Perl program, Programming Languages

Input to be in the form of a string of less than 256 characters. Assume that this character string (record) can only be of the form:

Last Name, First Name, Box number, City, State, zip code.

The test file name, with any number of records, is C:\NameAndAddresses

Use a regular expression to remove end-of-line characters, make first letter of the first and last names, City and State a capital letter if it is lower case, and the remainder of the name changed (if necessary) to lower case. You may use simple regular expression, and process the string multiple times, or you may use a more complex one only once.

Use split(), based on the coma, to split the final string into as needed below. Then write to the screen, in tabular form:

Last Name
First Name
Box
City, State Zip

This is known as, "cleaning up the data," for future processing. Unfortunately, when date items are inconsistent, they may cause trouble. You may use any combination of scripts you like except that the core processing (regular expressions and splitting) must be done in Perl.

Posted Date: 2/25/2013 12:21:09 AM | Location : United States







Related Discussions:- Perl program, Assignment Help, Ask Question on Perl program, Get Answer, Expert's Help, Perl program Discussions

Write discussion on Perl program
Your posts are moderated
Related Questions
specify the function of the instruction and also specify whether its right or wrong-: (5) 1) MOV [BX],AX? Register Indirect addressing 2) MOV CX,[BX+DI]?Base plus index add

i have to make a program that encrypt a text to numbers, i don''t know what is wrong in my code, the example of what i need: text: hi >> number: 17 23

do you solve questions of assigments?

i''ve a problem with rendering a page with django templates

Difference between java and j2ee programming In the basic form, the phrase java is placed as a selection terminology. On the other hand, the phrase J2EE is placed as a renderin

Question: (i) All Security authentication mechanism that run on the TRU64 Unix Operating system run under the Security Integration Architecture (SIA ) layer. Explain with di

Determine the address accessed by each of the following instruction if DS=1100H, BX=0200H, LIST=0250H AND SI=0500H-: 1) MOV LIST[SI],EDX?0250+0500+11000=11750 2

Implement the Prim's algorithm with array data structure as described in slide 12 of the file 04mst.ppt. Your program should have a runtime complexity of O(n2) and should be as eff

Abstraction hierarchy of mechanisms Given  the light-sensitive the motor and resistor,  we could  find  several  ways  of interconnecting them, using bits of ceramic and metal

SailDublin Ferry provides ferries to mainland Britain, Europe and America. Having observed the success of Irish ferries and Stennaline online booking system; SailDublin ferry has d