1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
13

What is the output?

Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
5 0

Answer:

Following are the modified code to this question:

phrase = "Hi Dad"#defining a variable that stores a string variable  

print(phrase.lower())#Use print method that use lower method to print value in lower case

Output:

hi dad

Explanation:

In the above python code, a phrase variable is declared, that store a string value "Hi Dad", and in the next step, a print method is used, and inside the method a lower() method is used, in which it converts the string value into the lower case, that's why the above code output is "hi dad" into the lower case.

You might be interested in
Bob works at a cafe where he earns $11 an hr. which of the following graphs describes the amount of money that bob earns after x
Sergio039 [100]
Where are the graphs?
8 0
3 years ago
Read 2 more answers
1
Leno4ka [110]

Answer: A) Who will use the database?

4 0
2 years ago
Read 2 more answers
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
Amiraneli [1.4K]

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

7 0
3 years ago
PLEASE HELP
kap26 [50]

Answer:

dog

Explanation:

The python program has four lists, A, B, C, and E which is a list of the first three lists. Lists are unordered indexed data structures, it is accessed by an index starting from 0 to n (which is the length of the list minus one).

The E list is a list of lists with three list items starting from index zero to two. E[0][1] is used to access the item "dog" in the first list item of the E list.

3 0
3 years ago
The master system database stores a database template that is used as a blueprint when creating a new user database.
Novay_Z [31]
<span>An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a</span>
6 0
3 years ago
Other questions:
  • In your own words, describe the structure and function of both the stack and queue data structure and discuss how they are diffe
    6·1 answer
  • Combination lock uses three numbers beween 1 and 36 with repetition , how mant combinations are possiable
    6·1 answer
  • Was the type writer the first part of the keyboard? ​
    8·1 answer
  • 次のうち、ビジネスレターに適したフォントとポイントサイズの選択はどれですか?<br> 私を助けてください!私はあなたを最高にブランコにします!
    12·2 answers
  • Create an array named itemDescription containing the following item descriptions:
    15·1 answer
  • A command, such as a button or keyboard shortcut, that performs a specific task is known as a
    9·2 answers
  • SLA:
    14·1 answer
  • In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.
    7·1 answer
  • Chức năng của hàm MOD(number, divisor)?
    7·1 answer
  • What is a for command? can u use a variable instead of a number in the for command!<br>​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!