Print the name backwards

Assignment Help Basic Computer Science
Reference no: EM131369562

Question:

Write just one program as follows, all code in the main function:

  • Prompt the user to enter his/her full name (see sample output).
  • Use awhile loop to print the name backwards.
  • Useslicing to make a new string in the format lastname, firstname. Print the new string.
  • Determine the number of upper and lower case letters in the name. Print both totals.
  • Assign "You have to be vewy, vewy twicky to twap a wascally wabbit" to another new string.
  • Use a methodto correct Elmer Fudd's bad spelling above. Print the corrected string.

SAMPLE OUTPUT

Enter your full name John Hancock

Backwards, your name is kcocnaH nhoJ

Alphabetically, your name is Hancock, John

Your name has 2 upper case letters and 9 lower case letters

You have to be very, very tricky to trap a rascally rabbit

Reference no: EM131369562

Questions Cloud

List and describe three types of training methods : There are several instructional methods and activities that can be used to deliver training. As a trainer, you should have a broad awareness of different kinds of instructional methods so that you can recommend and utilize the most appropriate soluti..
Key players-departments in the organization : So if you were doing this network design for a company and you did not have all the details above yet, where would you start? Would you begin by interviewing the key players/departments in the organization?
Would you expect the revenue management techniques : Would you expect the revenue management techniques of charging differential prices based on target customers' willingness to pay for change order respon-siveness, delivery reliability, schedule frequency, and so forth to be more effective.
Print the name backwards : Prompt the user to enter his/her full name (see sample output). Use awhile loop to print the name backwards. Useslicing to make a new string in the format lastname, firstname. Print the new string.
Discuss the challenges in opportunity for improvements : Per the textbook, to eliminate or reduce non-value-added work is a core step in improving profitability or efficiency of the business process. Give your opinion on whether or not you agree or disagree with this statement and include one (1) exampl..
Describe the training delivery method : Consider your best workplace learning experience. Describe the training delivery method(s) used and identify the factors that contributed to making it an effective workplace learning experience. Then, consider your worst workplace learning experience..
What should you learn about countrie you are considering : When selling a project to another countrie in this case i am talking about singapore. What should you learn about the countrie you are considering? Would you make contact or outsource this part of the project to another country?
What is probability that the device will work when needed : The reliabilities of the components are 0.96, 0.91, and 0.80. What is the probability that the device will work when needed?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Perform a risk assessment of teller-s computer

Tellers at each branch use a four-digit numeric password, and each teller's computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.

  Pointers to pointers is a term used to describe

Pointers whose contents are the address of another pointer.

  Using sequential logic, counters and shift registers propose

using sequential logic, counters and shift registers propose a more complex system utilizing some of the more complex sub systems. example a motion acitavated light. Needs to be somthing other then a light example like motors or somthing

  Is snort an hids or an nids

1. Is Snort an HIDS or an NIDS? 2. How many sensors does Snort use? 3. What does a preprocessor do?

  Finding and fixing errors in programs

Finding and fixing errors in programs.Finding and fixing errors in programs.

  Find the thermal efficiency of the cycle

Reconsider Problem 9-60. Using EES (or other) software, study the effect of varying the compression ratio from 10 to 18. For the compression ratio equal to 14, plot the T-s and P-v diagrams for the cycle.

  At what value of mc will there be no exports

Increase MC from 100 to 200 and determine the impact on the cartel's Q, P, CS, PS, DWL, and export loss. What happens to each of these variables as MC rises? Be sure to click the Perfect Competition and then Cartel option button to refresh the dat..

  Procedure to charge lower rate for ongoing support services

Create complete, written procedure for New Century Health Clinic maintenance change requests. Include suitable forms with procedure.

  Prepare presentation on a brief history of personal computer

Prepare a presentation on A Brief History of the Personal Computer. A PowerPoint Presentation (2013) made of 8-10 slides based on the topic. Please make sure you save it on a flash drive/usb. You will have 3 minutes to present it.

  What does the memory model of a microcontroller show

What does the memory model of a microcontroller show? Discuss the reasons for different types of memory such as RAM, EEPROM, and FLASH used in HCS12.

  Additional web resources for telecommunication-network

You may search these questions or part of them on the web resource links available under "Additional Web Resources for Telecommunication & Network Security.pdf". If you do so, you must provide the reference to the resource as well as cite in your ..

  Continuously improve the bc process

Discuss the two System/network threats: Worms, Port Scanning, and Denial of Service. Suggest countermeasures to these threats. Describe the methods used to continuously improve the BC process.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd