subject

JAVA PROGRAMMING

Arrays are useful to process lists.

A top-level domain (TLD) name is the last part of an Internet domain name like .com in example. com. A core generic top-level domain (core gTLD) is a TLD that is either .com, .net, .org, or .info. A restricted top-level domain is a TLD that is either .biz, .name, or .pro. A second-level domain is a single name that precedes a TLD as in apple in apple. com.

The following program repeatedly prompts for a domain name, and indicates whether that domain name consists of a second-level domain followed by a core gTLD. Valid core gTLD's are stored in an array. For this program, a valid domain name must contain only one period, such as apple. com, but not support. apple. com. The program ends when the user presses just the Enter key in response to a prompt.

1-Run the program and enter domain names to validate.

2-Extend the program to also recognize restricted TLDs using an array, and statements to validate against that array. The program should also report whether the TLD is a core gTLD or a restricted gTLD. Run the program again.

import java. util. Scanner;

public class GtldValidation {

public static void main (String [ ] args) {
Scanner scnr = new Scanner(System. in);

// Define the list of valid core gTLDs
String [ ] validCoreGtld = { ".com", ".net", ".org", ".info" };
// FIXME: Define an array named validRestrictedGtld that has the names
// of the restricted domains, .biz, .name, and .pro
String inputName = "";
String searchName = "";
String theGtld = "";
boolean isValidDomainName = false;
boolean isCoreGtld = false;
boolean isRestrictedGtld = false;
int periodCounter = 0;
int periodPosition = 0;
int i = 0;

System. out. println("\nEnter the next domain name ( to exit): ");
inputName = scnr. nextLine();

while (inputName. length() > 0) {

searchName = inputName. toLowerCase();
isValidDomainName = false;
isCoreGtld = false;
isRestrictedGtld = false;

// Count the number of periods in the domain name
periodCounter = 0;
for (i = 0; i < searchName. length(); ++i) {
if (searchName. charAt(i) == '.') {
++periodCounter;
periodPosition = i;
}
}

// If there is exactly one period that is not at the start
// or end of searchName, check if the TLD is a core gTLD or a restricted gTLD
if ((periodCounter == 1) &&
(searchName. charAt(0) != '.') &&
(searchName. charAt(searchName. length() - 1) != '.')) {
isValidDomainName = true;
}
if (isValidDomainName) {
// Extract the Top-level Domain name starting at the period's position. Ex:
// If searchName = "example. com", the next statement extracts ".com"
theGtld = searchName. substring(periodPosition);

i = 0;
while ((i < validCoreGtld. length) && (!isCoreGtld)) {
if(theGtld. equals(validCoreGtld[i])) {
isCoreGtld = true;
}
else {
++i;
}
}

// FIXME: Check to see if the gTLD is not a core gTLD. If it is not,
// check to see whether the gTLD is a valid restricted gTLD.
// If it is, set isRestrictedGtld to true

}

System. out. print("\"" + inputName + "\" ");
if (isValidDomainName) {
System. out. print("is a valid domain name and ");
if (isCoreGtld) {
System. out. println("has a core gTLD of \"" + theGtld + "\".");
}
else if (isRestrictedGtld) {
System. out. println("has a restricted gTLD of \"" + theGtld + "\".");
}
else {
System. out. println("does not have a core gTLD."); // FIXME update message
}
}
else {
System. out. println("is not a valid domain name.");
}

System. out. println("\nEnter the next domain name ( to exit): ");
inputName = scnr. nextLine();
}

return;
}
}

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 15:10, AleciaCassidy
Consider a direct-mapped cache with 216 words in main memory. the cache has 16 blocks of 8 words each. it is a word-addressable computer (rather than a byte-addressable computer which we normally discuss). (a) how many blocks of main memory are there? (b) what is the format of a memory address as seen by the cache, that is, what are the sizes of the tag, cache block, and block offset fields (if they apply)? (c) to which cache block will the memory reference db6316 map?
Answers: 1
image
Computers and Technology, 23.06.2019 11:30, leapfroggiez
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
image
Computers and Technology, 23.06.2019 12:20, jshhs
When guido van rossum created python, he wanted to make a language that was more than other programming languages. a. code-based b. human-readable c. complex d. functional
Answers: 1
image
Computers and Technology, 24.06.2019 05:30, MOONCHILDSUGA
If you combine two cells into one, what action are you performing? a.  adding a new row or column      b.  splitting the cells      c.  removing a new row or column      d.  merging the cells
Answers: 2
You know the right answer?
JAVA PROGRAMMING

Arrays are useful to process lists.

A top-level domain (T...

Questions in other subjects:

Konu
Biology, 14.07.2019 15:00