1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
10

Fix the regular expression used in the rearrange_name function so that it can match middle names, middle initials, as well as do

uble surnames.
Computers and Technology
1 answer:
marysya [2.9K]3 years ago
7 0

Answer:

name = re.search(r"^([\w \.-]), ([\w \.-])$", list_name)

Explanation:

Regular expression is used to simplify the mode in which items in a data structure are for. It uses wildcards as shortcuts.

The python module for regular expression is 're'. The import statement is used to get the module and the search() method of the module is used to get the one matching item while the findall() method is used to get a list of all the matching items in a data structure.

You might be interested in
Guys im getting the ps5 tomorrow :)​
Paha777 [63]

Answer:

lucky mf

Explanation:

5 0
2 years ago
Read 2 more answers
If you have two tasks x and y, with y being a successor to x, if we mark x as undone (because it needs to be redone for some rea
Ierofanga [76]

Answer:

idk

Explanation:

sorry

7 0
3 years ago
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
Darya [45]

Answer:

Hardware security module.

Explanation:

Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.

It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.

8 0
3 years ago
When creating a query using the query design command, first you must ____?
Doss [256]

You must first locate the queries group on the create tab. This tab contains the commands used to create queries. MS Access will switch itself to the query design view. A show table dialog box will appear and you will be able to select a table you would want to run a query on.






5 0
3 years ago
After a system is released and the user base grows, the demands on the development and support team will ______.
otez555 [7]

After a system is released and the user base grows, the demands on the development and support team will increase.

The development team can scale vertically by adding new people to the team.

6 0
3 years ago
Other questions:
  • The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i
    7·1 answer
  • What is the benefit to displaying the merge codes in a document?
    9·1 answer
  • A method that receives a two-dimensional array uses two ____ pairs following the data type in the parameter list of the method h
    11·1 answer
  • 3n - 12 = 5n - 2<br> how many solutions?
    15·1 answer
  • 334. Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants t
    12·1 answer
  • Was just testing how this works, no actual question; feel free to take the points anyways though. ​
    13·1 answer
  • Help brainliest True or False
    10·2 answers
  • Perceptron simplest definition
    14·1 answer
  • write a program that asks the user for a month number and displays the number of days that month has?
    7·2 answers
  • At the heart of every computing device is a(n) _______________, which is usually a single, thin wafer of silicon and tiny transi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!