Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space and your first name.

Answers

Answer 1

Answer:

def name_string( name ):

     user_name = name

     split_name = user_name.split(" ")

     list( split_name )

    print ( split_name[ 1 ], ", ", split_name[ 0 ] )

# the test should print out " Turing, Alan"

name_string ( " Alan Turing " )  

Explanation:

The python function above should print out the reverse of a name and surname and separated by a comma.


Related Questions

What peripheral port type was originally developed by Apple and is currently regarded as the optimal interface for digital video transfer

Answers

Answer:

IEEE 1394

Explanation: Common port used for video preipherals and other video transfer

Exploits are gaps, holes, weaknesses, or flaws in corporate networks, IT security defenses, user training, policy enforcement, data storage, software, operating systems, apps, or mobile devices that expose an organization to intrusions or other attacks. Select one: True False

Answers

Answer:

The answer is "False".

Explanation:

In the given question, the answer is false because it stands for " vulnerability", that is an application hole, that is used to design the implementation of the errors.

It enables a hacker to damage the application's investors. The device owners, application users as well as other groups dependent on this software, which include stakeholders, that's why we don't use this application in the cybersecurity  

A hard drive or solid state drive that is physically installed inside of a workstation would generally be considered to be what type of storage?

Answers

Answer:

Answered below

Explanation:

A secondary storage device, also called external storage or auxiliary storage device, is a non-volatile, internal or external storage device. They are storage devices that are used to store data permanently and can be used to store large amounts of data. Applications and programs in a computer, such as operating systems, drivers, files, applications etc are stored in the secondary storage device.

Examples of these devices include;

Hard disk drives, solid-state drives, CD-ROMS, DVD, Google drive, USB flash drive etc.

A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

Answers

Answer:

Search engine

Explanation:

A search engine is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

Search engine are softwares that helps users look for information on the internet in a systematic way. It makes information easily available for users.

Search engines allows the users to have access to different perspective about their inquiries. It provides users with information from web pages, images, videos, articles, research paper.

Examples of search engines includes: Google, Bing, ask.com, Yahoo etc.

"The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a centralized manner is a feature of what Windows Server 2012 R2 service?

Answers

Answer:

Active Directory

Explanation:

The 2012 R2 Windows Server  is the 6th version of  Windows Server server operating system which is made by Microsoft. It is a part of the Windows NT family of the operating systems.

Active Directory helps to store the default user profiles as well as the user login scripts.

It helps to assign the system policies, assign  permission to the users overt he network resources and also to deploy software in a centralized manner.

Which of the following is something that an information technology (IT) professional would do? A. build and repair computers B. create and improve software C. collect and utilize data D. manage grades and enrollments

Answers

I believe it’s letter C because that’s the only one that makes more sense

complex machines are defined by...

Answers

Answer:

A complex machine is a machine made up of two or more simple machines that make your work easier to do. There are six simple machines from which all complex machines are made.

Examples:levers, wedges, pulleys, screws, wheel and axle and inclined planes.

Hope this helped you!

Explanation:

Answer:

complex machines are 2 or more machines combined together to make a new one and make your work easier to do. examples of this would be levers, inclined planes and even car jacks.

Explanation:

Customer Service. Is an organization's ability to _______ customers

Answers

Answer:

Serve

Explanation:

Customer Service

Answer:

At its most basic level, customer service is an organization's ability to supply their customers' wants and needs. But this definition leaves out the transactional nature of customer service, and it's this transactional aspect that drives customer loyalty.

Explanation: Hope this helps!

In a distributed database system, the data placement alternative with the highest reliability and availability is Group of answer choices

Answers

Answer:

fully replicated

Explanation:

In a distributed database system, the data placement alternative with the highest reliability and availability is fully replicated. Hence, option B is correct.

What is a distributed database system?

A distributed database (DDB) is an organized group of databases that are geographically dispersed among locations in a computer network. A distributed database management system (DDBMS) is a piece of software that controls a distributed database while making the users unaware of the distribution characteristics.

A distributed database is essentially a database that is dispersed across numerous sites, i.e., on various computers or over a network of computers, and is not restricted to a single system. A distributed database system is spread across numerous locations with distinct physical components.

In data warehousing, where enormous volumes of data are processed and accessed by several users or database clients at once, DDBMS is frequently utilized. To manage data in this database system,

Thus, option B is correct.

For more information about distributed database system, click here:

https://brainly.com/question/29896580

#SPJ5

The options were missing-

A. centralized

B. fully replicated

C. strictly partitioned

D. hybrid

explain where and why metallic material or non metallic material have been used in your home​

Answers

Answer:

Metallic and non-metallic material use for various purposes at home.

Explanation:

Metals play an essential role in our lives. They used while constructing houses as a support to it. It's also used for architectural (building) purposes include frames, pillars, water pipes, roofing, and windows. Copper used for making electrical wires. Aluminium for making electrical cables, packaging, and cooking utensils. Iron application, including roofing and decoration.

Metallic materials are inorganic substances such as iron, copper, aluminium. Non-metallic elements, such as carbon, nitrogen, and oxygen. Carbon used in the form of diamonds and graphite. Hydrogen is used daily as a gas.

which information purpose uses video from a security camera?

Answers

Answer:

robbery

Explanation:

it records a robbery so that police can later find out who did it

the program is not going into the if loop but directly in the else one and is saying 'wrng answer' even if it is right. where is the problem? (i will give brainliest please HELPPPPPPPP) this is python btw

Answers

Answer:

convert the input to an integer:

 ans = int(input(str(num1)+"+"+str(num2)+"="))

Explanation:

Your code is comparing an integer to a string, which will always return false. If you cast your input to an integer using the int() function, your problem should be solved.

. Which of the following is not advantages of computer network? *

i. Data or program can be shared
ii. All Hardware devices can be shared
iii. Data processing is faster and economic
iv. None of them

Answers

Answer:

My answer is Data or program can be shared.

Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies?

Answers

Answer:

The correct answer will be "Mandatory access control".

Explanation:

MAC seems to be a security standard protocols limited by the designation, initialization including verification of the systems. These policies and configurations are implemented through one centralized controller and therefore are accessible to the system admin.MAC establishes and maintains a centralized implementation of sensitive requirements in information security.

briefly explain about five kinds of network topology ​

Answers

Answer:

The mapping of the LAN (local area network) is design called as Topology.

Explanation:

The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.

(1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.(2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.(3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.(4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.(5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.Mesh routing is network requirement and has information of the broken links.Mesh flooding is transmitted to the all computer network and leads to load over network.

​Most online auction sites offer merchandise that is the property ____, much as an auctioneer would at a public auction.

Answers

Answer:

The answer is "of others".

Explanation:

The auction site has become a service, in which auction clients or members are using the internet to buy or sell goods and services.  

These sites use the different auction sites, which include forums for consumers, operated by multiple software, that's sale forms also recognized as a virtual auction. These sites sell items owned by the others, which is an auctioneer does at a public auction.

Why can repitition be used in emphasis.

Answers

Answer:

Repetition is an important literary device because it allows a writer or speaker to place emphasis on things they choose as significant. It tells the reader or audience that the words being used are central enough to be repeated, and lets them know when to pay special attention to the language.

Which of the following is NOT a semantic reason for using header tags
A. They establish a hierarchy of information
B. They serve as headlines to new sections or subsections of content
C. They convey a search engines that they contain important information
D. They make text larger and bold

Answers

Answer:

The correct option is;

C. They make text larger and bold

Explanation:

The semantic reasons for using header tags which are the benefits users derive from including header tags in content published on the web includes;

1) They give structure to the writing included in the document

2) Header tabs allow text to be broken into sections with different content in focus

3) Header tags are used to add key words to a page

4) To boost search engine optimization SEO

5) To improve visibility.

What does this road sign mean?

Answers

Answer:

Speed limit 50 ahead

Explanation:

Speed limit is 50 up

who designed analatic engine in the 1930's?​

Answers

Answer: Charles Babbage

Explanation: English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine. Although it was never completed, the Analytical Engine would have had most of the basic elements of the present-day computer.

Hope this helps^^

Write statementsto show how finding the length of a character array char [ ] differs from finding the length of a String object str.

Answers

Answer:

Length of char array: sizeof(arr)

Length of a string object: myString.length()

Explanation:

The sizeof approach is generally not recommended, since this information is lost as soon as you pass the array to a function, because then it becomes a pointer to the first element.

What is qwerty and why is it on the keyboard?

Answers

Answer:

qwerty is the main way people sort out there keyboard as you can see on the left side of the keyboard there is W,A,S,D

Explanation:

AnswerQWERRTY

Explanation:

EEEEEE

Match each of the following software categories to its primary use:

I. entertainment
II. enterprise resource planning
III. database
IV. video-editing
V. word processing

a. manage back end business functions
b. write and edit documents
c. play games
d. edit movies
e. keep track of clients

Answers

The answer is yes and ya know I gotta ask for a better idea to make it look so good omg was the year it wasn’t so bad bruh was a little fun but it wasn’t so hard omg was the first day I had a dream that you were gonna kiss me

The computer models used to predict past climates include only natural causes; the predicted temperatures and the actual measured temperature data diverge starting about ______.

Answers

Answer:

The answer is "1960".

Explanation:

A computer model is a software program, which simulates what else will scenario. These services are often used in areas in chemistry, industry, and research, like physics, biology, and the environment.  

Climate observations enable you for the measurement of its average long-term conditions, giving insight into the environment or even a region. Comprehensive weather data have also been maintained for over 140 years in several parts of this country. It can identify trends and patterns across all these long-term records.

What do production designers have to have extensive knowledge of when they are involved in the production of a motion picture?

A. The era in which the story happens
B. The place in which the story is set
C. The movie’s characters
D. All of the above

Answers

Answer:

The correct option is;

D. All of the above

Explanation:

The role of a production designer in film and television production involves portraying the generally perception and appearance of the narrative. The production designer is responsible for addressing the viewer perception of the location, the period in time of the narrative about the leading character, the depiction of the acts of the and experiences of the characters and the reason for their acts and experiences.

The production designer have an essential role in movie production and television programming and they work first hand with the motion picture cinematographer, director and producer.

Answer:

All of the above

Explanation:

edg2021

The production designer must have a solid understanding of many aspects of the film’s production. Location and time period of a film are especially important from a production design perspective, as is the amount of money available for production design. This means A and B are 100% correct, so all of the above is the only one.

Vocab Bank
Copyright, license, fair use, creative commons, plagiarize, piracy, creative work, public domain
1. Amy decided to her paper for class by copying and pasting from Wikipedia and saying she wrote it.
2. Because Zoe used a small amount of a movie in a remix video she made that pokes fun at the main
character, she could say it's
3. Robbie found a photo in the that's no longer copyrighted, so he could use it however he wants
4. Angela has a Flickr page with all of her photos, and in order to define for others how she wants her photos
to be used, she created a copyright that is listed on her page.
5. Alex had an idea for a poem in his head for the longest time, but once he finally wrote it down it instantly
had a
6. Eric uses a program where he "rips" movies and burns" them to DVDs, which he then sells to friends.
What Eric is doing is called
7. When Dwayne used a kind of copyright to make it easy for others to copy and share his video, he was
using
8. Books, movies, music, websites, games, and pieces of art are all examples of

Answers

Explanation:

what are the words.........

In Microsoft Excel, you are working with a large worksheet. Your row headings are in column A. Which command(s) should be used to see the row heading information in columns X, Y, and Z?

Answers

Answer:

The answer is "freeze panes command".

Explanation:

To see the row heading information into the columns "X, Y, and Z" we use the freeze panes command, which Pick's the cells from rows and on the right side of the columns, where you scroll.  

This tool allows you to block columns/row headings so, the first column /or top row will stay on the screen and you also scroll down or over to see the rest of the panel.

When registering a new domain name, either the registrar's servers or self-owned servers can be used as name servers. What function will the name servers provide for the domain?

Answers

Answer:

Authoritative

Dig Into DNS

Explanation:

In the above question that which function will the domain receive from the name server is an Authoritative functions because it is the server that issues command to the domain

The full meaning of Dig in this context is Domain Information Groper which is refer to the administration command line instrument which is use in the navigating and querying of the Domain Name System,and which is also used for verifying and troubleshooting any Domain Name System issues.

A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.

Answers

Answer:

Engineering

Explanation:

Because they are the one who create software applications

During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful information.

Answers

Answer: processing

Explanation:

During the processing steps of the information processing cycle, data is manipulated, calculated, or organized to create useful information.

At this stage, the data that has been gotten will have to be worked on by manipulating it, making necessary calculations in order to get a useful information out of it.

Answer: processing

Explanation: got it right on edgen

Other Questions
Analyze the logical statements to fill in the missing information.1. If a line is horizontal, then it has a slope of 0.Hypothesis:Conclusion:2. A vertical line has an undefined slope.The statement in equivalent "if-then" form would be:Hypothesis:Conclusion: g The financial friction: Group of answer choices is equal to zero when the economy is in its long-run equilibrium. The members of a cooking club are making cakes, which they will sell at a street fair for $9 apiece. It cost $50 for a booth at the fair, and the ingredients for each cake cost $4. At some point, the club members will sell enough cakes so that their sales cover their expenditures. How much will the sales and expenditures be? what number sets or set does 11 belong to? Why does paper "brown" after a while? You have to simplify this expression.-2x+3-(5-6x) CHow do ancient maps differ from modern maps?Ancient maps focused only on the physical features of small areas.O Ancient maps were two-dimensional and less accurate than modern maps.O Ancient maps were carved in clay and could display political boundaries only.O Ancient maps depended on creators' artistic abilities to show their subjects correctly. what is a dramatic license At walmart, a bar of soap costs $3.96 plus 8% sales tax. What is the total cost of a bar soap? Round to the nearest cent. Hi! My question is attached, please help me fast, this is a timed test and I'm desperate. 05. The time required to complete one lap around a perfectly circular track having a radius of 1,835 meters is 86seconds. What is the car's velocity? please help! Write about 5 themes of geography essay Use Lagrange multipliers to minimize the function f(x,y,z)=x2 +y2 +z2subject to the following constraint: x+y+z-24=0Assume that x, y, and z are positive Two items are omitted from each of the following three lists of cost of goods sold data from a manufacturing company income statement. Determine the amounts of the missing items, identifying them by letter. Finished goods inventory, June 1 $64,900 $18,800 (e) Cost of goods manufactured 331,000 (c) 65,800 Cost of finished goods available for sale (a) $178,600 $103,400 Finished goods inventory, June 30 76,800 37,500 (f) Cost of goods sold PLEASEEEEE HELPPP MEEE WITHH THIS QUESTIONN PLEASEEE Use the simple interest formula to determine the missing value. p=?, r=6%, t=9 months, i=81 Which table represents a linear function? sorry im dumb ;w; how to do this question plz answer me step by step plzz Write the function g(x) as a transformation of the parent functionf(3) = |sc|, where the graph has been vertically compressed by a factor of, shifted right 2 units, and shifted up 10 units.A g(x) = 12 +2] +10B g(x) = {\2 + 101 2C g(x) = - +2] + 10D g(x) = 42-2/+10 Solve 3/5 + 3/2 (Btw it can only be shown as a mixed number)