1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
7

Assume that name is a variable of type String that has been assigned a value.Write an expression whose value is a String contain

ing the last character of the value of name.So if the value of name were "Smith", the expression's value would be "h".
Computers and Technology
1 answer:
zhuklara [117]3 years ago
6 0

Answer:

#read value of name

name=input("Enter name:")

#find and ptint the last character of the string

print("last character of string is:",name[-1])

Explanation:

Read a string from user and assign it to variable "name".Find its last character as "name[-1]". Since name is character array,so name[-1] will give the last character of the array.

Output:

Enter name:Smith                                                                                                          

last character of string is: h

You might be interested in
The vertical and horizontal scroll bars can be used to aid in navigation throughout the document. true or false
Triss [41]

Answer: True

Hope this helps :)

7 0
3 years ago
Read 2 more answers
A canister is released from a helicopter 500m above the ground. The canister is designed to withstand an impact speed of up to 1
Lisa [10]

Answer:

a) h = 1/2 gt² b) 99 m/s c) 14.1 m/s

Explanation:

a) As the only force acting on the canister once released is gravity, as it is constant, we can use one of the kinematic equations, as follows:

h = h₀ + v₀t + 1/2a t²

As we are told that the canister is simply released, it means that v₀ =0.

If we choose the direction of the acceleration (downward) as positive ,and we select the height at which it was released as our origin, so h₀ =0, the final expression for height is as follows:

h = 1/2 g t²

b) Combining this equation with the expression of t, from the definition of acceleration as the rate of change of velocity, we arrive to this expression:

vf² - v₀² = 2 g h  

As v₀ = 0, we have v₀ = √2.g.h = √2.9.8.500 m²/s² = 99 m/s

c) In order to be able to break the canister, impact speed must be larger than 100 m/s.

So, we can use the same equation as above, putting vf=100 m/s, and solving for v₀, as follows:

v₀² = vf² - 2.g.h = 100² m²/s² - 2.9.8.500 m²/s² = 200 m²/s²

v₀ = √200 m²/s² = 14.1 m/s

For any value of v₀ just barely larger than this, the canister will be broken.

7 0
3 years ago
What describes the current cloud landscape for business?
KonstantinChe [14]

Answer:

Organizations need to change the vast majority of their tasks to the cloud to stay competitive describes the current Cloud landscape for business

Explanation:

All cloud computing frameworks are effectively open over the web with minimal requirement for actual equipment other than cloud servers at the back end.

5 0
3 years ago
HELP ME!!!!!!!!!!!!
slavikrds [6]

Answer: c

Explanation: because that’s the group it’s under

6 0
4 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
Other questions:
  • What is the correct order of network types when categorized by their size or the physical area they cover, from largest to small
    5·1 answer
  • Select the correct answer.
    5·1 answer
  • Which was the first media-sharing website that allowed users to submit their own work on the site?
    7·1 answer
  • which of the following uses technical and artistic skills to create visual products that communicate information to an audience?
    14·1 answer
  • 2) Show the decimal equivalent of each of the numbers if they are interpreted as (4 answers): 11001101 01101001 a. Unsigned bina
    15·2 answers
  • If you want three vertical sections of text on your page, create _____. dividers columns page breaks bulleted lists
    7·2 answers
  • 4. Use the information under the Nutrients That the Human Body Needs title to create a multilevel list. Your list should meet th
    8·2 answers
  • Create a python code with 5 circles, 5 polygons, 5 line commands, 2 for loops, and 1 global variable
    12·1 answer
  • I don 't have a question but i want to use video filter but when i click it there was no frames i want to use it .Please
    8·2 answers
  • If you are going to develop a special computer, what would it be and explain it's purpose.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!