SlideShare a Scribd company logo
1 of 1
Download to read offline
i safari File Edit View History Bookmarks Window Help 67% D. Thu 10:12 PM
azybooks.zyante.com 0 UC Riverside Buckys C++ P Chegg Study Chegg.com Please Help, E...
Please Help, E... CS 010/10v 1... Strings: Mem.. Strings - YouT Branching- C 4.7 PROGRAM 4
(part 1): Text message decoder VERIFY EMAIL | × .6 LAB 4: Loops-Replacing cha characters
4.7 PROGRAM 4 (part 1): Text message decoder (1) Use getline) to get a line of user input into
a string. Output the line. Ex: Enter text: IDK if I'1l go. It's my BFF's birthday You entered:
IDK if I'1l go. It's my BFF's birthday (2) Extend to search the string (using find0) for common
abbreviations and print a list of each found abbreviation along with its decoded meaning. Ex
Enter text: IDK if I'1l go. It's my BFFs birthday You entered: IDK if I'1l go. It's my BFF s
birthday BFF: best friend forever IDK: I don't know Support these abbreviations: BFF -best
friend forever IDK--Idon't know JK -- just kidding TMI- too much information ·TYL-talk to you
later Lab Submission 4.7.1: Sion 4.7.1: PROGRAM 4 (part 1): Text message decoder C++
Spaces: 1 20
Solution
str=input('enter text :')
print 'you entered ',str
if(str.find('BFF')!=null):
print 'BFF:best friends forever '
if(str.find('IDK')!=null):
print 'IDK: I dont know '
if(str.find('JK')!=null):
print 'JK : just kidding '
if(str.find('TMI')!=null):
print 'TMI : too much information '
if(str.find('TTYL')!=null):
print 'TTYL : talk to you later'

More Related Content

Similar to i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf

Recent developments in_text_steganography
Recent developments in_text_steganographyRecent developments in_text_steganography
Recent developments in_text_steganography
Rubab Rizvi
 
Threading Is Not A Model
Threading Is Not A ModelThreading Is Not A Model
Threading Is Not A Model
guest2a5acfb
 
Introduction to c programming
Introduction to c programmingIntroduction to c programming
Introduction to c programming
Alpana Gupta
 
Segmenting dna sequence into words
Segmenting dna sequence into wordsSegmenting dna sequence into words
Segmenting dna sequence into words
Liang Wang
 

Similar to i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf (16)

Huffman analysis
Huffman analysisHuffman analysis
Huffman analysis
 
Recent developments in_text_steganography
Recent developments in_text_steganographyRecent developments in_text_steganography
Recent developments in_text_steganography
 
Language Sleuthing HOWTO with NLTK
Language Sleuthing HOWTO with NLTKLanguage Sleuthing HOWTO with NLTK
Language Sleuthing HOWTO with NLTK
 
Threading Is Not A Model
Threading Is Not A ModelThreading Is Not A Model
Threading Is Not A Model
 
Erlang session1
Erlang session1Erlang session1
Erlang session1
 
Near Duplicate Document Detection: Mathematical Modeling and Algorithms
Near Duplicate Document Detection: Mathematical Modeling and AlgorithmsNear Duplicate Document Detection: Mathematical Modeling and Algorithms
Near Duplicate Document Detection: Mathematical Modeling and Algorithms
 
Introduction to c programming
Introduction to c programmingIntroduction to c programming
Introduction to c programming
 
Tricks in natural language processing
Tricks in natural language processingTricks in natural language processing
Tricks in natural language processing
 
Python slide
Python slidePython slide
Python slide
 
Segmenting dna sequence into words
Segmenting dna sequence into wordsSegmenting dna sequence into words
Segmenting dna sequence into words
 
Scala 3 Is Coming: Martin Odersky Shares What To Know
Scala 3 Is Coming: Martin Odersky Shares What To KnowScala 3 Is Coming: Martin Odersky Shares What To Know
Scala 3 Is Coming: Martin Odersky Shares What To Know
 
RDataMining slides-text-mining-with-r
RDataMining slides-text-mining-with-rRDataMining slides-text-mining-with-r
RDataMining slides-text-mining-with-r
 
Workshop on MATLAB and SIMULINK
Workshop on MATLAB and SIMULINKWorkshop on MATLAB and SIMULINK
Workshop on MATLAB and SIMULINK
 
Elements of Text Mining Part - I
Elements of Text Mining Part - IElements of Text Mining Part - I
Elements of Text Mining Part - I
 
Word chains
Word chainsWord chains
Word chains
 
Lecture 10 compiler i
Lecture 10 compiler iLecture 10 compiler i
Lecture 10 compiler i
 

More from archanaemporium

Identify a article about a communicable or noncommunicable disease i.pdf
Identify a article about a communicable or noncommunicable disease i.pdfIdentify a article about a communicable or noncommunicable disease i.pdf
Identify a article about a communicable or noncommunicable disease i.pdf
archanaemporium
 
I dont know what is wrong with this roulette program I cant seem.pdf
I dont know what is wrong with this roulette program I cant seem.pdfI dont know what is wrong with this roulette program I cant seem.pdf
I dont know what is wrong with this roulette program I cant seem.pdf
archanaemporium
 
How can Internet technologies be involved in improving a process in .pdf
How can Internet technologies be involved in improving a process in .pdfHow can Internet technologies be involved in improving a process in .pdf
How can Internet technologies be involved in improving a process in .pdf
archanaemporium
 
Hypothesize a way for a virus to evade a host defense & then devise .pdf
Hypothesize a way for a virus to evade a host defense & then devise .pdfHypothesize a way for a virus to evade a host defense & then devise .pdf
Hypothesize a way for a virus to evade a host defense & then devise .pdf
archanaemporium
 
Haploid. After is complete, the resulting gametes are haploid. This m.pdf
Haploid. After is complete, the resulting gametes are haploid. This m.pdfHaploid. After is complete, the resulting gametes are haploid. This m.pdf
Haploid. After is complete, the resulting gametes are haploid. This m.pdf
archanaemporium
 
FTP and TFTP are primarily file transfer protocols. What is the main.pdf
FTP and TFTP are primarily file transfer protocols. What is the main.pdfFTP and TFTP are primarily file transfer protocols. What is the main.pdf
FTP and TFTP are primarily file transfer protocols. What is the main.pdf
archanaemporium
 
DOES NOT NEED TO BE ANSWERED UNTIL NOV 13thWords AssignmentRober.pdf
DOES NOT NEED TO BE ANSWERED UNTIL NOV 13thWords AssignmentRober.pdfDOES NOT NEED TO BE ANSWERED UNTIL NOV 13thWords AssignmentRober.pdf
DOES NOT NEED TO BE ANSWERED UNTIL NOV 13thWords AssignmentRober.pdf
archanaemporium
 
Discuss in detail how two different Progressive reformers tackled th.pdf
Discuss in detail how two different Progressive reformers tackled th.pdfDiscuss in detail how two different Progressive reformers tackled th.pdf
Discuss in detail how two different Progressive reformers tackled th.pdf
archanaemporium
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
archanaemporium
 

More from archanaemporium (20)

Identify a article about a communicable or noncommunicable disease i.pdf
Identify a article about a communicable or noncommunicable disease i.pdfIdentify a article about a communicable or noncommunicable disease i.pdf
Identify a article about a communicable or noncommunicable disease i.pdf
 
I dont know what is wrong with this roulette program I cant seem.pdf
I dont know what is wrong with this roulette program I cant seem.pdfI dont know what is wrong with this roulette program I cant seem.pdf
I dont know what is wrong with this roulette program I cant seem.pdf
 
I know that water molecules attract each other, but why do water mol.pdf
I know that water molecules attract each other, but why do water mol.pdfI know that water molecules attract each other, but why do water mol.pdf
I know that water molecules attract each other, but why do water mol.pdf
 
How can Internet technologies be involved in improving a process in .pdf
How can Internet technologies be involved in improving a process in .pdfHow can Internet technologies be involved in improving a process in .pdf
How can Internet technologies be involved in improving a process in .pdf
 
How many paths are there in a tree with n nodesHow many paths a.pdf
How many paths are there in a tree with n nodesHow many paths a.pdfHow many paths are there in a tree with n nodesHow many paths a.pdf
How many paths are there in a tree with n nodesHow many paths a.pdf
 
Hypothesize a way for a virus to evade a host defense & then devise .pdf
Hypothesize a way for a virus to evade a host defense & then devise .pdfHypothesize a way for a virus to evade a host defense & then devise .pdf
Hypothesize a way for a virus to evade a host defense & then devise .pdf
 
How many ways can letters of the word SINGAPORE be arranged such that.pdf
How many ways can letters of the word SINGAPORE be arranged such that.pdfHow many ways can letters of the word SINGAPORE be arranged such that.pdf
How many ways can letters of the word SINGAPORE be arranged such that.pdf
 
Haploid. After is complete, the resulting gametes are haploid. This m.pdf
Haploid. After is complete, the resulting gametes are haploid. This m.pdfHaploid. After is complete, the resulting gametes are haploid. This m.pdf
Haploid. After is complete, the resulting gametes are haploid. This m.pdf
 
FTP and TFTP are primarily file transfer protocols. What is the main.pdf
FTP and TFTP are primarily file transfer protocols. What is the main.pdfFTP and TFTP are primarily file transfer protocols. What is the main.pdf
FTP and TFTP are primarily file transfer protocols. What is the main.pdf
 
Given Starter Fileimport java.util.Arrays; Encapsulates.pdf
Given Starter Fileimport java.util.Arrays;   Encapsulates.pdfGiven Starter Fileimport java.util.Arrays;   Encapsulates.pdf
Given Starter Fileimport java.util.Arrays; Encapsulates.pdf
 
Express the verbal representation for the function f symbolically. M.pdf
Express the verbal representation for the function f symbolically.  M.pdfExpress the verbal representation for the function f symbolically.  M.pdf
Express the verbal representation for the function f symbolically. M.pdf
 
Economic resources have a price above zero because...A. there are .pdf
Economic resources have a price above zero because...A. there are .pdfEconomic resources have a price above zero because...A. there are .pdf
Economic resources have a price above zero because...A. there are .pdf
 
DOES NOT NEED TO BE ANSWERED UNTIL NOV 13thWords AssignmentRober.pdf
DOES NOT NEED TO BE ANSWERED UNTIL NOV 13thWords AssignmentRober.pdfDOES NOT NEED TO BE ANSWERED UNTIL NOV 13thWords AssignmentRober.pdf
DOES NOT NEED TO BE ANSWERED UNTIL NOV 13thWords AssignmentRober.pdf
 
Discuss in detail how two different Progressive reformers tackled th.pdf
Discuss in detail how two different Progressive reformers tackled th.pdfDiscuss in detail how two different Progressive reformers tackled th.pdf
Discuss in detail how two different Progressive reformers tackled th.pdf
 
Describe the major parts of the nervous system and their functions..pdf
Describe the major parts of the nervous system and their functions..pdfDescribe the major parts of the nervous system and their functions..pdf
Describe the major parts of the nervous system and their functions..pdf
 
DEFINE gene enhancer and gene promoter (3-4 sentences each).Sol.pdf
DEFINE gene enhancer and gene promoter (3-4 sentences each).Sol.pdfDEFINE gene enhancer and gene promoter (3-4 sentences each).Sol.pdf
DEFINE gene enhancer and gene promoter (3-4 sentences each).Sol.pdf
 
Cisco Systems, Inc. offers a switching technology known as Multi-Lay.pdf
Cisco Systems, Inc. offers a switching technology known as Multi-Lay.pdfCisco Systems, Inc. offers a switching technology known as Multi-Lay.pdf
Cisco Systems, Inc. offers a switching technology known as Multi-Lay.pdf
 
C# ProgramingHow a derived class that inherits attributes and beha.pdf
C# ProgramingHow a derived class that inherits attributes and beha.pdfC# ProgramingHow a derived class that inherits attributes and beha.pdf
C# ProgramingHow a derived class that inherits attributes and beha.pdf
 
Assume that x and y are already defined as being of type int . Write.pdf
Assume that x and y are already defined as being of type int . Write.pdfAssume that x and y are already defined as being of type int . Write.pdf
Assume that x and y are already defined as being of type int . Write.pdf
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 

i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf

  • 1. i safari File Edit View History Bookmarks Window Help 67% D. Thu 10:12 PM azybooks.zyante.com 0 UC Riverside Buckys C++ P Chegg Study Chegg.com Please Help, E... Please Help, E... CS 010/10v 1... Strings: Mem.. Strings - YouT Branching- C 4.7 PROGRAM 4 (part 1): Text message decoder VERIFY EMAIL | × .6 LAB 4: Loops-Replacing cha characters 4.7 PROGRAM 4 (part 1): Text message decoder (1) Use getline) to get a line of user input into a string. Output the line. Ex: Enter text: IDK if I'1l go. It's my BFF's birthday You entered: IDK if I'1l go. It's my BFF's birthday (2) Extend to search the string (using find0) for common abbreviations and print a list of each found abbreviation along with its decoded meaning. Ex Enter text: IDK if I'1l go. It's my BFFs birthday You entered: IDK if I'1l go. It's my BFF s birthday BFF: best friend forever IDK: I don't know Support these abbreviations: BFF -best friend forever IDK--Idon't know JK -- just kidding TMI- too much information ·TYL-talk to you later Lab Submission 4.7.1: Sion 4.7.1: PROGRAM 4 (part 1): Text message decoder C++ Spaces: 1 20 Solution str=input('enter text :') print 'you entered ',str if(str.find('BFF')!=null): print 'BFF:best friends forever ' if(str.find('IDK')!=null): print 'IDK: I dont know ' if(str.find('JK')!=null): print 'JK : just kidding ' if(str.find('TMI')!=null): print 'TMI : too much information ' if(str.find('TTYL')!=null): print 'TTYL : talk to you later'