Write a program that asks the user for names of two files

Assignment Help Basic Computer Science
Reference no: EM13306557

write a program that asks the user for the names of two files. the first file should be opened for reading and the second file should be opened for writing . the program should read the contents of the first file, change all characters to uppercase, and store the results in the second file. the second file will be a copy of the first file, except that all the characters will be uppercase. use notepad or another text editor to create a simple file that can be used to test the program.
Detailed explanation: NO
Specific requirements:
we are suppose to use the following on the assingment

Frankie owned a
ferocious feline named
Freddy as a pet.
Freddy was funny and
furry.
His fur is bright red
with black stripes.

 

Reference no: EM13306557

Questions Cloud

What are some other uses for the break statement : How about using a break in a switch statement, show how you can really have a problem if you skip the break statement in a switch.
Write a program that creates a binary tree : Write a program that creates a Binary Tree from an array of integers, goes through it using inorder traversal (saving that to another array), then makes another balanced binary tree.
Professionalism and ethics in accounting : Professionalism and ethics in accounting and the history of accounting
Calculate the resistance of a piece of nichrome wire : Calculate the resistance of a piece of nichrome wire 2.00 m long. the cross-sectional area of the 20 gauge wire is 0.5176 mm2
Write a program that asks the user for names of two files : write a program that asks the user for the names of two files. the first file should be opened for reading and the second file should be opened for writing . the program should read the contents of the first file, change all characters to uppercas..
Find how much energy must be supplied to the refrigerator : An ideal refrigerator utilizes a Carnot cycle operating between 0 degrees Celcius and 18 degrees Celcius. How much energy must be supplied to the refrigerator
What is the net charge contained in the cylinder : A closed Gaussian cylinder sits centered around the z-axis and above the xy-plane with a length of A and a radius of R, What is the net charge contained in the cylinder
Interrogating technology sustinability : Interrogating technology:sustinability, environment and social change
Write a menu driven program : Write a menu driven program that allows the user to enter five numbers and then choose between finding the smallest , sum or average of the numbers.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Changing conditions significant influence on way health

What changing conditions do you think have the most significant influence on way the health information is managed today? Why?

  A program that keeps track of ticket sales for an auditorium

Design a program that keeps track of ticket sales for an auditorium. A concert will be performed over three days in an auditorium with three levels of seating floor, balcony, and upper balcony. There are 20 seats for each type of seating. Write a pro..

  Describing targeted audience go for particular site

Recognize a particular website that you frequently go to and explain targeted audience that goes to that particular site. Do not say "everyone" since all sites always have general target audience.

  Write a method that has the radius of the circle passed

Write a method that has the radius of the circle passed into it. It computes the area, and returns the area to the main method.

  Where identifier is any valid identifier

Where identifier is any valid identifier and namespace-body is the set of classes, objects and functions that are included within the namespace.

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  Explain the concept of supply chain management

Explain the concept of supply chain management. Although R/Way offers services rather than products, could that concept apply to the design of R/Way's new system? If so, how?

  Detection software automatically analyzes network traffic

What detection software automatically analyzes all network traffic. Assesses system vulnerabilities, recognizess any unauthorized access (intrusions).

  What is the decimal value

assume that the following 10 bit numbers represents sighned integers using sign/magnitude notation. the sign is the leftmost bit and the remaining 9 bits represent the magnitude. What is the decimal value for 100000000.

  Finding project schedule if critical path is identified

Describe in scholarly detail how you find out a project schedule once critical path has been identified.

  Write a java program that reads a phrase from the input

Write a Java program that reads a phrase from the input and outputs the WORDS in reverse order.

  Managing cyber crime to protect business

Provide a scenario of a cyber crime by way of example that will demonstrate to your business a situation that might occur.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd