Write a program that asks the user to input their first and last names. The first prompt should state:

Please input your first name:
The second prompt should state:

Please input your last name:
After accepting the inputs, your program should output the input in the form last name, first name.

Hint: Remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a comma as well and that the comma must be followed by a space.

Answers

Answer 1

first = input("Please input your first name: ")

last = input("Please input your last name: ")

print(last+", "+first)

I hope this helps!


Related Questions

Module 1 and 2 Coding Guided Notes Fill in your answers to each response as you read through the lesson pages in the coding course. Lesson 1.01: 1. Instructions for computers to solve a problem is known as _________. Computer ________ is how humans and machines talk to each other. 2. Learning to code or write a _________ allows for a solution to a problem.

Answers

Answer:

Code; code; program.

Explanation:

1. Instructions for computers to solve a problem is known as code. Computer code is how humans and machines talk to each other. Some examples of programming language used to write a code in instructing a computer for the execution of a task are python, Java, Javascript, ruby, c++, c# etc.

2. Learning to code or write a program allows for a solution to a problem.

Answer: 1st: code 2ed:code 3rd:program

Explanation: hope this help's :)

The TCP/IP Application Layer and the OSI Application Layer are relevant mainly to programmers, not to network technicians.

True/False

Answers

Answer:

Yes they are to programmer

Explanation:

Plz give me brainiest

Answer:

true

Explanation:

When we code an algorithm, we need to provide the commands in the order we want the
computer to carry them out.

Answers

Answer:

true                                                  q     it says it needs 20 characters so here you go

An inkjet printer’s output appears to have missing elements. What is the first thing a technician should try if the ink cartridge appears to be full?

Answers

Answer:

Check the printing properties or print test page.

Explanation:

In a situation whereby an inkjet printer’s output appears to have missing elements. The first thing a technician should try if the ink cartridge appears to be full to "Check the printing properties."

This helps to serve as a maintenance technique or solve the ink cartridge problems.

Depending on the windows or PC's Operating System. To check the printer's properties on Windows 7, a user will have to click on the “Start” button > Control panel > Devices and Printers. Followed by right-clicking the printer icon and open up “Printer Properties” and click “Print Test Page”

Write code that swaps the first and last elements in a list called my_list. Assume that the list has already been created and contains at least one element.

Answers

my_lst = ([1,2,3,4,5,6])

h = my_lst[0]

my_lst[0] = my_lst[-1]

my_lst[-1] = h

print(my_lst)

The code that swaps the first and last elements in a list called my_list is as follows:

my_list = ["break", 14, 15, "john", "black"]

my_list[0], my_list[-1] = my_list[-1], my_list[0]

print(my_list)

Code explanation:

The code is written in python.

The first code, we declared a variable named my_list. This variable is a list. The list have values of different data type.The second line we have to swap the first value in the list with the last value in the list.Finally, we print our new swapped list .

learn more on python list here: https://brainly.com/question/26104476

What is a trojan horse in computer science?

Answers

Answer:A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program

Explanation:

hai ima guurl andd here r the lyricss to mah favorite song
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Yeah
Shotgun, aimed at my heart, you got one
Tear me apart in this song
How do we call this love
I tried, to run away but your eyes
Tell me to stay oh why
Why do we call this love
It seems like we've been losing control
So bad it don't mean I'm not alone
When I say
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Maybe some part of you just hates me
You pick me up and play me
How do we call this love
One time tell me you need me tonight
To make it easy, you lie
And say it's all for love
It seems like we've been losing control
So bad it don't mean I'm not alone
When I say
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Me and my broken heart
Me and my broken
Yeah, yeah, yeah
It's just me
It's just me
It's just me
Me and my broken heart
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart

Answers

Answer:wow that’s a lot of lyrics but intersting

Explanation:

Answer:

that's a cool song

Explanation:

have a great day:)

Comment on the following 2 arrays. int *a1[8]; int *(a2[8]); a1 is pointer to an array; a2 is array of pointers a1 is pointer to an array; a2 is pointer to an array a1 is array of pointers; a2 is pointer to an array a1 is array of pointers; a2 is array of pointers

Answers

Answer:

The answer is "a1 and a2 is an array of pointers".

Explanation:

In this question, A collection of pointers refers to an array of elements where each pointer array element points to a data array element. In the above-given statement, the two-pointer type array "a1 and a2" is declared that holds the same size "8" elements in the array, and each element points towards the array's first element of the array, therefore, both a1 and a2 are pointer arrays.

Susan is taking a French class in college and has been asked to create a publication for her class. What feature can she
use to help her develop her publication in French?
Research
Grammar
Language
Spell Check

Answers

Answer:

Essayons

Explanation:

the answer is Language

Challenge activity 1.11.1: using constant in expression is not working for me. Can any one help me find the right code?

Answers

Answer:

could you please tell me which grde are you in?

Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as input, and outputs the average and max. Ex: When the input is 15 20 0 5, the output is:

Answers

In Python 3.8:

nums = list(map(int, input("Enter your numbers space separated: ").split()))

print(f"The largest number is {max(nums)} and the average of all the numbers entered is {sum(nums)/len(nums)}")

Refer to the exhibit. What kind of NAT is configured on the ASA device?

Answers

Answer:

A network administrator has configured NAT on an ASA device

Explanation:

you should restrict access to your system both online and offline. Is it true or false​

Answers

Answer:

false

Explanation:

to keep personal information secure

/*this function represents
*what karel has to do
*/
function start() {
turnLeft();
buildTower();
turnRight();
if(frontIsClear()){
toMove();
}
while(noBallsPresent();
turnLeft();
buildTower();
}
if(frontIsBlocked()){
goBack();
}
}

/*This represents karel is
*putting down the balls for making the tower
*/
function buildTower(){
putBall();
move();
putBall();
move();
putBall();
}

function
move();
turnRight();
move();
move();
turnLeft();
move();
}

i need help finding the issues

Answers

anything

Explanation:

I know what to say this time

Answer:

turn right

Explanation:

i think sorry if it is wrong

Write a program using integers userNum and x as input, and output userNum divided by x four times. Ex: If the input is 2000 2, the output is: 1000 500 250 125 Note: In Coral, integer division discards fractions. Ex: 6 / 4 is 1 (the 0.5 is discarded).this must be written in Coral Language

Answers

Answer:

integer userNum

integer x

integer i

put "Enter the user number: "

userNum = Get next input

put "Enter the x value: "

x = Get next input

for i = 0; i < 4; i = i + 1

            put userNum/x to output

Explanation:

Coral Programming language is an ultra-simple programming language for learning programming. The first three rows of the code block declare the variables 'userNum', 'x', and 'i'. The "Get next input" and the "Put 'output_value' to output" are used by the program to get input from the user and output a value to the screen respectively.

Given that a computer required​ service, what is the probability that it was a​ laptop? Given that the computer required​ service, the probability that it was a laptop is nothing?

Answers

Complete Question:

A campus bookstore sells both types and in the last semester sold 56% laptops and 44% desktops. Reliability rates for the two types of machines are quite different, however. In the first year, 5% of desktops require service, while 15% of laptops have problems requiring service.

Given that a computer required service, what is the probability that it was a laptop?

Answer:

Probability = 0.084

Explanation:

Given

Laptops = 56%

Desktop = 44%

Service Required (Laptop) = 15%

Service Required (Desktop) = 5%

Required

Determine the probability that a selected computer is a laptop and it requires service.

The question tests our knowledge of probabilities using "and" condition.

What the question requires is that, we calculate the probability of selecting a LAPTOP that REQUIRES SERVICE

Note the capitalised words.

This will be calculated as follows:

Probability = P(Laptop) and P(Service Required (Laptop))

[Substitute values for P(Laptop) and P(Service Required (Laptop))]

Probability = 56% * 15%

[Convert to decimal]

Probability = 0.56 * 0.15

Probability = 0.084

Use the set A = { a, b, c ,d } to answer the following questions.

What is the cardinality of A?

What is the power set of ℘(A)?

What is the cardinality of the power set?

What is the power set of A = { }

Answers

Answer:

What is the cardinality of A? 4

What is the power set of ℘(A)?

P(A) = {Ф, {a}, {b}, {c}, {d}, {a,b}, {a,c}, {a,d}, {b,c}, {b,d}, {c,d}, {a,b,c}, {a,b,d}, {b,c,d}, {a,c,d},{a,b,c,d}}

What is the cardinality of the power set? 16

What is the power set of A = { }? => {{ }} or {Ф

Explanation:

Given set is:

A = {a,b,c,d}

What is the cardinality of A?

The cardinality of set is the number of elements in the set

Since, set A has four members the cardinality is 4.

i.e.

n(A) = 4

What is the power set of ℘(A)?

The power set of a set consists of all the subsets of a set.

So the power set of A will consist of all subsets of A.

The power set is:

P(A) = {Ф, {a}, {b}, {c}, {d}, {a,b}, {a,c}, {a,d}, {b,c}, {b,d}, {c,d}, {a,b,c}, {a,b,d}, {b,c,d}, {a,c,d},{a,b,c,d}}

What is the cardinality of the power set?

The number of subsets of a set is the cardinality of power set.

As A is 4 members,

Cardinality of Power set of A = 2^4 = 16

What is the power set of A = { }

As A is an empty set, its power set will have only one element (Ф) as member

P(A) = {{ }} or {Ф}

Hence,

What is the cardinality of A? 4

What is the power set of ℘(A)? P(A) = {Ф, {a}, {b}, {c}, {d}, {a,b}, {a,c}, {a,d}, {b,c}, {b,d}, {c,d}, {a,b,c}, {a,b,d}, {b,c,d}, {a,c,d},{a,b,c,d}}

What is the cardinality of the power set? 16

What is the power set of A = { }? => {{ }} or {Ф

Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?

To be a digital media coordinator, Claire needs a bachelor’s degree in _______ digital media, or a related field. She also needs to have knowledge of _______ and emerging digital technologies.

1st blank:
psychology
public relations
finance

2nd blank:
computer programming
computer coding
search engine optimization

Answers

Answer:

1. Public Relations

2. Search Engine Optimization

Explanation:

Given that a public relations degree holder can work in various capacities such as Advertising, Media, Event, and Sale promotion position. Hence Claire needs a bachelor’s degree in PUBLIC RELATIONS.

Similarly, given that the knowledge of Search Engine Optimization is crucial in Digital media coordination, as it helps to drive and gain web or online traffic both in quality and quantity.

Hence, Claire also needs to know about Search Engine Optimization.

HELP ASAP WITHIN 5 MINUTES

Answers

Answer:

A,B, and C

Explanation:

In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation, and explain briefly. for (int i = 0; i < 3; i++) { for (int j = 0; j < n; j++) { for (int k = 0; k < j; k++) { count(); } }

Answers

Answer:

The loop counts the count() function length of n-1 times with respect to n.

Explanation:

The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.

The n represents the number length of a range of numbers or iterables (like an array).

which of the following file formats cannot be imported using Get & Transform

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given options are:

A.) Access Data table  

B.)CVS  

C.)HTML  

D.)MP3

The correct option to this question is D- MP3.

Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.

As you know that the GET statement is used to get data from the file and do further processing and transformation.

The _________ operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segment register.a) TYPEb) SIZEOFc) OFFSETd) LENGTHOFe) PTR

Answers

Answer:

C. Offset.

Explanation:

An offset operator can be defined as an integer that typically illustrates or represents the distance in bytes, ranging from the beginning of an object to the given point (segment) of the same object within the same data structure or array. Also, the distance in an offset operator is only valid when all the elements present in the object are having the same size, which is mainly measured in bytes.

Hence, the offset operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segment register.

For instance, assuming the object Z is an array of characters or data structure containing the following elements "efghij" the fifth element containing the character "i" is said to have an offset of four (4) from the beginning (start) of Z.

1. Do our shared social experiences lead us to think

communication is a cure-all?

Answers

Answer:

Yes

Explanation:

Shared social illustrations have always shown that any problem of any kind can be sorted by communication.

Eg : Whenever societies face any problem - eg recession, the competent people related to that area of problem (representing different interests of various groups also) sit & discuss (ie communicate in detail) about it.  

These communications have seen to be solution to all problems world has faced.

Yes,  our shared social experiences lead us to think communication is a cure-all.

This is because, helps the individual in shaping their mental and emotional health for the rest of their life.

With shared social experiences , there would be communication among people and it serves as a cure-all.

Therefore, shared social experiences lead us to think communication is a cure-all.

Learn more about social experiences at:

https://brainly.com/question/24452126

Which of the following is true about file formats?

A. Open file formats may be either free or proprietary.

B. Open file formats are always free.

C. Free file formats may be either open or closed.

D. Proprietary files are always closed.

Answers

Answer:

A

Explanation:

The answer is A mate, if you need any help let me know please

A file extension is also known as the file format. The correct option is A, Open file formats may be either free or proprietary.

What is a file format?

A file extension, often known as a file format, is the structure of a file in terms of how the data within the file is arranged on a computer. A file name extension frequently indicates a certain file format as part of a file's name (suffix).

Open formats are also known as free file formats if they are not burdened by any copyrights, patents, trademarks, or other limitations (for example, if they are in the public domain), allowing anybody to use them for any purpose at no monetary cost.

Hence, the correct option is A, Open file formats may be either free or proprietary.

Learn more about File Format:

https://brainly.com/question/21435636

#SPJ2

Daiki is creating a database for a paint store. Each color of paint would have its own record which will include the color name price and size. The price of the paint will be in its own a) table b) file c) field d) format

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is c)field.

As we know that the feature of an entity is represented by its attribute in the database table. A database table is a set of records of different fields. Each field represents a row in a database table. Each field can contain a set of attributes related to an entity such as a paint color.

So the price of paint will be in its own field. Because there are different colors in the database table. Each color has its own record in form of a field. As you know that each field is a row in the database table. So, each row has the price of a paint color.

Other options are not correct because:

The table contains a list of fields and each field contains its own paint price. The format and file is something different and does not have any relation with the question scenario.

Answer:

C) Field

Explanation:

I took the test

How DNS service are to be deployed on the network (15 -30 words)

Answers

Each device connected to the Internet has a unique IP address which other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).

The use of information technology to monitor and control a physical process is known as a. numeric control b. information numeric control c. process control d. computer-aided design

Answers

Answer:

c. process control

Explanation:

The use of information technology to monitor and control a physical process is known as process control.

Generally, process control is mainly used in manufacturing industries such as food and beverages industries, oil and gas refinery industries, power (electricity) generation industries, chemical processing industries, and wastewater management industries where the production of materials from raw materials are continuously without any interruption.

The main purpose of process control is to ensure that the manufacturing process is done with better quality, consistency, safety standards and efficiency.

The long-run average cost curve is typically _______________________. a) downward-sloping at first but then b) upward-sloping upward-sloping at first but then c) downward-sloping always d) downward-sloping always upward-sloping

Answers

Answer:

A. downward-sloping at first but then upward-sloping

Explanation:

The long-run average cost curve is typical "downward-sloping at first but then upward-sloping." This can be shown as the long-run average cost curve is graphically represented in a U shape.

The reason is that the long-run average cost of production initially falls as a result of increase returns to scale as output is increased, however, at some stage beyond this certain this, the long-run average cost of production rises because of decreasing returns of scale.

What was the name of first computer?

Answers

The ENIAC (Electronic Numerical Integrator and Computer) was the first electronic programmable computer built in the U.S. Although the ENIAC was similar to the Colossus, it was much faster, more flexible, and it was Turing-complete.

. Linux servers are typically stored in a locked server closet to prevent physical access by unauthorized persons. Describe why these physical restrictions are warranted

Answers

Answer:

Following are the solution to this question:

Explanation:

Physical Access to Linux Servers:

Unauthorized staff is denied access to windows server due to various reasonable factors which might damage databases and then all database depends.

Linux distributions handle their servers but it is almost important that they will be protected or hackproof to safeguards their organizations' networks.

Guess if an unwanted staff has access to the server, he/she can be using the device by just placing a simple USB or dragging the information of the database to study it even further. Here that the results stay throughout the possession of even an unauthorized person, whom no organization wants to confront.

Its attacker may also damage that server by installing a virus or any virus mostly on the server. User security can allow unauthorized staff to go on a search and retrieve the database to disc inside the database.

Warranted physical limitations:

All such physical constraints are assured because the company cannot manage a minor error in physical security.

Because conflicts with both the physical limitation will damage its database so much but leave all loopholes free to that same protection of attackers and operators.

Its physical safety guarantee should be maintained by routine server room checks and ensure that every step of safety is undertaken and results are achieved.

Other Questions
Each piece of paper is 910 inch long. Each ballot needs to be 310 inch long. How many ballots can be cut from one piece of paper? What had the study of fossils allowed scientist to do There are 35 female performers in a dance recital. The ratio of men to women in the recital is 2 : 7 How many men are in the recital? What type of molecules can diffuse through a membrane?A small and unchargedB large and polarC any moleculePlease help 10 points What is 3.258 x 105 written in standard form? The answer to 6 .... When you can.. please answer these! THANK YOU SO MUCH WAHHH Match the corresponding rational expressions with the letter of the correct answer. PLEASE HELP ONLY ANSWER IF YOU KNOW I WILL REPORT IF IT HAS NOTHING TO DO WITH THE TOPIC Pls Help!!! Worth 99 Pts!! Explain how to sketch a graph of the function f(x) = x3 + 2x2 8x. Be sure to include end-behavior, zeroes, and intervals where the function is positive and negative. What economic system is controlled by private owners with little government influence?A) CapitalismB) Chartered companiesC) Market economy Joseph recently noticed that this time next year he will be twice as old as Jasmine. I couldn't help noticing that when I am 66 at this time of the year the combined future ages of Joseph and Jasmine will also be 66. Also, 6 years from now my future age will be a multiple of the sum of Joseph and Jasmine's future ages. Of course, all ages are non-negative integers. How old. are Joseph Jasmine, and I now? A new car is purchased for 24600 dollars. The value of the car depreciates at 5.5% per year. To the nearest year, how long will it be until the value of the car is 11300 dollars? Can you please help me find answer to question 10 and 11? I need to show my work. I am lost!!! Lol somebody tell me the awnser pls 1. What kinds of perspectives might Sacagawea have hadthat were different from the other members of theLewis and Clark expedition? Can someone help me with this please Which equation represents the perpendicularbisector of AB whose endpoints are A(8,2) andB(0,6)? 8. People who want to shelter domestic producers from foreign competition with tariffs,quotas, and other trade barriers are:A. protectionistsB. free tradersC. libertariansD. NIMBYS -2x - 8y = -162x - 7y = -14 What does the underlined word mean in the following sentence? El conejo viene el da de Pascua de Resurreccin. Easter Christmas Holidays Thanksgiving