1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
monitta
4 years ago
5

HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!

Computers and Technology
1 answer:
Alex777 [14]4 years ago
4 0

#This is a way without a loop

friends = list(map(str,input("Enter Names: ").split()))

print(sorted(friends))

#This is a way with a loop (for&&while)

friends = list(map(str,input("Enter Names: ").split()))

cool = True

while cool:

   cool = False

   for i in range(len(friends)-1):

       if friends[i] > friends[i+1]:

           coo = friends[i]

           friends[i] = friends[i+1]

           friends[i+1] = coo

           cool = True

print(friends)

You might be interested in
" Which technique for representing numeric data uses the mantissa to hold the significant digits of a value?"
UkoKoshka [18]

Answer:

signed magnitude

Explanation:

A numeric value that is approximate consists of a mantissa and an exponent. The mantissa is a signed numeric value, so also is the exponent a signed integer that specifies the magnitude of the mantissa.

4 0
4 years ago
open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
Licemer1 [7]

FTP access is available from other companies, but access is constrained unless the user first authenticates by supplying a user name and potentially a password.

The files are frequently intended for specific uses rather than for public release. For instance, you must send a letter house your consumer address list. Both businesses would not want the public to have access to these materials in this situation. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context. Software refers to the processes and programs that enable a computer or other electrical device to function.

Learn more about software here-

brainly.com/question/985406

#SPJ4

7 0
1 year ago
What are the benefits if you pay off all your high-interest debt such as credit
lesya [120]
D. All of the above
7 0
4 years ago
Read 2 more answers
Who regulates and monitors the activities of all PACs?
yKpoI14uk [10]
The correct answer is letter B. The FEC. The one who regulates and monitors the activities of all Political Action Committees (PACs) is the Federal Election Commission. They are the ones who take in charge of whatever activities of the PACs, and it has to be regulated and be monitored.
3 0
3 years ago
Read 2 more answers
No links it’s just a normal question about iPhones.
Zolol [24]
I’ll give a you a good guess because I’ve only deleted a whole conversation like 3 times. I honestly feel like eventually there will be a warning on deleting the full conversation or on the other hand nothing may happen; or that it will automatically stop you from deleting the conversation.
6 0
3 years ago
Other questions:
  • What is the best programing language I should learn for 3d gaming?
    13·1 answer
  • To create nested lists within each of these topical areas that would contain links to specific pages on the AllStyles website. I
    15·1 answer
  • An abstract method ____.
    6·1 answer
  • The first step in transforming an extended e-r model into a relational database design is to
    14·1 answer
  • NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
    7·1 answer
  • ____ is the amount of effort (usually in hours) required to perform cryptanalysis on an encoded message so that it may be decryp
    8·1 answer
  • ________ programs help solve the problem of running out of storage space by providing lists of application programs, stored vide
    13·1 answer
  • Luke is working on a layout for a catalog. He adds cross lines on the four corners of the layout to mark out a small extra margi
    11·1 answer
  • Complete the following sentence.
    12·1 answer
  • Which command must you use at the command prompt to determine the names of the network interfaces (including the isatap interfac
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!