1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Free_Kalibri [48]
3 years ago
15

Write a program in python that ask the user to enter a word and then capitalizes every other letter of that word

Computers and Technology
1 answer:
elena-s [515]3 years ago
3 0

Answer:

a = input("please enter a word: ")

print("Here is the capitalized version: ")

print(a.upper())

You might be interested in
Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-10.255.255.255), 16 Class Bs (172.1
erica [24]

Answer:

The answer is "1918".

Explanation:

The RFC stands for "remote function call", it is also known as an abbreviated form. It is an application, that responses in a technical online design Task Force, it is also known as a document, which was prepared for review by shareholders to collects some information.  

The RFC reverses is also known as an idea, that uses IP version 4 to reverse the IP address, this process is done by TCP/IP protocol, which is defined under RFC 1918.  

4 0
3 years ago
_______ an embedded Word table to activate the Word features.
Bess [88]
The answer is C. double-click
3 0
3 years ago
Which type of workplace culture emphasizes the development of new skills?
Archy [21]
Involvement is the answer just took it. thank you

6 0
3 years ago
Read 2 more answers
Gloria is in her sophomore year of college and works part time. She has assignments saved on her home computer, her aunt's lapto
Tanzania [10]
I think this answer, "<span>Upload all existing documents to a cloud-based program," is correct. Hope I helped!!</span>
4 0
3 years ago
Read 2 more answers
What term is used for a seemingly harmless program that has malicious code hidden inside?
Delicious77 [7]
That is none other than a "Trojan Horse"
8 0
3 years ago
Other questions:
  • The Caesar Cipher has 25 different shifts to try.
    14·1 answer
  • What function does the ALU perform?
    10·1 answer
  • 1. How does inertia affect a person who is not wearing a seatbelt during a collision? 
    14·2 answers
  • What should you do before you share your information on the Internet? A. Ask a trusted adult to make sure it is safe. B. Check t
    13·1 answer
  • _______ are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often
    7·1 answer
  • What is the Documenter?
    10·1 answer
  • Yall rachits and yall eat butt xD
    10·2 answers
  • What is the purpose of a system call in an operating system?
    10·1 answer
  • )finding an unused location in the hash table is called
    5·1 answer
  • Help plz,l didn’t pay attention in class
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!