Match a name containing a capital letter followed

Assignment Help Computer Engineering
Reference no: EM132092895

PERL - Simple PERL scripts to do the following:

Write the following regular expressions. Test them with a script that reads a line from STDIN and prints "yes" if it matches and "no" if not.

1. Match a name containing a capital letter followed by three lower case letters

2. Match a line that contains in it at least 3 - 15 characters between quotes (without another quote inside the quotes).

3. Replace every digit in a line of text (containing digits) with a #, and print the result.

4. Replace any number of white space charactres (new-line, tab or space) by a single space.

5. Remove all appearances of "is" from a line of text (both lowercase and uppercase letters), and print it.

Reference no: EM132092895

Questions Cloud

Write an algorithm for the following input two numeric value : If the second is larger than the first, perform a real division. Otherwise, perform an integer division.
How do you call a subroutine called myprogram : Write the code to assign "Dean", "Sam", "Castiel", "Bobby", and "Charlie" to the Perl equivalent of an array.
Write a script that prompts the user for a date : Use the code that reads a single character to ask the user to press a key indicating whether they want to compare to today or another date.
Could a shortage of paid code checkers mean there might : Because OpebSSL is open source, could a shortage of paid code checkers mean there might be more errors like Heartbleed? Why?
Match a name containing a capital letter followed : Write the following regular expressions. Test them with a script that reads a line from STDIN and prints "yes" if it matches and "no" if not.
Perform a simulation of a dc motor control system : Tasks include position control and speed control. Transfer functions of motor, controller, and sensor will be given to you.
Create a hash and a reference to that hash : Create a hash and a reference to that hash. To do so, prompt the user for hash keys and values.
Display the contents of that file and line by line : Modify the last program you wrote to incorporate the die statement to handle file open errors. You can use a custom message if you want.
What are the essential benefits of using a qfd approach : What are the essential benefits of using a QFD approach to product design? How are CAs prioritized?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Listing each prompt that is used in this program.

Write down a new program in pseudo-code, it should input-and calculate the average of 5 numbers entered.

  What is ambiguity in single inheritance

What is Ambiguity in single inheritance - create a system for Administrator and Employee in which admin performs and operations on add, search, edit, view, delete and calculate the each salary of peoples and employee only view on profile.

  Write routine to display pie chart with appropriate labeling

write a routine todisplay a ple chart with appropriate labeling. lnput to the routine is to include a data set giving the distribution of the data.

  By using a personal computer as a base model write a c

using a personal computer as a base model write a c syntactically correct class definition demonstrating composition.

  Define its importance to developers

Based on the Businessline (2007) article, describe open source software and describe its importance to developers. Is all Java code open source? What effect may this situation have on distributing graphic-based interfaces.

  Write a Cpp method to remove a node from an AVL tree

Write a C++ method to remove a node from an AVL tree, following the steps outlined in the text.

  Questionyou work for a hospital and most tasks in your

questionyou work for a hospital and most tasks in your organization are performed manually. the organization has

  Identify and list all primary functional requirements

COIT 20248: Information Systems Analysis and Design - Identify and list all primary functional requirements for the system in the case study

  Analysis of cybersecurity occurrence and data defense

Identification of cybersecurity tenets that were violated and rationale of cause

  How the two algorithms differ in their exploration

E28: Mobile Robotics - Fall 2015 - HOMEWORK 8. Keep the default start and goal state. Run A* search (use the Euclidean heuristic). Then, run Dijkstra's algorithm (you should allow diagonal movement) and compare the results. Explain how the two algo..

  Cloud computing security policy

Cloud Computing Security Policy

  Explain the challenges which an organization will face when

question 1 describe the challenges that an organization will face when changing business processes and how information

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd