answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
1 year ago
10

(1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a

single line separated by a space. (Submit for 1 point)
Ex: If the input is:

yellow
Daisy
6
the output after the prompts is:

You entered: yellow Daisy 6
Note: User input is not part of the program output.


(2) Output two passwords using a combination of the user input. Format the passwords as shown below. (Submit for 2 points, so 3 points total).

Ex: If the input is:

yellow
Daisy
6
the output after the prompts is:

You entered: yellow Daisy 6

First password: yellow_Daisy
Second password: 6yellow6

(3) Output the length of each password (the number of characters in the strings). (Submit for 2 points, so 5 points total).

Ex: If the input is:

yellow
Daisy
6
the output after the prompts is:

You entered: yellow Daisy 6

First password: yellow_Daisy
Second password: 6yellow6

Number of characters in yellow_Daisy: 12
Number of characters in 6yellow6: 8
Computers and Technology
1 answer:
denpristay [2]1 year ago
7 0

Answer:Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a single line separated by a space. (Submit for 1 point) Ex: If the input is: yellow Daisy 6 the output after the prompts is: You entered: yellow Daisy 6 Note: User input is not part of the program output. (2) Output two passwords using a combination of the user input. Format the passwords as shown below. (Submit for 2 points, so 3 points total). Ex: If the input is: yellow Daisy 6 the output after the prompts is: You entered: yellow Daisy 6 First password: yellow_Daisy Second password: 6yellow6 (3) Output the length of each password (the number of characters in the strings). (Submit for 2 points, so 5 points total). Ex: If the input is: yellow Daisy 6 the output after the prompts is: You entered: yellow Daisy 6 First password: yellow_Daisy Second password: 6yellow6 Number of characters in yellow_Daisy: 12 Number of characters in 6yellow6: 8

I have tried several different ways of doing this, but I keep getting an error on line 6

Explanation:

You might be interested in
A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
Sindrei [870]

Answer:

The appropriate response will be "Public key".

Explanation:

  • A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms.
  • Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.
6 0
2 years ago
Which of the following best defines the term cross-platform application?(A) A program used to coordinate data sharing among mult
Delicious77 [7]

Answer:

D

Explanation:

An application that runs the same way on multiple operating systems is called

"cross-platform application". For example we develop one application which we are able to execute on windows, Linux without any issues then it is a cross platform application. Our code should be like that it supports multiple Operating Systems

8 0
2 years ago
Read 2 more answers
__________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
umka21 [38]

Answer: Lattice-based, non-discretionary

Explanation: Lattice-based access control is a form of non-discretionary access control in which users are assigned a matrix of authorizations for particular areas of access. Lattice-based access control are usually used to restrict or define the level of authorization granted to a subject which may be an individual, organization or group or the that given to the object which may include applications and computers.It utilizes a non-discretionary approach whereby the defined access is uniformly enforced across all subjects and objects within the confines of an information system.

3 0
2 years ago
Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let
Harrizon [31]

Answer:

We will SQL(Structured Query Language) designed for this specific problem to manage the data base  for the library management system.This querry SQL based system will ask the user  to tell the first name and this SQL based system will his full name.

5 0
2 years ago
Joe, Kate and Jody are members of the same family. Kate is 5 years older than Joe. Jody is 6 years older than Kate . The sum of
mezya [45]

Answer:

5, 10 and 16

Explanation:

The sum of their ages is √961 = 31

If Joe is x years old, the equation that follows is:

x + (x+5) + (x+5+6) = 31

This simplifies to

3x = 31 - 11 - 5 = 15

so x=5

From that you can find

Joe = x = 5

Kate = x+5 = 10

Jody = x+5+6 = 16

5 0
2 years ago
Read 2 more answers
Other questions:
  • Which port, along with a special card and cables, supports the connection of microcomputers, modems, and printers in a local are
    6·1 answer
  • Use a VLOOKUP function in cell I5 to identify and calculate the federal withholding tax. Use the tax rates from the range D21:E2
    15·1 answer
  • Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
    15·2 answers
  • Mathematical computations by a computer are faster than your quickest mathematical computations because the top speed of a neura
    13·1 answer
  • #Write a function called "in_parentheses" that accepts a
    5·1 answer
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
  • Write a program that calculates taxi fare at a rate of $1.50 per mile. Your pro-gram should interact with the user in this manne
    12·1 answer
  • PLEASE HELP!!!
    11·1 answer
  • 2. BIOS is contained in ROM and not in RAM. Can you guess why?​
    15·1 answer
  • In a particular field, there are trees in a l single row from left to right. Each tree has a value V You cut trees from left to
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!