1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
9

Ex: If the input is: Pat Silly Doe the output is: Doe, P.S.

Computers and Technology
1 answer:
den301095 [7]3 years ago
7 0

Answer:

Full_name=input("Enter Full Name: ").split()

len1=len(Full_name)

if len1 == 3:

   print(Full_name[2]+", "+Full_name[0][0]+"."+Full_name[1][0]+".")

if len1 == 2:

   print(Full_name[1]+", "+Full_name[0][0]+".")

Explanation:

We first get full names as input from the user. And then split into words, and finally, we store it in the list. Now we calculate the length of that list. The name in general 3 words long, And hence, we can assume here that maximum length is 3, and it can be 2 definitely. Now if the length is 3 we print the third word or last name in full, and the first letter of the middle name and first name. Also, if the maximum length is 2 then we print the middle name in full, and this is the last name in this case. Also, we print the first letter of the first name. And thus, we have our solution.

You might be interested in
Discus four importance of applications software​
AlladinOne [14]

Answer:

l hope this helps Good luck.

6 0
3 years ago
Create a python program that will input their name and their age. It will show an output "Hi, {name} ! How are you? I know you a
lianna [129]

Answer:

age = 10

name = Cynthia

make an f string so the variables appear in the string. There are other ways to do this but I prefer f strings instead of using string concatenation. It causes problems adding 2 strings together most of the time.

print(f'Hi, {name} ! How are you? I know you are {age} old.')

4 0
2 years ago
A visual basic application consists of a single file true or false
saw5 [17]
False. When decompiled you can see all the files required for it to run
3 0
3 years ago
Read 2 more answers
Why is monitoring email, voice mail, and computer files considered legal?
Sati [7]

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
6 0
3 years ago
What can geographers map with remotely sensed data?
horsena [70]
Geographers can map for example the topography of the earth's surface using aerial photographs taken from a plane flying on regular flight paths at known altitudes. A topographic map with regular contour intervals and also showing infrastructure like roads and buildings can be created from this. Also, the LIDAR system can show features not observable on the ground by 'seeing' into the subsurface and detecting buried escarpments, trenches etc. 
7 0
3 years ago
Other questions:
  • Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of integer
    14·2 answers
  • Jennifer has written a business report. What should be her last step before she submits the story for publication?
    10·2 answers
  • List and describe four communication tools that are currently popular.
    9·1 answer
  • Users report that the network access is slow. After questioning the employees, the network administrator learned that one employ
    7·1 answer
  • What icon might you see in device manager that indicates a problem with a device?
    7·1 answer
  • Name the different views in word​
    5·1 answer
  • Sonora wants to extend the cells to be added in her formula. What is the quickest way to add more cells?
    13·2 answers
  • For any element in keysList with a value smaller than 40, print the corresponding value in itemsList, followed by a comma (no sp
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·1 answer
  • Select the four tactics that cyber criminals use for stealing information from the list below.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!