1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
4 years ago
14

Python

Computers and Technology
1 answer:
Lemur [1.5K]4 years ago
3 0

Answer:

#Program starts here

#Prompt User for Input "FirstName and LastName "

FirstName = input("Enter Your FirstName: ")

LastName = input("Enter Your LastName: ")

#Define Function

def lastF(FirstName, LastName):

     FirstName = FirstName[0]+"."

     print(LastName+", "+FirstName);

lastF(FirstName, LastName) #Call Function

#End of Program

Explanation:

On line 3 and 4, the user is expected to enter his/her first name and last name respectively

On line 6, the function LastF with two arguments is defines

On line 7, the initial of FirstName is extracted

Line 8 prints the required output

Line 9 Calls the defined function.

You might be interested in
Using underlining and italics at the same time is which of these? A. allowed but might be overkill B. always a good idea C. not
Alex777 [14]

A. Allowed but might overkill

6 0
3 years ago
Read 2 more answers
When was third battle of Panipat fought​
enyata [817]

Answer:

January 14, 1761

Explanation:

6 0
3 years ago
Does anyone know edhesive 4.3 question 1
navik [9.2K]

No

.................................. :)

5 0
3 years ago
Read 2 more answers
Is B$4 is an example of a relative cell reference?
yawa3891 [41]
Yes it is because B$4<span> instructs Excel to keep the </span>cell reference<span> B4 (absolute). assumptions </span>
5 0
3 years ago
Respond to Social EngineeringYou work as the IT security administrator for a small corporate network. The company president has
Cloud [144]

Answer:

Delete any emails that are attempts at social engineering

Explanation:

The actual URL of an email could tell if an hazardous, an unwanted or an unexpected email is being received, hence one can be sure of social engineering through this means. Hence, this could provide a solution to this problem.

4 0
4 years ago
Other questions:
  • What is a packet?
    10·1 answer
  • Explain the difference between the term graphic communication and printing
    7·1 answer
  • What function does a security certificate perform
    15·2 answers
  • When do you use an else statement for coding
    6·1 answer
  • Which of the following involves unethical use of another’s intellectual property?
    13·1 answer
  • Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. Wh
    7·1 answer
  • I found a brand-new charger wire still in its plastic package, but it's six years old and has never been used. Is it safe to use
    9·1 answer
  • Define and use in your program the following functions to make your code more modular: convert_str_to_numeric_list - takes an in
    10·1 answer
  • When using the red / yellow I green method to present status of a project, green can mean which of the following?
    15·2 answers
  • an existing technology that would allow users to transfer images from the camera to the computer without connecting them
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!