1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scilla [17]
3 years ago
14

Write a Python program that reads a student name, his/her age, and his/her height (in feet) from the console and prints out all

pieces of data related to a student, i.e. name, age, and height, in one line of the output console.
Example of output: John Smith 30 5.9
Computers and Technology
1 answer:
lara [203]3 years ago
6 0

Answer:

The program to this question as follows:

Program:

name = input("Student Name: ")#defining variable name

age = int(input("Student Age: "))#defining variable age

height = float(input("Height (in feet): "))#defining variable height

print(name + " " + str(age) + " "+ str(height))#print values in one line.

Output:

Student Name: John Smith

Student Age: 30

Height (in feet): 5.9

John Smith 30 5.9

Explanation:

In the above python program, three variable name, age, and height is declared, in these variables the input function is used, that takes input from the user sides on console screen, and in the next line, the print function is declared, that uses these three variables for printing their holding values in the single line.

You might be interested in
After a business transaction has been analyzed, which of the following must occur for the analysis to have been done correctly?
ICE Princess25 [194]

Answer:

A. Equity must equal the difference between assets and liabilities.

Explanation:

Assets are things a company or business owns while liabilities are things person or company owes.

Thus, Equity is the difference between the assets and the liabilities.

So, option A which is <u>Equity must equal the difference between assets and liabilities</u> is the answer.

5 0
3 years ago
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) fa
Advocard [28]

Answer:

A. True.

Explanation:

E-mail is an acronym for electronic mail and it can be defined as an exchange or transmission of computer-based data (messages) from one user to another over a communications network system.

Also, a distributed application refers to a software program that is capable of running on several computer systems and can communicate effectively through a network.

E-mail is the most common distributed application that is widely used across all architectures and vendor platforms because it primarily operates on a client-server model, by providing users with the requested services through the Simple Mail Transfer Protocol (SMTP) using the standard port number of 25.

7 0
3 years ago
The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
cestrela7 [59]

Answer:

sorry I can't understand what is this is

3 0
3 years ago
DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a ho
zubka84 [21]

Answer:

Switchport does not compromise, switch auto dynamic mode, switch native vlan 66, default swamp vlan enabled to add 99 is the correct answer of the following question.

Explanation:

As configuring 802.1Q warp links, DLS1 is connected to the next switch, DLS2, via a diffusion connection to the local VLAN, that must match on the both sides of the wire, either CDP error signals will be created and data to or from the the original VLAN will not be managed properly.Such instruction must be extended to Fa0/1 on DLS1 to address issues that can not be communicated by a server related to DLS1 to a network tied to DLS1, even though both are in VLAN 99.

6 0
3 years ago
All sensitive media on a laptop should be encrypted.
Inessa05 [86]

true very very true it could get stolen if not (well either way) but it is better encrypted

8 0
3 years ago
Other questions:
  • When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the interna
    9·1 answer
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • (1) Prompt the user to enter a string of their choosing. Output the string.
    11·1 answer
  • 7x+ 2x = 14<br>want is (x)?​
    15·1 answer
  • Jimmy wrote the procedure scoreToGrade which accepts as a parameter score - a quiz score in the range 0-100. The procedure is su
    8·1 answer
  • I’m turning my Pinterest into a professional account what should be my user name please try to think of a good name and not just
    11·2 answers
  • Given an array a, write an expression that refers to the first element of the array .
    5·1 answer
  • Design a for loop that gets 6 integer numbers from a user, accumulates the total of them, then displays the accumulated total to
    9·1 answer
  • How will you define a text?
    10·1 answer
  • PLEASE HELP THIS IS CONFUSING ME
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!