1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eduardwww [97]
3 years ago
5

Write a program that asks the user for three names, then prints the names in reverse order. Sample Run: Please enter three names

: Zoey Zeb Zena Zena Zeb Zoey
Computers and Technology
1 answer:
Sauron [17]3 years ago
4 0

Solution:

Since no language was specified, this will be written in Python.

n1, n2, n3 = input ("Enter three names: ").split()

print(n3)

print(n2)

print(n1)

Cheers.

You might be interested in
When I try to add a module into a device, Packet Tracer pop-ups a warning message saying "Cannot add a module when the power is
laiz [17]

plug it into a charger the go to I tunes and it should be there


4 0
3 years ago
What are the differences between switches and routers? cse question
deff fn [24]

Answer:

The main objective of router is to connect various networks simultaneously and it works in network layer

Explanation:

The main objective of router is to connect various networks simultaneously and it works in network layer

7 0
3 years ago
1) what are two functions of a pick or count condition?
anastassius [24]
1. The answer is C. Pick an object at random, and keep track of how many copies of an object are left in a game.

2. The answer is D. Clockwise and counter clockwise.

3. The answer is B. To play an object's animation.

I hope you find this helpful.
5 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
Entrepreneur Employing Mobile Enterprise Apps AACSB Standards: Systems and Processes Australian-based entrepreneur Nathan Tuckwe
insens350 [35]

The factor that is helpful when adding new inventory and not among the Accounting Functions is the audit function.

<h3>Why is the audit function important?</h3>

The role of internal audit is known to be one that tends to give some measures of independent assurance that is need by a firm or an organization in terms of risk management, governance, as well as internal control processes to be able to operate effectively.

Note that an internal audit is said to be carried out objectively and set up to improve and make good an organization's business practices.

Hence, The factor that is helpful when adding new inventory and not among the Accounting Functions is the audit function.

Learn more about audit function from

brainly.com/question/24170807

#SPJ1  

4 0
1 year ago
Other questions:
  • What kind of operating system is Windows? Command-line Browser based Graphical user interface Linux-based
    10·2 answers
  • Which loan type requires you to make loan payments while you’re attending school?
    9·1 answer
  • Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?
    13·1 answer
  • Quinton is having trouble learning Spanish because he keeps reverting back to the grammatical structures of his native English l
    6·1 answer
  • "Na2SO3” represents sodium sulfite.
    13·2 answers
  • Describe a sub routine​
    8·1 answer
  • Complete the sentence.<br> The IP protocol creates and addresses packets at the _____ layer.
    7·2 answers
  • A motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors
    8·1 answer
  • Your first submission for the CIS 210 Course Project should include the following functionality: - Requests the user to input hi
    13·1 answer
  • Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!