1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
3

In this code, there's a Person class that has an attribute name, which gets set when constructing the object. Fill in the blanks

so that 1) when an instance of the class is created, the attribute gets set correctly, and 2) when the greeting() method is called, the greeting states the assigned name. mtino 1-class Person: 2 - def __init__(self, name): self.name = def greeting(self): # Should return "hi, my name is " followed by the name of the Person. return Run 8 # Create a new instance with a name of your choice 9 some_person = 10 # Call the greeting method 11 print (some_person. ) 12 Press ESC to exit the code block at any time
Computers and Technology
1 answer:
max2010maxim [7]3 years ago
8 0

Answer:

Explanation:

The following code is written in Python. It creates a Person class and creates the constructor which takes in the name of the person for that instance, as well as a greeting method which outputs the desired "Hi, my name is" string with the name of that person. The output of the code can be seen in the attached picture below. I have created a person object called John and called the greeting method so that you can see the output.

class Person:

   name = ''

   def __init__(self, name):

       self.name = name

   def greeting(self):

       print('Hi, my name is ' + self.name)

You might be interested in
Male tiene una bicicleta rosa<br>es biene o es servicio?​
jekas [21]

Answer:

es biene por que es de el no es prestada asi que es biene

8 0
3 years ago
All it services and servers are equally critical. <br> a. True <br> b. False
g100num [7]

False

Not all IT services are equally critical. In an increasingly digital world whereby cyber threats are a big threat, it is vital to prioritize the critical assets in order to achieve digital resilience. This involves building tighter defenses in systems that are critical.

4 0
3 years ago
The first window displayed when you install opensuse is the ____ window.
Jlenok [28]
Is the <span>Boot Options window.</span>
3 0
3 years ago
Who is the orange and white Foxy that looks like Mangle but instead of pink its orange
Helga [31]

Answer:

Its Lolbit

Explanation:

Lolbit is an animatronic from Five Nights at Freddy's: Sister Location. It is a recolored version of Funtime Foxy's disembodied head, appearing as a minor Easter Egg from the main game.

7 0
3 years ago
You purchase a new microphone for your computer to use on S.kype calls. You plug it into the microphone jack, but it doesn’t pic
satela [25.4K]

Answer:

B

Explanation:

Your computer may not have a pre-installed audio input driver or driver corrsponding to said device

4 0
3 years ago
Other questions:
  • When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
    6·1 answer
  • Suppose you define a java class as follows: public class test { } in order to compile this program, the source code should be st
    14·1 answer
  • 1. Which of the following is a drone? (1 point)
    10·1 answer
  • Do you think cyber-bulling is more damaging, as damaging, or less damaging than in-person bullying? Why?
    11·2 answers
  • For each of the following polynomials, apply either the Muller's method or the Bairstow's method to find all real or complex roo
    15·1 answer
  • I need help in raft survival ocean nomad I was traveling and now I can't enter the island or go back home (raft). Please help me
    15·1 answer
  • What if the result of conectivity testing is 100%Loss?Explain.​
    14·1 answer
  • What is one of the benefits of using a library in a program?
    5·1 answer
  • PLEASE HELP ME ASAP!!!!
    11·1 answer
  • quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!