Write a qbasic program to supply first , middle and last name of a person and print the output as given below :

If input is Sam Christopher Robert output should be Robert Christopher Sam.​

Answers

Answer 1

Answer:

The QBasic program is as follows:

10 INPUT "First name: " fName$

20 INPUT "Middle name: " mName$

30 INPUT "Last name: " lName$

40 PRINT lName$," ",mName$," ",fName$

50 END

Explanation:

This prompts the user and gets input for first name

10 INPUT "First name: " fName$

This prompts the user and gets input for middle name

20 INPUT "Middle name: " mName$

This prompts the user and gets input for last name

30 INPUT "Last name: " lName$

This prints the output in the required format

40 PRINT lName$," ",mName$," ",fName$

This ends the program

50 END


Related Questions

the series of instructions that tells the hardware how to perform​

Answers

Answer:

A Program

Explanation:

Hardwares may be referred to as physical components of a computer system or machine. Hardware components may include processing unit of a machine or equipment. These Hardwares work with according to certain embedded instruction in other to function properly and according to the designers specification. These series of instruction written in other to control the function of the hardware is called the PROGRAM. Hence, the series of instruction which controls the function of the hardware is Called the PROGRAM.

who was dobri dobrev?​

Answers

Answer:

Dobri Dimitrov Dobrev, better known as Grandpa Dobri, Elder Dobri or The Saint of Bailovo, was a Bulgarian ascetic who walked over 20 kilometres each day to sit or stand in front of the Cathedral of Alexander Nevsky in Sofia to collect money for charitable causes.

Answer:

He was bulgarian ascetic who walked over 20 kilometres each day to sit or stand in front of the Cathedral of Alexander Nevsky in Sofia to collect money for charitable causes. Elder Dobry has been raising money for decades to restore churches throughout Bulgaria.Dobrev donated all the money he collected to charities, orphanages, churches, and monasteries. 

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other, but you are having trouble configuring Internet access. What is the likely cause of the problem

Answers

Answer: Private addresses cannot directly communicate to hosts outside the local subnet.

Explanation:

Automatic Private IP Addressing (APIPA) allows assigning an IP address by a computer system automatically when there's no availability of a Dynamic Host Configuration Protocol (DHCP) server to perform the function.

Since after the configuration of the APIPA, all systems are able to communicate with each other, but there's trouble configuring Internet access, then private addresses cannot directly communicate to hosts outside the local subnet.

Amara is designing a website to encourage people in a city to vote in local elections. She wants to include a web page that shows first-time voters the steps to follow to register and vote in the elections. How can Amara best use multimedia to show the voting process on the web page?

A.
by providing a paragraph of instructions with pictures
B.
by providing an audio file along with downloadable pictures
C.
by creating a brief animation with optional text instructions
D.
by creating a static slideshow of the steps showing just pictures
E.
by adding automatically playing audio with text instructions

Answers

Answer:

c.

by creating a brief animation with optional text insturctions

Hope this helps! Brainliest please

A chart is used to represent ______ data in pictorial form
Computer question
From the chapter ms excel pls answer!!

Answers

Answer:Pictorial form is also called a pictogram

Soluciónes tecnológicas cáseras para combatir los rezagos del corona virus

ayuda porfa
pongo corona

Answers

Explanation:

Los cielos: se están enviando drones para responder al brote en todo el país. Desde patrullar los pasillos con altavoces que advierten a los residentes que usen máscaras, hasta pasar por las calles con carteles de códigos QR que los conductores pueden escanear con sus teléfonos para registrar información médica; Los drones permiten a las autoridades obtener información más rápido y, al mismo tiempo, mantener una distancia segura mientras realizan sus funciones. Los drones agrícolas también están rociando desinfectantes en áreas remotas, mientras que otros se han utilizado para entregar suministros médicos cruciales. Los drones utilizados para rociar desinfectante en las calles de la ciudad son 5 veces más eficientes que la pulverización manual 3. Nuestros teléfonos: los teléfonos inteligentes desempeñan un papel fundamental en la reducción de la exposición. Las aplicaciones de entrega ofrecen entrega sin contacto, mediante la cual los conductores dejan la comida en un punto específico, incluida una tarjeta que indica la temperatura de todos los involucrados en cocinar y entregar la comida. Otro ofrece a los usuarios mapas que marcan comunidades residenciales con casos confirmados y su proximidad a ellos. Mientras tanto, las aplicaciones de pago móvil están reduciendo la transmisión a través del papel moneda, que puede transportar virus hasta por 17 días. Con la penetración más alta del mundo de billeteras electrónicas y dos de los pagos móviles más grandes del mundo, la tecnología china está ayudando a frenar la propagación del coronavirus.

Enfermeras robotizadas y diagnósticos de inteligencia artificial: los robots también se utilizan en muchos hospitales chinos para entregar alimentos, medicamentos y otros suministros a los pacientes; desinfectar hospitales y otras áreas públicas; para controlar la temperatura de los pacientes; y para responder preguntas comunes. El coronavirus se diagnostica mediante IA, que puede leer miles de tomografías computarizadas en 20 segundos con una tasa de precisión del 96%.

What are water proof cameras?( write in detail)

Answers

Cameras where it’s focused enough to see under water and water resistant which water won’t get inside the camera and mess it up and end up burning you :)

Answer:

Underwater photography is the process of taking photographs while under water. It is usually done while scuba diving, but can be done while diving on surface supply, snorkeling, swimming, from a submersible or remotely operated underwater vehicle, or from automated cameras lowered from the surface.

Underwater photography can also be categorised as an art form and a method for recording data. Successful underwater imaging is usually done with specialized equipment and techniques. However, it offers exciting and rare photographic opportunities. Animals such as fish and marine mammals are common subjects, but photographers also pursue shipwrecks, submerged cave systems, underwater "landscapes", invertebrates, seaweeds, geological features, and portraits of fellow divers

Some cameras are made for use underwater, including modern waterproof digital cameras. The first amphibious camera was the Calypso, reintroduced as the Nikonos in 1963. The Nikonos range was designed specifically for use underwater. Nikon ended the Nikonos series in 2001[1] and its use has declined, as has that of other 35mm film systems. Sea and Sea USA made the Motor Marine III, an amphibious range-finder camera for 35mm film.[2][3]

Olympus TG-3 camera and its underwater housing front view

A waterproof camera and waterproof light source setup for professional underwater photography

GoPro Hero5 action camera in underwater housing

Seaview SVII Camera using three dome ports for all round view

Cameras made for dry work can also work underwater, protected by add-on housings, which are made for point and shoot cameras, compact cameras with full exposure controls, and single lens reflex cameras (SLRs). Most such housings are specific to the camera. Materials range from relatively inexpensive plastic to high-priced aluminum. Housings allow many options: users can choose housings specific to their everyday "land" cameras and use any lens. Underwater photographers generally use wide-angle lenses or macro lenses, both of which allow close focus and therefore a shorter distance to the subject, which reduces the loss of clarity to scattering. Digital media can hold many more shots than standard film (which rarely has more than 36 frames per roll). This gives digital cameras an advantage, since it is impractical to change film underwater. Other comparisons between digital and film photography also apply, and the use of film under water has declined, as it has on land.

Explanation:

Pre-writing is important for all of the following reasons except?

A) it gets ideas down on paper

B) it forces the writer to be specific early in the process

C) it is the creative stage

D) it is where the ideas are generated​

Answers

Answer:

B) It forces the writer to be specific early in the process.

Explanation:

Pre-writing is simply just getting down ideas. If you're writing down specific details and information, that's when you're writing the rough draft or the finalized paper.

Select the correct answer.
Frankle is trying to create an app. He creates a new ViewController and removes the default one. What should he keep in mind when building
the app?
OA
connect all the ViewControllers to the old ones
OB.
assigning the first ViewController as initial
Oc. creating a SplitViewController
OD. adding a segue from the last ViewController

Answers

od. adding a segue fro. the last viewcontroller

complete the sentence: hexadecimal numbers use base ____

Answers

Hexadecimal numbers use base-16

Being a Base-16 system, the hexadecimal numbering system therefore uses 16 (sixteen) different digits with a combination of numbers from 0 through to 15. In other words, there are 16 possible digit symbols.

Which method for adding paragraph spaces is the most efficient?
adjusting the Space After setting
adding paragraph breaks where you want spaces
adjusting the Paste Options to match the destination formatting
adding tab stops at the start of each paragraph

Answers

Answer:

adjusting the Space After setting

What is the last phase of the website development process?
O A. development
OB.
maintenance
O c. testing
OD. design

Answers

Answer:

OB.

maintenance

Explanation:

The last phase is Maintenance, in this stage, the maintenance of the website is done for a limited time period only. Maintenance means updating the contents & design of the website.

Trust me mark me as brainliest trust me

What is the last phase of the website development process?

B. Maintenance ✔

Explanation:

Maintenance is the last phase of the website development process.

[tex]\circ \: \: { \underline{ \boxed{ \sf{ \color{green}{Happy\:learning.}}}}}∘[/tex]

Bluetooth headphones does or do not use wireless data transmission

Answers

Answer:

To put it simply: no, using Bluetooth won't affect your cellular data in any way. Bluetooth works using short-range radio waves, not an internet connection. This means that Bluetooth will work anywhere you have two compatible devices — you don't need any sort of data plan, or even a cellular connection.

some does some does not

a diagram of a flow chart to find the average of 10 numbers​

Answers

Answer:

Kindly check attached picture

Explanation:

Flowchart gives a graphical representation of a steps taken towers the execution of a program.

In the flowchart attached, A variable was initialized and set to 0 ; then a for loop was used to iterate integers 1 up to 10, for each number. It is added to the initialized variable sum until all the 10 integer numbers are added. The the average is obtained by dividing by 10.

what is spyware and what is it function?​

Answers

Explanation:

Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.

"queries are questions", true or false?

Answers

Answer:

they are similar so I think it is true

Explanation:

Mark as brainlist

A channel or path through which the data or information is transferred form one place to another in a computer network is called

Answers

Answer: Data Transmission mode defines the direction of the flow of information between two communication devices.

Explanation:

It is also called Data Communication or Directional Mode. It specifies the direction of the flow of information from one place to another in a computer network.

A channel or path through which the data or information is transferred form one place to another in a computer network is called communication channel.

What is communication channel?

Information is transported from one network device to another over a communication channel.

Data is transported across wired channels using cables and wires. Without using cables or wires, wireless channels transmit data from one device to another.

Data communication is the process of transferring data from one device to another via a transmission medium of some kind.

The system bus is a network of wires and connectors that carries data between a computer's primary memory and its processors.

For data and control signals travelling between the main parts of the computer system, the bus offers a communication path.

Thus, communication channel is the path for data transfer.

For more details regarding communication channel, visit:

https://brainly.com/question/13649068

#SPJ6

A top investment bank is in the process of building a new Forex trading platform. To ensure high availability and scalability, you designed the trading platform to use an Elastic Load Balancer in front of an Auto Scaling group of On-Demand EC2 instances across multiple Availability Zones. For its database tier, you chose to use a single Amazon Aurora instance to take advantage of its distributed, fault-tolerant, and self-healing storage system. In the event of system failure on the primary database instance, what happens to Amazon Aurora during the failove

Answers

Answer:

Following are the solution to the given question:

Explanation:

Initially, Aurora will try and establish a new DB instance in the same AZ as the previous example. When Aurora can do it, he will try to create a new DB instance in another AZ.

Aurora will try and construct a new DB instance in the same disponibility zone as the original example if there is not an Amazon Aurora Replica (i.e. single instance) that does not execute Aurora Serverless. The replacement of the original example was better managed and may not work if there is, for example, an issue that impacts broadly the entire Access Service.

function of Napier bone any five​

Answers

Answer:

calculation of product

Napier's bones , also called Napier's

rods, are numbered rods which can be

used to perform multiplication of any

number by a number 2-9.

Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. What should you do?

A. Upgrade to a 64-bit version of Windows.
B. Change the memory timings in the BIOS to a slower (higher) setting
C. Return both modules for a replacement
D. Reboot the computer and run memory diagnostic tests on the memory
E. Make sure that both modules are seated properly in their slots.

Answers

Answer: A. Upgrade to a 64-bit version of Windows.

Explanation: In this situation, you are most likely using a 32-bit version of Windows, which can only address a maximum of 4 GS of RAM. Some of the 4 GB is used by drivers hence it only reports 35 GB of System RAM. Upgrading to a 64-bit version of Windows should fix the problem.

The BIOS should display the total amount of system memory during POST. If it does not count the proper amount of memory, verify that the memory is inserted correctly. In most cases, you will not need to change the memory timings. When you do it is typically because the system is unstable or crashes. Testing memory helps you identify when specific memory storage locations are going bad. Device Manager will not enable memory not recognized by the BIOS.

Explanation:

We should upgrade to a 64-bit version of Windows. Hence option A is correct.

What is Windows?

Windows is defined as a collection of different proprietary graphical operating system families that Microsoft has created and is promoting. Microsoft Windows is a personal computer operating system (OS) created by the Microsoft Corporation. It is also known as Windows and Windows OS (PCs).

Most likely, you are using a 32-bit version of Windows in this case, which can only address up to 4 GS of RAM. It only reflects 35 GB of system RAM since some of the 4 GB are being consumed by drivers. The issue should be resolved by upgrading to a 64-bit version of Windows. You can detect whether particular memory storage places are failing by testing the memory. Memory that is not recognized by the BIOS will not be enabled by Device Manager.

Thus, we should upgrade to a 64-bit version of Windows. Hence option A is correct.

To learn more about Windows, refer to the link below:

https://brainly.com/question/13502522

#SPJ5

hvhblfffffffff
eafafaefafsa

Answers

What’s the question?? Or which language is this

can you help me here please​

Answers

Explanation:

1) ethiCal : he is a good person to be socialized .

unethical : he should not trust the people so easily that he have never met and gave the password to them

2) ethical: she is a good girl to login in time and kepp only respected points

unethical : she should have Ateach her friends that they should not fight and discuss the right answer correctly

In cell K26, create a formula that counts the number times "Thunder" occurs in the columns containing "Names"

I would wanna know the Formula for this In Excel

Answers

Answer:

I1 to K2: Use a formula to link the cells. Create a formula in column L that calculates the averages for each matching category in K2:

hope it's help you plz mark as brain list

Following are the excel formula to count the number of times "Thunder" occurs in the names column:

Excel formula to count the number of times the value occurs:

Formula:

=COUNTIF(C:C,C8)

Explanation of the Formula:

The COUNTIF function in Excel is a built-in function that counts cells according to several criteria. "=COUNTIF" is how it's spelled. The "COUNTIF" is a statistical function that can be used to count the number of cells that meet a requirement, like the number of times a certain city occurs in a client list.Inside the "COUNTIF" method we pass a two-parameter, in which the first parameter selects the column and the next parameter finds the value that will occur the number of times.

Find out more about the excel function here:

brainly.com/question/20497277

State the feature of a database management system that prints data in a specified format with a title.

Answers

Answer:

Data structuring

A DBMS is a database management system that is responsible for the software packages made for manipulating, retrieval, and managing the data in the DB.

DB generally manipulates the data itself on the basis of field names and file structure. It has multiuser access and provides a high level of security. It is a network database and network and has an object-oriented database.

Hence the format with a title would be data structuring.

Learn more about the database management system that prints.

brainly.com/question/22486925.

Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.

Answers

Answer:

NIST SP 800 30

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.

This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

Matthew is a computer technician and it is important to have a storage that contains all of his necessary tools. What kind of storage BOX would that be

Answers

Tool box

Hope this helps! :)

Write the correct word to complete the sentence:
According to ................., Bolster the Giant terrorised the people of Cornwall.​

Answers

Answer:

Legend

Explanation:

In English language, a legend can be defined as a traditional narrative or story that is written about a particular person or past events and it's likely to either be a myth or historical facts. Thus, a legend is sometimes an unrealistic story or narration that describe a particular person or an extraordinary event that occured in the past. Also, it's a story about a particular figure, past human events or actions whose origin is unknown, unproven and undocumented in real history

Additionally, the word "legend" was derived from the Latin word "legendus" which simply means something which should be read.

Hence, the most appropriate word to complete the sentence is a legend because there are no proven and documented or written records about how Bolster the Giant terrorised the people of Cornwall. Thus, the complete mythical sentence is then written as;

"According to legend, Bolster the Giant terrorised the people of Cornwall.​"

Use the drop-down menus to complete statements about options for inserting video files.
V is a point of interest in a video clip that can trigger animations or provide a location that a user
can jump to quickly.
The Embed Code command will link an online video to a presentation and requires
to work.
Recording mouse actions and audio is done by using the
command.

Answers

Answer:

1 book mark

2 internet connection

3 inset screen

Explanation:

because

. A store offers a deposit of 6% on the cash price of $462. The deposit amount is?​

Answers

I got $27.72 is 6% of $462.

How to turn on my switch control bc it wont let me turn on when i keep on pressing it

Answers

Answer:

try triple clicking on the home button and see if it works, if it doesnt try restarting your ipad and try again.

Explanation:

Other Questions
Someone tell me the answers for this question please A kettle operates from a 120 V outlet. It has a heating element with a resistance of 8.0 . Calculate the current going through the element. Give a brief summary of your extra curricular involvement and leadership positions you have held at your previous school. PLEASE HELP ME! Diagram shows the distance time graph that represent Dendrick's journey Kl to vawang and David s journey from rawang to Kl. Both of them depart from the place at the same time a) Calculate the length of time in minutes, David stop his carb) If their journey starts at 9 am, what is the time david and dendrickc) Calculate the speed in km h, of Dendrick when he meets David Describe the dravidians Geography Al realizar el producto: (x 3) (x + 6) se obtiene:Seleccione una:a. x 2 3 x 18b. x 2 18c. x 2 + 3 x 18d. x 2 3 x + 18 PLEASE HELP ASAP - ILL GIVE BRAINLESTITS 2 PAGES BUT 4 QUESTIONS30 points This is the question I need help with. Mackie Services operates a website that links experienced statisticians with businesses that need data analyzed. Statisticians post their rates, qualifications, and references on the website, and Mackie receives 25% of the fee paid to the statisticians in exchange for identifying potential customers. Hoffman Associates contacts Mackie and arranges to pay a consultant $1,500 in exchange for analyzing some data. Mackie's income statement would include the following with respect to this transaction:_________a. Revenue of $1,875 and cost of services of $1,500b. Revenue of $1,500c. Revenue of $1,500, and cost of services of $1,125d. Revenue of $375 I need help with my Spanish assignment asap Disks of polycarbonate plastic from a supplier are analyzed for scratch and shock resistance. The results from 108 disks are summarized as follows: Shock Resistance Scratch Resistance High Low High 55 10 Low 13 30 Let A denote the event that a disk has high shock resistance, and let B denote the event that a disk has high scratch resistance. If a disk is selected at random, determine the following probabilities. P(A)=86/100P(B)=79/100P(A')=7/50P(A U B)=95/100P(A' U B)= ??? Given that E is the universal set and that A and B are subsets of E. simplify An(B-A) Receptors trigger one of two effector pathways resulting in changes in neuronal activity. These changes will, ultimately, effect gene expression. Which effector pathway is characterized by ion flux through transmitter-activated channels resulting in an altered membrane potential and neuronal activity In the figure, ALM BLM by Side-Angle-Side (SAS). Which angles are congruent by CPCTC? A bank gives a woman personal loan of 120,000. she has to pay back 11,000 every month for a year. find the amount paid back to the bank as interest. pls h help When did martins feelings toward his grandpa change ? You are 28-year-old healthy male and interested in purchasing life insurance. Using the table, determine what the annual premium for a Whole Life insurance police, given that the face value of the policy is $162,253. If need be, round your answer to the nearest cent. 1.1 Refer to Source A. Motivate why Woza Albert will be a suitable choice for a school production. (3) In a class, there are 87 studentsin the class, and 38 are boys. What isthe probability that a girl is selectedrandomly to represent the class in adebate? What is the quotient of the fractions below? 2/35/4