1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
9

Ex: If the input is: Pat Silly Doe the output is: Doe, P.S.

Computers and Technology
1 answer:
den301095 [7]3 years ago
7 0

Answer:

Full_name=input("Enter Full Name: ").split()

len1=len(Full_name)

if len1 == 3:

   print(Full_name[2]+", "+Full_name[0][0]+"."+Full_name[1][0]+".")

if len1 == 2:

   print(Full_name[1]+", "+Full_name[0][0]+".")

Explanation:

We first get full names as input from the user. And then split into words, and finally, we store it in the list. Now we calculate the length of that list. The name in general 3 words long, And hence, we can assume here that maximum length is 3, and it can be 2 definitely. Now if the length is 3 we print the third word or last name in full, and the first letter of the middle name and first name. Also, if the maximum length is 2 then we print the middle name in full, and this is the last name in this case. Also, we print the first letter of the first name. And thus, we have our solution.

You might be interested in
1. Which of the following are considered CAD powerhouses?
allsm [11]

Answer:

1. D.Autodesk and microstation.

2. D. the creation of a computer model, paricularly for purposes of studying.

3. A.internet delivered through standard household phone lines.

4. C.3-D sculptures used to pray for fertility.

5. C.technology.

Explanation:

8 0
3 years ago
Di bawah ini tampilan submenu pada tab menu insert pada microsoft word 2010,yaitu...
Luda [366]
Jawabannya:
A. tables
7 0
3 years ago
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
3. Under the Driver Responsibility Program, you may be assigned a number of points for:
slava [35]

Hello ur answer should be A

8 0
3 years ago
Read 2 more answers
Which screen should be open to customize or personalize a desktop background
maw [93]
Minimize any apps/webpages on it you have open (your background has to be visible), left click with the mouse, hit Personalize, and it should have Backgrounds on the page if you scroll down. You can hit Browse to look through your files on the desktop for what you want. 
8 0
3 years ago
Other questions:
  • Write a method that checks whether the input string or a sentence (a string with spaces) is a palindrome or not. The method shou
    13·1 answer
  • These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by th
    9·1 answer
  • In C++ Please :
    6·1 answer
  • Union Carbide accident safety policies and procedures were not followed was due to
    14·1 answer
  • What are the most commonly found items in the trash according to the Municipal Solid Waste report?
    12·2 answers
  • A small company with 100 computers has hired you to install a local area network. All of the users perform functions like email,
    9·1 answer
  • A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
    15·1 answer
  • Edhesive 2.3 code practice question 1​
    11·1 answer
  • Hannah wants to write a book about how scientists and society interact, and she has generated ideas for chapters. Which chapter
    13·1 answer
  • Which of the following can be termed ‘application software’?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!