1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
4 years ago
6

Define a function make_demanding that consumes a string and returns a new, more demanding string. To make a string more demandin

g, add the string ", now!" to the end. For example, the string "Pass the butter" would become "Pass the butter, now!". Note: Your function will be unit tested against multiple strings. It is not enough to get the right output for your own test cases, you will need to be able to handle any kind of non-empty string.
Computers and Technology
1 answer:
jasenka [17]4 years ago
7 0

Answer:

The program to this question can be given as:

Program:

def make_demanding(x1): #define a function.

   x1 = x1 + ", now!"   #add value in x1 variable

   return x1  # return value.

print(make_demanding("Pass the butter")) #call function and print message.  

Output:

Pass the butter, now!

Explanation:

The description of the above python program as follows:

  • In the above program, we define a function that is "make_demanding". In python, we use the def keyword to define a function in this function we pass a variable that is "x1".
  • Inside a function we use the passed variable and add a value to this variable that is ", now!" and return its value.
  • Then we use the print function that is used for print value on the console screen. Inside the print function, we call the make_demanding method and pass the string value in a parameter that is "Pass the butter".

You might be interested in
Suppose L is a LIST and p, q, and r are positions. As a function of n, the length of list L, determine how many times the functi
xz_007 [3.2K]

Answer:

Explanation:

  p := FIRST(L);

  while p <> END(L) do begin

      q := p;

      while q <> END(L) do begin

          q := NEXT(q, L);

          r := FIRST(L);

          while r <> q do

              r := NEXT(r, L)

      end;

      p := NEXT(p, L)

  end;

5 0
3 years ago
True or false: in order to keep yourself and co workers safe, you must be able to recognize electrical hazards
solong [7]
I believe it’s true
8 0
3 years ago
Read 2 more answers
Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
Minchanka [31]

Answer:

Shut down the computer.

Explanation:

l hope it help

4 0
3 years ago
Read 2 more answers
Someone help me I don’t know what to do /COMPUTER SCIENCE
nydimaria [60]
It kind of depends on the intended language, but I can see the following mistakes:

- lines not terminated with a semicolon (but not all languages require this)
- while statement missing parenthesis, ie., while (num1 <= num2), also not required in all languages
- statements below the while statement must be grouped by curly braces
- num1+5 should be num1=num1+5 or num1 += 5

Output will be:

10
15
20
25
30
5 0
4 years ago
Explain default dictionary in microsoft word​
seraphim [82]
The default custom dictionary is the dictionary to which Microsoft Word adds the word when you do this.
4 0
3 years ago
Other questions:
  • The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
    13·2 answers
  • What is the output <br>this is a computer science question ​
    8·1 answer
  • Select all that apply.
    9·1 answer
  • PLEASE HELP! 2D Animation!
    12·1 answer
  • What is an appropriate action when an email thread becomes long?
    6·1 answer
  • Networks, partnerships, and joint ventures are an example of
    7·1 answer
  • How do i make a comment on brainly?
    15·1 answer
  • Who addicted to fnaf
    5·2 answers
  • Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
    14·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!