PluralToSingular – Converting the input word from plural to singular

PluralToSingular – Converting the input word from plural to singular

' Convert the input word from plural to singularFunction PluralToSingular(ByVal plural As String) As String    ' convert to lowercase for easier comparison    Dim lower As String = plural.ToLower()    Dim res As String    ' rule out a few exceptions    If lower = "feet" Then        res = "Foot"    ElseIf lower = "geese" Then        res = "Goose"    ElseIf lower = "men" Then        res = "Man"    ElseIf lower = "women" Then        res = "Woman"    ElseIf lower = "criteria" Then        res = "Criterion"        ' plural uses "ies" if word ends with "y" preceeded by a non-vowel    ElseIf lower.EndsWith("ies") AndAlso "aeiou".IndexOf(lower.Substring _        (lower.Length - 4, 1)) < 0 Then        res = plural.Substring(0, plural.Length - 3) + "y"    Else        res = plural.Substring(0, plural.Length - 1)    End If    ' the result must preserve the original word's capitalization    If plural = lower Then        Return res.ToLower()   ' it was an all-lowercase word    ElseIf plural = plural.ToUpper() Then        Return res.ToUpper()    ' it was an all-uppercase word    Else        Return res    ' return whatever is in "res"    End IfEnd Function

Share the Post:
data observability

Data Observability Explained

Data is the lifeblood of any successful business, as it is the driving force behind critical decision-making, insight generation, and strategic development. However, due to its intricate nature, ensuring the

Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved