Search the file for every occurrence of a specified string

Assignment Help Computer Engineering
Reference no: EM132167199

Using C++

Write a program that asks the user for a file name and a string to search for. The program should search the file for every occurrence of a specified string.

When the string is found, the line that contains it should be displayed. After all the occurrences have been located, the program should report the number of times the string appeared in the file.

You can have any content in the input file.

For example if the input.txt contains:

The law provides subsidies to low- and moderate-income Americans to help them afford premiums. Those with lower incomes can receive additional subsidies to reduce their premiums and deductibles.

Republicans want to repeal the Obamacare taxes and provide tax credits based on age, not income, so all those buying policies in the individual market would get some assistance.

These subsidies, however, likely wouldn't be as generous for older Americans and lower-income folks. Sample Run Enter the file name: input.txt Enter string to search for: subsidies found in: The law provides subsidies to low- and found in: Those with lower incomes can receive additional subsidies found in:

These subsidies, however, likely wouldn't be as generous "subsidies" was found 3 times.

Reference no: EM132167199

Questions Cloud

Write a program that merges two ordered list objects : Write a program that merges two ordered list objects of integers into a single ordered list object of integers.
Representations of the physical processes : Sometimes we use probability distributions that are not exact representations of the physical processes that they are meant to repre- sent
Show the sum of these two numbers as an int : Using C++ to write this simple code. Say "Hello User" to the user when the program is created.
Statistical method should be used : To compare the difference in the BMI before and after the diet program, which statistical method should be used?
Search the file for every occurrence of a specified string : Write a program that asks the user for a file name and a string to search for. The program should search the file for every occurrence of a specified string.
Summarize the governments perspectives on proposed change : Find an article in the financial press (Wall Street Journal, Fortune, BusinessWeek, etc.) on a proposed change in the federal tax code.
What is the expected value for gold card applicants : What is the expected value for Gold card applicants? (integer) What is the contribution to chi-squared for Gold card applicants?
Calculate the area and perimeter of four simple plane figure : Using C++, write a program to calculate the area and perimeter of four simple plane figures: a rectangle, a circle, a square and a triangle.
Describe some aspect of the depreciation rule : Study the depreciation rules as published by the IRS or the appropriate agency of another government. Describe some aspect not covered in this chapter.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a gui program that calculates a cars gas mileage

When a Calculate MPG button is clicked, the program should display the number of miles that the car may be driven per gallon of gas.

  Write down the worst cardiac simulator of all time

make the worst CARDIAC simulator of all time (in C++) that tells the user how to execute only a single instruction typed as a 3 digit number by the user.

  Why is security software necessary in operating systems

What is an operating system? Why are audits of this area viewed as complex? Why is security software necessary in operating systems?

  What is the height of this total tree

Which of the above answers would change if a new 16th node was added anywhere in the tree?

  Mitigate security risks and develop a security policy

How does COBIT provide IT processes, goals, and metrics to mitigate security risks and develop a security policy

  What are techniques for addressing security requirements

What are techniques for addressing security requirements? Which have a business relationship with the company?

  Questionin this difficulty you are asked to hand-turn the

questionin this difficulty you are asked to hand-turn the rsa protocol to encrypt and decrypt messages using rather

  What is meant by a convergent iterative calculation

What is meant by a convergent iterative calculation? What kind of loop would you use in program that reads the closing price of a stock for each day of week?

  Prove this theorem

A private-key encryption scheme II = (Gen, Enc, Dec) has indistinguishabl-e -multiple encryptions in the presence of an eavesdropper if for all probabilistic.

  There are thousands of iphone apps ipad apps and android

there are thousands of iphone apps ipad apps and android apps that have been developed to perform a myriad of tasks

  Create a key using the key exchange

Create a key using the key exchange. They agree upon prime modulo p. and Hellman y, p and primitive root g Bob privately choose integers.

  Explain why are the hierarchical levels of an ea framework

you work at a large federal agency. a colleague proposes that the agency ea is no longer required because the agency

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd