1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
4 years ago
5

Assume that name has been declared suitably for storing names (like "amy" , "fritz" and "moustafa") write some code that reads a

value into name then prints the message "greetings, name! ! !" where name is replaced the value that was read into name. for example, if your code read in "hassan" it would print out "greetings, hassan! ! !". **please ignore the spaces between the exclamation marks( ! ! ! )**
Computers and Technology
1 answer:
tamaranim1 [39]4 years ago
3 0
Name = "Bob"
# or you can prompt the user to enter their name:
# name = input("What's your name? ")

print("greetings," , name)
You might be interested in
What are two best practices for discovering whether a message you’ve scheduled with Hootsuite has failed to send?
never [62]
I think:
<span>  C)  Regularly check Publisher's 'Rejected' Tab  <span>D)  Enable email notifications for failed messages under Preferences</span></span>

But I am not sure.
4 0
3 years ago
Read 2 more answers
Helloooooo people, thats all I just wanted to say :D​
Salsk061 [2.6K]

Answer:

Hi also thank you for the points very much appreciated.

6 0
3 years ago
What is this type of car?
Butoxors [25]
Nissan titan crew cab sv png
4 0
3 years ago
Read 2 more answers
Listen up peeps i need a volunteer got it
miv72 [106K]

Answer:

volunteer for what?

Explanation:

depending on what it is I'm down lol

4 0
3 years ago
Read 2 more answers
A reflective attack can be increased in intensity by combining it with what type of attack
Svet_ta [14]
​A reflective attack can be increased in intensity by combining it with an amplification attack.
The amplification attack is a distributed denial of service (DDos) attack<span>. 
</span> A DNS look-up request is sent using the spoofed IP address of the target to vulnerable DNS servers.<span> </span>
6 0
4 years ago
Other questions:
  • Store shelves are empty during periods of Excess Demand. What is another term for Excess Demand?
    8·1 answer
  • Universal containers has included its orders as an external data object in to Salesforce. You want to create a relationship betw
    7·1 answer
  • To add another worksheet to an Excel file, click on the _____
    15·1 answer
  • House real estate summary Sites like Zillow get input about house prices from a database and provide nice summaries for readers.
    11·1 answer
  • Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
    9·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    10·1 answer
  • What happens when the data in an investigation does not support the original hypothesis? The scientist gives up and starts an in
    10·2 answers
  • Windows 8 has a built-in antivirus program called
    10·1 answer
  • Write a program whose input is two integers, and whose output is the first integer and subsequent increments of 5 as long as the
    10·1 answer
  • Write a program to find the principle amount​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!