, meaning that the service provider could steal the files or delete them without consent.

To change the type of tab showing in the Tab Selector Box, which of the following should be done? Right-click on the Tab Selector Box Click on the Ruler Right-click on the Ruler Click on the Tab Selector Box

Answers

Literally, a tab selector presents to the user varieties of tab marker options.

To change the type of tab, you simply (d) Click on the Tab Selector Box

The tab selector is situated at the left of the ruler, and there are four basic types of tabs.

Left-alignedCenteredRight-alignedDecimal-aligned.

To change between these tabs, you simply click on the tab selector.

Hence, the correct option to change the type of tab is option (d)

Read more about tab at:

https://brainly.com/question/14459387

Where do you find the option to Restore a Davinci Resolve Archive project file?

Answers

With your project fully archived, you need to restore it to use in Resolve. Back in the project window, right-click anywhere, and hit “restore.” Navigate to the archived project folder, and select open. Resolve will then import the project, bins, and media exactly as you left them prior to archiving

Identify the commands for the following list operations.

Check that there are no items in a list
Insert 10, 50, 30, 40, and 20 at the end of the list
Arrange the items in ascending order

a. IsEmpty(list)
Prepend(list, 10)
Prepend(list, 50)
Prepend(list, 30)
Prepend(list, 40)
Prepend(list, 20)
Sort(list)

b. Search(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
Sort(list)

c. IsEmpty(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
GetLength(list)

d. IsEmpty(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
Sort(list)

Answers

Answer:

D

Explanation:

the answer is D because it does exactly what the problem says.

What is the key benefit of the least privilege approach
to security?
o It results in task being completed quicker
o It minimises the level of compromise in the event of a security breech
O Ensures modular, reusable output

Answers

Answer:

2nd

Explanation:

it has a low security

List and Explain the programming Languages required to start working in Apple.

Answers

Answer:

JavaScript, Java, and C++ are obvious additions. Mastering these programming languages can help you land a secured job at Apple. If you pay attention to the popularity of programming language skills, Python is an immensely popular generalist programming language across all leading tech companies

I have problems in compiling this Java code:
class SumMatrix{
public static void main(String[] args){
matrixAdd({{1;2}; {5;6}}; {{8;7}; {3;4};});}
public static double[][] matrixAdd(double m1[][], double m2[][]){
int i,j;
double sum[][];
for (i=1;i<=2;i++){
for(j=1;j<=2;j++){
sum[i][j]=m1[i][j]+m2[i][j];
}}
for (i=1;i<=2;i++){
for(j=1;j<=2;j++)
return sum[i][j];
}
}
}
I get this errors:

Answers

Not my fault double sun you should restart your computer for it work

Declare an eight by eight two-dimensional array of strings named chessboard.

Answers

Answer:SOLUTION:  

String [][] chessboard = new String [8][8];

A printer is considered to be in the category of
a. software
Selected:b. hardware
c. operational system
d. equipment

Answers

A printer is considered to be in the category of b. hardware.

What is hardware?

Computer hardware contains the physical characteristics of a computer, such as a case, central processing unit (CPU), random access memory (RAM), monitor, mouse, keyboard, computer data storage, pictures card, sound card, speakers, and motherboard.

Hardware directs to the physical components of a computer. Also directed to as the machinery or the equipment of the computer. Examples of hardware in a computer exist the keyboard, the monitor, the mouse, and the processing unit However, most of a computer's hardware cannot be caught; It's inside the computer case.

A printer exists as an external hardware output device that brings the electronic data stored on a computer or other device and develops a hard copy.

Hence, A printer is considered to be in the category of b. hardware.

To learn more about hardware refer to:

https://brainly.com/question/24370161

#SPJ2

Describe briefly three applications/systems that can be used to add digital signature to a document?

Answers

Answer:

Applications of Digital Signature

To send and receive encrypted emails, that are digitally signed and secured.

To carry out secure online transactions.

To identify participants of an online transaction.

Explanation:

Create a set of functions that compute the mean, median, and mode of a set of
numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers
provides a simple algorithm for calculating the median for a set of numbers. Each
Function should expect a list of numbers as an argument and return a single number
Each function should return O if the list is empty. Include a main function that tests
he three statistical functions with a given list. Do not use the statistics or math
nodules to create the functions. The functions must be created by you.

Answers

Refer to the attachment.

Language used=Python

Answer:

Create a set of functions that compute the mean, median, and mode of a set of

numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers

provides a simple algorithm for calculating the median for a set of numbers. Each

Function should expect a list of numbers as an argument and return a single number

Each function should return O if the list is empty. Include a main function that tests

he three statistical functions with a given list. Do not use the statistics or math

nodules to create the functions. The functions must be created by you.

When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
Select the best option.

At every worksite


Only when GFCIs are in place


Only when working around power lines


When an employer does not use GFCIs

Answers

Answer:

Only when working around power lines

Explanation:

Assured Equipment Grounding Conductor Program (AEGCP) is applicable mainly in sites dealing with power. Therefore, the most appropriate worksite to have Assured Equipment Grounding Conductor Program is when  working around power lines.

Answer:

When an employer does not use GFCIs

Explanation:

The roots of the quadratic equation ax² + bx + c = 0, a ≠ 0 are given by the following formula:

Quadratic Formula
In this formula, the term b² - 4ac is called the discriminant. If b² - 4ac = 0, then the equation has a single (repeated) root. If b² - 4ac > 0, the equation has two real roots. If b² - 4ac < 0, the equation has two complex roots.

Instructions
Write a program that prompts the user to input the value of:

a (the coefficient of x²)
b (the coefficient of x)
c (the constant term)
The program then outputs the type of roots of the equation.

Furthermore, if b² - 4ac ≥ 0, the program should output the roots of the quadratic equation.

(Hint: Use the function pow from the header file cmath to calculate the square root. Chapter 3 explains how the function pow is used.)

Format your output with a decimal precision of 2.

Answers

Hope it helps. Thanks.

Several scholarship opportunities exist to assist students in pursuing STEM-related degrees.

True
False

Answers

True true true and always true.
The answer is true!! Have a great day!

demons I shall be your eternal nightmare

Answers

What does this mean??? Should I be scared right now? Just kidding I’m not scared. Hope you’re not trying to cause harm. Hope you have a positive day and happy Thanksgiving to you and your family

What is Smart Content Profits all about?

Answers

Answer:

Smart Content Profits is a ground-breaking app that builds WordPress sites on auto-pilot. Just add in a domain and let this system do the rest.

Answer: A friendly system that lets you build content sites very quickly.

Explanation:

What type of data causes concern for institutions or business when collected, stored, and not secured properly?
Advertising information
Personal identifying Information
User interface information
Marketing information

Answers

Answer:

user interface information

Explanation:

This is because it exposes the infrastructure of the business or institution which includes the layout of plans and future perspective

The type of data that causes concern for institutions or business when collected, stored, and not secured properly is Personal identifying Information.

What is  Personal identifying Information?

Personal Identifiable Information (PII) is known to be any depiction of information that allows the identity of a person to whom the information is given to be reasonably taken by direct or indirect method.

Therefore, The type of data that causes concern for institutions or business when collected, stored, and not secured properly is Personal identifying Information as it can lead to issues and lawsuit if tampered with.

Learn more about Personal Information from

https://brainly.com/question/25228524

#SPJ6

a printer gives hard output whereas a screen gives_ output​

Answers

Answer:

Explanation:

Easy,soft copy output as the output given by a screen only can be seen but can't be touched

PROCEDURE: Therapeutic infusion of saline solution with 5% dextrose IV, 500 ml for dehydration, lasting 48 minutes. what is the right cpt code and hcpcscode?

Answers

Answer:

no

Explanation:

yes becouce not arance the name of fegeur spech

Jacob is a network technician who works for a publishing company. He is setting up a new hire's access permissions. The new hire, Latisha, is an editor. She needs access to books that have been accepted for publication but are in the review stage. Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. What principle is Jacob applying

Answers

If Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. The principle that Jacob is  applying is: The principle of least privilege

Principle of least privilege is a principle that help to protect confidential or sensitive information from unauthorized use.

Which means that a user is only authorized  or given the permission to  access least information or information  which the user only need to carryout their assignment or tasks.

Principle of least privilege is important as it help to minimize or limit the damages that can arise due to unauthorized usage.

Inconclusion  if Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. The principle that Jacob is  applying is: The principle of lease privilege.

Learn more here:

https://brainly.com/question/14132911

Other Questions
Help stuck on this question Sarah purchased tickets to a park and paid for parking.The tickets cost 15.95 each and the parking cost 8 $. Write an equation to represent the total cost. i need answer please Mt ngi tc dng ln mt sn mt p sut 1,7.104N/m2. Din tch ca bn chn tip xc vi mt sn l 0,03m2. Trng lng ca ngi l. Please help me out with this.45% of the rooms in a hotel are booked. If 36 rooms are booked, how many rooms are in a hotel altogether? Which famous Bostonian actually has twodifferent gravestones at Granary Cemetery,one from the time of his death and one from amemorial in his honor?A. Samuel AdamsB. Paul RevereC. John Hancock an international magazine is organising a competition 2 1/7 x 3 1/3 Answer with a mixed number in simplest form Someone pls help me I will make you as brain According to the passage, which of the following is true about the Third Amendment?AIt has been the basis of many Supreme Court decisions.BIt is a continuation of the ideas in the First and Second Amendments.It was a response to a law that allowed British soldiers to stay in colonists' homeD DIt is no longer a part of the Bill of Rights.Right answer gets brainliest!! A student takes out an emergency loan for tuition, books, and supplies. The loan is for $900 with an interest rate of 6%. How much interest does the student pay if the loan is paid back in 60 days Please help me about this question What is Einstein's theory of relativity? what type of bonds exists between neighboring water molecules? what is Density?: the mass of an object the volume of 1 unit of mass. (e.g. the volume of 1 g) the mass of 1 unit of volume. (e.g. the mass of 1 cm3) the volume of an object explain the process of choosing and appointing a supreme court justicepls help this is due today!! 100 points!! helpppwhat is the slope? Bina Co. purchased a machine on January 1st for $15,000 and estimates it will use the machine for three years with a $3,000 salvage value. Nina estimates that they will produce 1,500 units during year one, 1,000 units during year two, and 1,250 units during year three. Using the units-of-production method, compute the machine's second year depreciation expense. I dont know pls help I need it quick NEED HELP ASAP *REAL ANSWERS PLS*Solve the inequality: 22 3