1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
15

You are a librarian! Ask the user for the last names of the authors of the five books they are returning. Print a list of those

names in sorted order.
Here’s what an example run of your program might look like:

Name: Angelou
Name: Adichie
Name: Wolff
Name: Alexie
Name: Ansari
['Adichie', 'Alexie', 'Angelou', 'Ansari', 'Wolff']
Computers and Technology
1 answer:
koban [17]3 years ago
8 0

//Program

====================

librarian1.py

==============

# make a empty list to add user input names

lst = []

for i in range(5):

   # take input from the user  

   auth = input("Name: ")

   # append user input name into the list

   lst.append(auth)

# sort the list

lst.sort()

# print the list

print(lst)

==============================================

//Output

 

You might be interested in
You work administrative assistant in an engineering firm. A co-worker constantly makes fun of the engineers by whispering commen
victus00 [196]

Answer:

<u>BEST</u>

Option 4

<u>WORST</u>

2

Explanation:

Option 4 is the best cus confronting is better than just watching and letting it happen which in option 2 that's the case

4 0
3 years ago
Which of the following terms best describes the product development life cycle process?
RUDIKE [14]

Answer:

D

Explanation:

Evaluative

3 0
3 years ago
Read 2 more answers
Which types of attacks are thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and spe
lesantik [10]

The types of attacks that are known to be thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and special characters are said to be Brute Force Attacks.

What is Brute Force Attacks?

This is known to be an attack that is said to be a very  crude type of attack and it is often seen as a brute-force attack.

Note that is one that does not depend on lists of passwords, but it is one that often tries all the  very possible combinations of permitted character types.

Hence, this type of attack was known to be historically seen as ineffective, and it is said to be The types of attacks that are known to be thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and special characters are said to be Brute Force Attacks.

Learn more about Brute Force Attacks from

brainly.com/question/17277433

#SPJ1

3 0
2 years ago
Subcribe to me for brainly my YT is KeepUsweatin
Flura [38]

Answer:

Ok got you. Will do so. Mine is Phantom Pac.

5 0
3 years ago
The process of executing a program is also called ________.
irga5000 [103]
It is also called running it.  Hope this helps!!!
5 0
3 years ago
Other questions:
  • Which of the four basic functions of a computer refers to the collection of data by a computer?
    11·2 answers
  • This is for the folks that is rude:
    12·1 answer
  • With which type of media are you interacting when you read an online shopping website?
    7·1 answer
  • Is it necessary that every autonomous system use the same intra-AS routing algorithm? Why or why not?
    10·1 answer
  • What are 2 main differences betweenarrays andstructs?
    7·1 answer
  • What does the revolver do computer science​
    9·1 answer
  • Describe the uses of computer in different fileds? please help me ​
    14·1 answer
  • Fill in the word to complete the sentence.
    10·1 answer
  • Most of the internal operations in a computer use hexagonal numbering true or false
    13·1 answer
  • High-level languages must be translated into machine language before they can be executed. _________________________
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!