1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
2 years ago
14

write a program that reads a string from the user containing a date in the form mm/dd/yyyy. it should print the date in the form

at march 12, 2018
Computers and Technology
1 answer:
julia-pushkina [17]2 years ago
3 0

Using the knowledge in computational language in python it is possible to write a code that reads a string from the user containing a date in the form mm/dd/yyyy.

<h3>Writting the code:</h3>

<em>months_info = ['January', 'February','March','April', 'May','June', 'July','August', 'September', 'October', 'November', 'December']</em>

<em>date = input('Enter a date using the mm/dd/yyyy format ')</em>

<em>m, d, y = date.split('/')</em>

<em>m = int(m) - 1</em>

<em>name_of_month = months_info[m]</em>

<em>print('{} {}, {}'.format(name_of_month, d, y))</em>

See more about python at brainly.com/question/13437928

#SPJ1

You might be interested in
What a true portrait reveal
Snowcat [4.5K]
Is simple likeness. Historically, in fact, artists used self-portraits as a kind of calling card, attesting to their ability to capture a likeness and giving a sense of their capabilities. And, yes, self-portraits are convenient exercises because the model is always available and works for free
5 0
3 years ago
A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
Mariulka [41]

Answer:

A Subnet Mask

Explanation:

A Subnet mask is used by the TCP/IP protocol to determine whether a host is on the local Subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the destination host address 192.168.10.100 cannot be determined by the network host (192.168.10.200) unless it has more information. This information is supplied in another 32-bit number called a Subnet mask.

4 0
4 years ago
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
hoa [83]

Answer:

Option A i.e., AES is correct.

Explanation:

The user corporation is installing the wireless server and seems to be worried when anyone representing the rival corporation might stands outside that property as well as gather wireless information. He ensured that corporation which WPA2 is safe. However, AES creates WPA2 stronger than WPA.

  • Option B is incorrect according to the following scenario because it is the security mechanism used when component through the IEEE 802.11i WLAN standard.
  • Option C is incorrect according to the following scenario because it is the protocol initially developed for configure wireless clients to such a dial-in connection device.
  • Option D is also incorrect according to the following scenario because it is the terminal access control.
6 0
4 years ago
Which of the following combinations would constitute a vertical merger?
Ksenya-84 [330]

Answer:

D

Explanation:

A vertical merger is when two or more companies merge and are involved at different stages in the supply chain process for a common good or service.  The merger is purposed to increase synchronism, gain more control of the supply chain process, and increase business. Also, it often results in reduced costs and increased productivity and efficiency.

A good example of a vertical merger is a auto manufacturer purchasing a tire company.  A vertical merger  of this sort reduces the cost of tires for the automaker and creates the possibility for expansion of its business by allowing it to supply tires to competing automakers.

6 0
4 years ago
Complete the steps to evaluate the following
kirill115 [55]

Answer:

log base 3a= -0.631.log a/3 base 3

Now, -log m= log 1/m

hence,

log base 3a= 0.631.log 3/a base 3

log base 3a/log 3/a base 3 =0.631

log base 3 ( a.3/a) =.631 since, log m/logn =log n(m)

log base 3 3=0.631

Hence, answer is log base 3 3=0.631

Explanation:

Please check the answer section.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which device in a wireless local area network (wlan) determines the next network point to which a packet should be forwarded tow
    12·1 answer
  • Do you think cyber-bulling is more damaging, as damaging, or less damaging than in-person bullying? Why?
    11·2 answers
  • What permission do users have by default regarding printer access and the ability to manage documents?
    14·1 answer
  • Please someone helpp
    12·2 answers
  • Describe the conventional method of data processing​
    12·2 answers
  • While organizing his computer's power cords, Matt realizes his printer power cord is frayed (coming apart). What should Matt do
    10·1 answer
  • Please help!! i need this asap &lt;3 <br> (the boxes have the same answer choices in both)
    7·2 answers
  • What does the following code print to the console?<br> if 88 * 100:<br> print("cardio")
    8·1 answer
  • Select the best answer from the drop-down menu. Sometimes people feel threatened by new ideas and different ways of doing things
    5·1 answer
  • List four tasks that humans perform frequently, but which may be difficult for a computerized agent to accomplish. Describe the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!