1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serious [3.7K]
3 years ago
12

python. create a program that asks the user to input their first name and their favorite number. Then the program should output

the user's name and favorite number in the following format: "[first names]'s favorite number is [number]!"​
Computers and Technology
1 answer:
blondinia [14]3 years ago
7 0

name = input("What is you name?")

fav_number = input("What is you favorite number?")

print(name + " your favorite number is " + fav_number + "!")

You might be interested in
The diagram shows the positions of the Sun, Earth, and Moon during each moon phase. When viewed from Earth, at what point does t
goldfiish [28.3K]

Answer:

B

Explanation:

when it is on the same side of Earth as the Sun because it appears all black because of the shadow

7 0
2 years ago
What is the group scope for domain admins, domain controllers, and domain users default groups?
Igoryamba
The group of domain admins, domain controllers, and domain users default group is global. Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
4 0
3 years ago
True or false? The largest component of a database is a field.
Sergio [31]
Maybe true,or maybe false,you never know.
7 0
4 years ago
Read 2 more answers
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Whic
OlgaM077 [116]

Answer:

'Urgency' is the name of this type of social engineering attack.

Explanation:

Social engineering attack describes a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

In 'Urgency attacks', the attacker uses some sort of emergency or urgent situation to get someone/people to do what they want or divulge a piece of information.

Hope this Helps!

5 0
4 years ago
What can you find the under the privacy policy section of a shopping website?
masya89 [10]

The privacy policy will tell you what the site will do with your information.

7 0
3 years ago
Other questions:
  • Omar’s teacher has asked him to send her a PDF copy of his presentation via email.
    11·1 answer
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
    12·1 answer
  • How do you take a screen shot with a toshiba computer?
    13·2 answers
  • ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Question 41 options:
    10·1 answer
  • Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natura
    6·1 answer
  • What is a non-example of job skill
    13·1 answer
  • Create an array class consisting of a static array of three elements, and describe it in such a way that the Point and Vector cl
    8·1 answer
  • How does equal employment opportunity apply to nursing practice?​
    9·1 answer
  • What should you commit to your family members?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!