write pseudocode for a program that reads a name (such as harold james morgan) and then prints a monogram consisting of the initial letters of the first, middle, and last name (such as hjm).

Answers

Answer 1

pseudocode for a program that reads a name (such as harold james morgan) and then prints a monogram consisting of the initial letters of the first, middle, and last name is given below

What is Pseudocode

Pseudocode is a way of describing algorithms or processes in plain language, with a structure that resembles that of a programming language. It is used to explain the steps of an algorithm or process in a way that is easier for non-technical people to understand. Pseudocode can be used to plan out the structure of a program before actually writing the code.

PSEUDOCODE MONOGRAM

STEP-1        Read the name to name

STEP-2       declae an array mono to store monogram

STEP-3        assign thr first character of name to mono

STEP-4        use a loop till the end of name

STEP-5        check each character of name for a space. IF SPACE IS

found then append its nex character to mono

STEP-6       print mono

METHOD IN C++

void printMonogram(string name)

{

    int i=0,j=0;

    char mono[5]; //Delcare an array to hold the monograms

    mono[j++]=name[i]; //assign the first character of name to mono[0]

    //loop will continue till end of name

    for(i=1;name[i]!='\0';i++)

      if(name[i]==' ') //check for space

          mono[j++]= name[i+1]; //assign the character next to space into mono

    mono[j]='\0'      ; //convert mono to string

    cout<<endl<<"Monogram of "<<name<<" is "<<mono; //print the monogram

}

To know more about Pseudocode visit :

brainly.com/question/13208346

#SPJ4


Related Questions

assume you have found a usb memory stick in your work parking area. what threats might this pose to your work computer should you just plug the memory stick in and examine its content? in particular, consider whether each of the malware propagation mechanisms we discuss could use such a memory stick for transport. what steps could you take to mitigate these threats, and safely determine the contents of the memory stick?

Answers

The work system's confidentiality, integrity, and availability may all be threatened by the USB memory stick.each of the malware propagation mechanisms we discuss could use such a memory stick for transport.

It might include an executable virus or a macro virus-infected document that, when launched or opened, will allow the infection to spread. The work system's confidentiality, integrity, and availability may all be threatened by the USB memory stick.It might include an executable virus or a macro virus-infected document that, when launched or opened, will allow the infection to spread.It might include a harmful worm that can be launched automatically via the autorun feature or by taking advantage of a weakness when the USB stick is inspected.

Learn more about USB memory stick here:

https://brainly.com/question/29754046

#SPJ4

consider the following scenario: multiple client switches and routers have been set up at a small military base. the network team decided to implement terminal access controller access-control system plus (tacacs ), along with kerberos, and an external lightweight directory access protocol (ldap) service. what is the primary reason tacacs was chosen for this?

Answers

To make it possible for other network administrators to efficiently manage a large number of switches and routers on the local area network.

A Terminal Access Controller Access Control System Plus (TACTICS+) system was put in place by a network administrator (LAN). These components include: something you are aware of, like a PIN, password, or catchphrase; something you have, like a smart card or token; and something you know. anything that identifies you, such as a fingerprint or other bio metric. For remote contact with any server found within a UNIX network, the Terminal Access Controller Access Control System (TACTICS) authentication protocol is utilized. The admittance ticket is the subject of the first certification (known as the GT). After decrypting the original one, the ticket-granting service generates a new credential for the server that the user is requesting access to.

Learn more about Network administrators here:

https://brainly.com/question/28853373

#SPJ4

:

use a command to output the number of lines, words and file size of the readme.md file. how many lines are in the file according to this output?

Answers

The wc command can accept zero or more input FILE names. If no FILE is specified, or when FILE is -, wc will read the standard input. Two or three lines are there in file in output.

What is CAT command?

The cat command allows you to make new files and add content to them.

You can use filename1.txt and filename2.txt as test files to see how the other commands work.

Create the first file in a terminal window after opening it. As soon as the desired text is typed, the pointer shifts to a new line.

Hold down the Ctrl key and press d to exit the prompt and save the changes to the file. for the following file, repeat the procedure.

Run "cat filename1.txt" to view filename1.txt's contents using the cat command.

The cat command has the ability to append a file's contents to the end of another file. Use a double >> symbol in place of a single > sign.

To know more about cat command, visit:-

https://brainly.com/question/29886037

#SPJ4

Your client ell a taxable item and hip it to a cutomer that i out of tate. There i no ale tax agency et up for that tate. Quickbook

Answers

Your ability to charge sales tax in a destination state depends on the customer's address. No tax is applied if you don't have any connections to the state of the shipping address.

Is shipping considered taxable?Most of the time, if you send taxable things, all shipping costs are tax deductible. Additionally, shipping fees for a package containing only non-taxable items are exempt from taxation.Tax should be gathered for the state in where the seller is located if the buyer picks up the item at the seller's location. If the item is shipped to the buyer, tax is due in the state of delivery, whether it is the same state as the seller's location or not.Clearly state to the seller that the item is only intended for personal use. The majority of the time, import duties only apply to goods brought in for business or resale, not for personal or retail use.

To learn more about sales tax refer to:

https://brainly.com/question/30109497

#SPJ4

Write the method getLongestRun that takes as its parameter an array of integer values representing a series of number cube tosses. The method returns the starting index in the array of a run of maximum size. A run is defined as the repeated occurrence of the same value in two or more consecutive positions in the array. For example, the following array contains two runs of length 4, one starting at index 6 and another starting at index 14. The method may return either of those starting indexes. If there are no runs of any value, the method returns -1.

Answers

Reset the current run length to 0 if the two adjacent values are not equal. Return the maximum length run's starting index.

How can it be solved?

You will need to keep track of the current run length, the maximum run length, and the index from which the maximum run began (it should start at -1). You need to be careful not to go beyond the bounds because you are comparing one value to another that is adjacent. Set the start index and increase the current run length if you find two adjacent values that are equal. Reset the current run length to 0 if the two adjacent values are not equal. Return the maximum length run's starting index.

public class NumberCube

{

   public static int getLongestRun(int[] values)

   {

       // Complete this method

   }

   public static void main(String[] args){

       int[] values = {3, 5, 6, 6, 3, 6, 4, 4, 4, 2, 6, 4, 1, 1, 1, 1};

       int longestRunIdx = getLongestRun(values);

       if(longestRunIdx != 12){              

       } else {

          System.out.println("Looks like your code works well!");

       }

   }

}

Learn more about parameters visit :

https://brainly.com/question/29911057

#SPJ4

what two encapsulation protocols create a tunnel through which packets can travel to leave a routing domain in a software-defined network?

Answers

The two encapsulation protocols that create a tunnel through which packets can travel to leave a routing domain in a software-defined network are NVGRE and VXLAN.

Encapsulation protocols connect the link layer i.e. layer- 2 protocol with the network layer i.e. layer-3 protocol. Encapsulation protocols take information from a higher layer and add a header to this information, treating the higher layer information as data. NVGRE and VXLAN are two encapsulation protocols that create a tunnel through that data packets travel to leave a routing domain in a software-defined networ.

You can learn more about encapsulation at

https://brainly.com/question/29766999

#SPJ4

uma wants to create a name for the range showing the expenses for 2017. she types in exp2017 but excel rejects the name. what is the problem?

Answers

Choose Format > Move or Copy Sheet from the Home tab. Left-click to move the worksheet tab while holding down the Ctrl key.

In the Excel Name Manager dialog box, you may create, change, and remove defined names. These names can be used for constants, formulas, and ranges. It can be simpler to read and comprehend formulas when named ranges are used. Choose the desired range, taking note of any row or column labels. Choose Create from Selection under Formulas. Select the Top row, Left column, Bottom row, or Right column check box to indicate where the labels are located in the Create Names from Selection dialog box. Choose OK.

Learn more about worksheet here-

https://brainly.com/question/29376789

#SPJ4

finally, umoja-noble argues that getting more women in to software engineering, programming, and design will help address some of the issues she highlights. true or false

Answers

Because specific software is required in almost every industry, business, and function, software engineering is crucial. As time passes, it becomes increasingly crucial: if something breaks within your application portfolio, a prompt, effective fix must be made.

What characteristics does software code have?

Clear, concise, and simple-to-understand writing should be used when creating software. The organization, implementation, and design of the program code should all maintain simplicity.

Do software engineers put in a lot of overtime?

Typically, software engineers put in between 40 and 45 hours per week, or 8 to 9 hours per day. For startups or when deadlines are drawing near, longer hours might be necessary.

To know more about software engineering visit:-

brainly.com/question/13104683

#SPJ4

you have a recovery services vault named vault1 that has soft delete enabled. vault1 stores backups for the following azure resources: an azure virtual machine named vm1 an azure file share named share1 a sql server on azure virtual machine named sql1 which backups are protected by soft delete?

Answers

The backups which can be protected with the aid of using soft delete include: VM1, share1, and SQL1. A soft delete marks a document as not energetic or legitimate with out certainly deleting it from the database.

Why do we want soft delete?

Soft deletion is an operation wherein a flag is used to mark facts as unusable, with out erasing the facts itself from the database. Instead of deleting facts out of your database, that's a tough to get over operation, you upload metadata indicating the facts need to be taken into consideration deleted.

Is soft delete an excellent practice?

In summary, the use of a soft delete sample for your provider is usually a proper idea, however it comes with layout and implementation challenges. Make positive you recognize the "how" and "why" and take greater time to broaden and run check instances for every essential use case.

When need to use soft delete?

History monitoring and audit (e.g. for criminal reasons). Keeping reference integrity and keep away from cascade delete. You want “Graceful” delete such as a long-strolling commercial enterprise system can also additionally want facts that would be “deleted”, however nevertheless required for this specific system to finish.

To learn more about database visit:

https://brainly.com/question/29412324

#SPJ4

Other Questions
what were some of the major motivations for spain to colonize the americas? how did the conquistadors and catholic missionaries convince the church to support them? which equation represents these transformations of a cubic function? vertical reflection shift down 3 there is a heard of deer in a field that has an area of 6km^2 and a population of 54 deer. what is the population density of this herd of deer? For the reaction 2HNO3 + Mg(OH)2 Mg(NO3)2 + 2HO, how many grams of magnesium nitrate are produced from 9 grams of nitric acid, HNO3 ? What industry focuses more on working closely with the public than the artistry of food?Question 1 options:finance industryhospitality industrymarketing industryfarming industry Question:(a) What is the electric field strength due to a point charge of 2.4 at a position 8.6 cm away from the charge?(b) What is the magnitude of the electric force on a charge of 3.4 that is 8.6 cm away from the point charge in part a?(c) Draw a sketch of the two charges, from parts a and b, and indicate the direction of the electric force on the second charge due to the original point charge. a group of friends wants to go to the amusement park. they have $69.75 to spend on parking and admission. parking is $17.25, and tickets cost $17.50 per person, including tax. write and solve an equation which can be used to determine pp, the number of people who can go to the amusement park. Identify Laurens error Receiving payment of a portion of an accounts receivable will___ a. not affect total assets. b. increase liabilities. c. increase stockholders' equity d. decrease net income. a farmer wants to plant three rectangular fields so that the widths are the same. the areas of the fields, in square yards, are given by the expressions 12x^3y , 6xy^4 , 21xy. what is the greatest possible widths of the fields if x=3 and y=2. the study of statistics can be defined as (select all that apply): group of answer choices the language of data the art and science of getting information from data the study of collecting, analyzing, presenting, and interpreting data the ratio of the rate of diffusion of an unknown gas to oxygen is 0.85. what is the molar mass of the unknown gas jane johnson was a famous rock star but retired 20 years ago and withdrew from the public eye. while she was a musician, she stole a very valuable diamond ring from another musician. she quickly returned the diamond, was not arrested for theft, and only her brother knew about the incident. last week, spy magazine published an article revealing the theft. johnson sued spy magazine for private facts. what will be the result of the suit? a police officer stops a motorist who is driving erratically and notices a bag of white powder on the front seat of the car that he suspects contains heroin. the officer brings the bag to you, a forensic scientist in the local crime lab. name one screening test that you might perform to determine the presence of heroin. assuming the powder tests positive for heroin, what should you do next? which statement is true about the chemical elements found in living things? question 5 options: only haploid cells contain hydrogen and carbon unicellular organisms have different types of elements from multicellular organisms. animal cells and plant cells contain very different elements. all cells contain the elements carbon, nitrogen, hydrogen, and oxygen. If the line through the points (1,2) and (1,a) is parallel to 6x+2y=-2, what is the value of a? A student spends $54.20 on school supplies at a store where the sales tax is 8%. what is the total cost of the supplies? **round to the nerest hundreth's place** an infant has noncommunicating hydrocephalus, and a ventriculoperitoneal shunt is inserted. which nursing intervention would the nurse implement for the infant during the initial postoperative period? The Karson Transport Company currently has net operating income of 503,000 and pays interest expense of 191,000 . The company plans to borrow 1.15 million on which the firm will pay 11 percent interest. The borrowed money will be used to finance an investment that is expected to increase the firm's net operating income by 408,000 a year. in a population of seals in the arctic ocean, the total population is 1,500 seals. the birth rate of the seal population is 12/100, and the death rate is 8/100. how many seals were added to the population in one year?