1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
4 years ago
10

Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space a

nd your first name.
Computers and Technology
1 answer:
vekshin14 years ago
5 0

Answer:

def name_string( name ):

     user_name = name

     split_name = user_name.split(" ")

     list( split_name )

    print ( split_name[ 1 ], ", ", split_name[ 0 ] )

# the test should print out " Turing, Alan"

name_string ( " Alan Turing " )  

Explanation:

The python function above should print out the reverse of a name and surname and separated by a comma.

You might be interested in
Why are you unable to modify the budget file, when you have the allow full control ntfs permission? 70-410?
Serggg [28]

Reason is because from this machine, I only have READ permissions and still in the Domains users. I should have full access in the share permission “Student” becomes a part of the Domain Users group in share permission. In this group, only READ permission is allowed.

 

3 0
3 years ago
Read 2 more answers
Is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down
alexandr402 [8]
It won't exactly shut down the network but it is usually a coding error that causes the program to replicate its self
7 0
4 years ago
A(n) ____ is unique if the value (content) in that field appears only in one record.
Phantasy [73]
A key is unique if the value(content) in that field appears only in one record
5 0
4 years ago
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
Question: 8
Alona [7]

Answer:

The ability to provide data transmission even when some connections

between routers have failed

5 0
3 years ago
Other questions:
  • There are well-known classes of problems that are intractably difficult for computers, and other classes that are provably undec
    5·1 answer
  • 30 POINTS!!
    15·2 answers
  • Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
    7·2 answers
  • How many inches do a tire have to be to sometimes be refer as bald of balding tries
    14·1 answer
  • In a _______ format, the date line and the signature block are centered.
    6·1 answer
  • 12. Realizar un algoritmo que genere un número aleatorio, el usuario debe adivinar cual es el número generado para esto tendrá 3
    10·1 answer
  • What effect does social media have on teens?
    10·2 answers
  • What are some other projects or things you do in your life (other than writing an essay) where you use an iterative process?
    9·2 answers
  • Match the following internet related terms to their definition
    13·1 answer
  • Which file contains full and incremental back-up information for use with the dump/restore utility?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!