1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
14

Write a program named split_me.py that accepts a string in the format Age.FirstName and returns the value FirstName is Age years

old. Length of Mary is X. Example: 22.Mary >> Mary is 22 years old. Length of Mary is 4
Computers and Technology
1 answer:
zmey [24]3 years ago
5 0

age,name = input('Enter a string: ').split('.')

print(name+' is '+age+' years old. Length of '+name+' is '+str(len(name)))

I wrote my code in python 3.8. I hope this helps.

You might be interested in
You have just replaced the NIC on a server, making no other changes. It can communicate with all the computers on its network bu
Darina [25.2K]

Answer:

Option C is the correct option.

Explanation:

When any user or the person change NIC from the server then, the following person is unable to make changes at that place and he exchange their information with the systems on its network because ARP cache stores all the previous Mac address entries through the remote computer. So, that's why the following option is correct according to the statement.

5 0
3 years ago
What type of e-mail typically lures users to sites or asks for sensitive information?
Evgen [1.6K]

The  type of e-mail typically lures users to sites or asks for sensitive information is phishing.

<h3>What is a phishing email?</h3>

Phishing is a type of internet scam where cyber hackers impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.

This criminals usually send an email link mimicking the company .

The aim of the email is to get sensitive information in order to access your funds or private information.

learn more on phishing email here: brainly.com/question/14954901

#SPJ11

8 0
1 year ago
Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
Stolb23 [73]

The high-speed fiber network that is already in place and being used for wide area networking (wan) transmissions, before the IEEE developed the 10gbe ethernet standards is called SONET.

<h3>What does SONET stand for in networking?</h3>

SONET  is known to be a term that is called Synchronous Optical Network.

This is said to be defined as a standard  that is known to be used in linking or in the act of connecting fiber-optic transmission systems and it is one that is sold in North America only.

Therefore, The high-speed fiber network that is already in place and being used for wide area networking (wan) transmissions, before the IEEE developed the 10gbe ethernet standards is called SONET.

Learn more about fiber network from

brainly.com/question/26259562
#SPJ1

8 0
1 year ago
Que son los sistemas de control con retroalimentacion
iren2701 [21]
Existen 2 clases comunes:
sistema de lazo abierto: la salida no efecto sobre el sistema
sistema de lazo cerrado: la toma de desiciones del sistema de la entrada si no también de la salida
5 0
3 years ago
Which tool is used to view stars in galaxies far from the Milky Way?
Rom4ik [11]
<span>The tool iused to view stars in galaxies far from the Milky Way is the B. Hubble Space Telescope. This telescope is one of the largest telescopes to be launched in space, and has contributed a vast amount of discoveries and data that are valuable in astronomical research. The telescope is able to capture image intense high-resolution images, capturing entities from large distances.</span>
7 0
3 years ago
Other questions:
  • Who was the 1st person to use the term television
    11·1 answer
  • Susan is keen to learn various safe ways to browse the Internet. She is looking for suggestions that would help her. Which activ
    15·2 answers
  • Before his job interview, Shabnam took the time to carefully wash and iron his best khaki pants and a button-down shirt. He even
    15·2 answers
  • In UNIX, how do I set the permissions on MyProgram.py to: rwx---r-x?
    7·1 answer
  • Briefly summarize two examples of cybercrime stories.<br> quick pleaseeee
    10·1 answer
  • A Raycast returns a float that tells you how far away an Object is
    8·1 answer
  • An automated service that consolidates and distributes information from newsgroups, blogs, forums and news websites is called
    11·1 answer
  • How did punch cards improve the weaving process?
    11·1 answer
  • The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
    5·1 answer
  • 1.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!