1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ierofanga [76]
4 years ago
10

Let's revisit our lucky_number function. We want to change it, so that instead of printing the message, it returns the message.

This way, the calling line can print the message, or do something else with it if needed. Fill in the blanks to complete the code to make it work.
def lucky_number(name):
number = len(name) * 9
___ = "Hello " + name + ". Your lucky number is " + str(number)
___

print(lucky_number("Kay"))
print(lucky_number("Cameron"))
Computers and Technology
1 answer:
maksim [4K]4 years ago
3 0

Answer:

Replace the first blank with:

message = "Hello " + name + ". Your lucky number is " + str(number)

Replace the second blank with:

return message

Explanation:

The first blank needs to be filled with a variable; we can make use of any variable name as long as it follows the variable naming convention.

Having said that, I decided to make use of variable name "message", without the quotes

The next blank is meant to return the variable on the previous line;

Since the variable that was used is message, the next blank will be "return message", without the quotes

You might be interested in
Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
solong [7]

Answer:

The following network level session hijacking attack shown by Sean is Blind Hijacking, LETTER C.

Explanation:

<em>Because he is injecting malicious data or commands into the intercepted communications in the TCP session even if the source-routing is disabled. He can send the data or commands but hass no access to see the response.</em>

3 0
4 years ago
Define the following term: - hue
Allushta [10]
Color? Like the lightest I think
8 0
3 years ago
Read 2 more answers
Define a query that uses the Natural Join command to join three tables to produce useful information.
vichka [17]

Answer:

SELECT column_1, column_2, ... column_n

FROM table_name_1

JOIN table_name_2 ON table_name_1.primaryColumn = table_name_2.foreignKeyColumn

AND table_name_3 ON table_name_1.primaryColumn = table_name_3.foreignKeyColumn

Explanation:

The SQL or structured query language statement returns information from the three tables in the database with the 'select' and 'join' clause in the statement. There are several types of join but the default is the inner join. Other types of join are; outer, left and right join.

6 0
3 years ago
Which best describes the benefits of renting a home? ARenting can cost more upfront. BRenting is less flexible than owning a hom
yulyashka [42]

Renting can be an alternative to many people, especially those in areas where house prices are very expensive. The benefits to renting a home, however, are not mentioned in the given question, making the best answer (D) none of the above.

Some actual benefits that a person can gain are actually flexibility, since renting means that you can easily move from one place to another compared to buying a home, where you require capital and selling the previous home also falls into your responsibility, while rentals are managed by landlords.

8 0
4 years ago
One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular
labwork [276]

An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

<h3>What protocol does the netstat command use?</h3>

It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command  is said to often show active TCP connections.

<h3>What is netstat used for?</h3>

The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.

Hence,  it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

Learn more about troubleshoot from

brainly.com/question/9572941

#SPJ1

3 0
2 years ago
Other questions:
  • Activity 1: Matched pairs or independent/separate samples? For each of the prompts below, decide whether the parameter of intere
    11·1 answer
  • What time does walmart deposit paychecks?
    5·1 answer
  • For any two documents x and z, define k(x, z) to equal the number of unique words that occur in both x and z (i.e., the size of
    15·1 answer
  • KDS Company has 3 departments: 1. Dept X 2. Dept Y 3. Dept Z. Design a program that will read as input each department's sales f
    6·1 answer
  • What should be entered to make the loop print
    6·1 answer
  • Explain how mobile phone production could be more sustainable​
    8·2 answers
  • Que es una red de datos
    7·2 answers
  • Who designed the apple i computer in 1976?
    13·1 answer
  • What are common considerations businesses need to make before purchasing new computers? Check all of the boxes that apply.
    6·1 answer
  • In large organizations, database design and management is handled by a database _____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!