1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
3 years ago
11

Type two statements.

Computers and Technology
1 answer:
UNO [17]3 years ago
7 0

Answer:

Following are the program in Python langauge

person_name = input() # Read the person name by the user

person_age=0  #declared a vaiable person_age  

person_age = int(input()) # read person_age by the user

person_age=person_age+5  # add 5 to person_age

print('In 5 years',person_name,'will be',person_age) # display the output

Output:

  Amy

   4

   In 5 years Amy will be 9

Explanation :

Following is the description of code:

  • Read the value of the "person_name" variable by the user by using the input function.
  • Declared a variable person_age and initialized 0 with them.
  • Read the value of "person_age" variable by user by using input function and convert into int by using int function
  • Add 5 to "person_age" variable and store again them into the "person_age" variable.
  • Finally, display the output which is mention in the question.
You might be interested in
ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1
larisa86 [58]

If a router tried to match a packet sourced from IP address 1.1.1.1 using this ACL, the first statement will be used.

a. First

<u>Explanation:</u>

We use ACL technology to make basic security level in the network.  ACL is strictly used to update the routing in the network and make sure network pears and make sure the flow control for network traffic is followed.

Since it is routing ip address through ACL statement. It all depends on how the network engineer routed the traffic in the network. A packet with source IP address 1.1.1.1 would match any of the three explicitly configured commands described in the question. As a result, the first statement will be used.

The router searches the ACL statement by order and when the match is found it stops execution of the ACL statement that will match with the first occurrence.

7 0
3 years ago
Advancing technology has made life easier for people and businesses today. Imagine that you have to work for an entire day witho
Advocard [28]

Answer:

Sí gracias a la tecnología estamos conectados, hay personas de escasos recursos que no tienen dinero suficiente para poder comprar internet y los niños, se quedan sin estudio, por eso las autoridades deben ayudar a las personas de escasos recursos, espero que te ayude mi comentario, Bendiciones.

Explanation:

3 0
3 years ago
Free Brainliest Again
REY [17]

Answer:

hi

Explanation:

7 0
3 years ago
Read 2 more answers
If you are inserting an address block with the Address Block dialog box and the fields do not connect automatically, what can yo
erica [24]

Answer: B

Explanation:

5 0
4 years ago
Read 2 more answers
Is a three-prong grounding plug with the third pong broken-off safe to use.
ad-work [718]
What is the answer choices dude
8 0
3 years ago
Other questions:
  • Using the CPI to calculate the inflation rate​ _______________ the underlying inflation​ rate, and using the core inflation rate
    7·2 answers
  • You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w
    7·2 answers
  • 1. According to Rory's paycheck, he earned $800 last month, but before taxes and other deductions were
    12·1 answer
  • Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail
    10·1 answer
  • The most common size for a brochure is _____.
    9·1 answer
  • Big data: options:
    8·1 answer
  • How to use command prompt​
    14·1 answer
  • What is the difference between Counter Controlled iterations and Sentinel Controlled iterations? What is the purpose of the incr
    8·1 answer
  • The metric unit used for length
    5·1 answer
  • Explain what iteration is and why we need it in code
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!