1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
14

Write a program named split_me.py that accepts a string in the format Age.FirstName and returns the value FirstName is Age years

old. Length of Mary is X. Example: 22.Mary >> Mary is 22 years old. Length of Mary is 4
Computers and Technology
1 answer:
zmey [24]3 years ago
5 0

age,name = input('Enter a string: ').split('.')

print(name+' is '+age+' years old. Length of '+name+' is '+str(len(name)))

I wrote my code in python 3.8. I hope this helps.

You might be interested in
Explain the third <br> generation
meriva
Computers were computers that emerged due to the development of the integrated circuit.
8 0
3 years ago
What kind of energy transformation occurs when you call someone on a cell phone?
andrew11 [14]

The <em><u>sound energy into electric energy and then into radiant energy.</u></em>

<em>[That's it]:)</em>

5 0
2 years ago
Basics AutoCare is a small auto service business with two locations in a Midwest (U.S.) city. The business is based on providing
kogti [31]

Answer:

The ER diagram for the auto service is shown in the attachment.

5 0
3 years ago
Which options are available when a user modifies a recurring appointment? Check all that apply. Open this occurrence Open the fi
Rus_ich [418]

Open this occurence and open the series is the two options to choose from, from the dialog box that shows when attempting to modify the appointments

4 0
4 years ago
Read 2 more answers
Which type of computer are todays most widely used personal computers?
iris [78.8K]

Answer:

Windows 10. :)

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • What is a gutter margin?
    5·2 answers
  • Identify the computer cycle in each of the descriptions below by choosing the answer from the
    12·1 answer
  • Please answer this I know that no one else does but I can't think right now
    10·1 answer
  • How much a T-mobile plan cost​
    11·2 answers
  • Who is the intended audience of a pseudocode document?
    14·1 answer
  • 4.11 lesson practice quizz need help on 2 and 3
    5·1 answer
  • What is the outcome when a floating-point number is divided by zero?
    12·1 answer
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • you are asked to create a four-digit code using the numbers from 1 to 9. how many possible codes are there--assuming that number
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!