1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
3241004551 [841]
3 years ago
9

Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas

Computers and Technology
1 answer:
krek1111 [17]3 years ago
3 0

Answer:

name1+","+name2+","+name3

Explanation:

Given

name1, name2 and name3

Required

Concatenate, separated by comma (,)

To concatenate, we simply use the + operator.

So, the expression is:

name1+","+name2+","+name3

You might be interested in
The following program is supposed to display a message indicating if the integer entered by the user is even or odd. What is wro
Lapatulllka [165]

Answer:

A. The function definition must appear before the function is called

Explanation:

Given

The above lines of code

Required

Determine the error in the program

In python, functions has be defined before they are called but in this case (of the given program), the function is called before it was defined and this will definitely result in an error;

<em>Hence, option A answers the question</em>

The correct sequence of the program is as follows:

<em>def evenOdd(n): </em>

<em>      if n % 2 == 0: </em>

<em>            return "even" </em>

<em>      return "odd" </em>

<em>num = int(input("Enter an integer: ")) </em>

<em>print("The integer is", evenOdd(num)) </em>

<em />

6 0
3 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Which of the following is a preferable method to secure wireless access in a SOHO?
NARA [144]
Use a Ghost program follow throught with 2hyttlg5:6\:56
6 0
3 years ago
The "fathers of the internet" are vinton cerf and ________.
Harrizon [31]
Robert E Kahn I hope this helps
8 0
3 years ago
What is the advantage of using a high-level language over machine language for writing computer programs?
Sveta_85 [38]

Answer:

B.  is easier to write programs

Explanation:

High-level languages are most commonly used languages these days. The ease of understanding and writing programs in high-level language has made them very popular. High-level languages are near to human. English words are used to write programs in these languages. So option B is the correct answer..

6 0
3 years ago
Read 2 more answers
Other questions:
  • The source code of a java program is first compiled into an intermediate language called java ____, which are platform-independe
    8·1 answer
  • It’s been six months since the disk crash at CSM Tech Publishing, and the owner is breathing a little easier because you install
    7·1 answer
  • Speeding is one of the most prevalent factors contributing to traffic crashes.
    12·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • Robert's got a quick hand
    8·2 answers
  • define the term computer hardware and its various types mentioning 5 examples of IP or devices with one diagram each​
    9·1 answer
  • This feature in Word Online allows you to view your document to see what it will look like when printed.
    6·2 answers
  • What are some positive impacts technology has on the environment?​
    5·2 answers
  • You are starting a small web hosting business and
    11·1 answer
  • Answer quickly!!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!