1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
10

Write a program that reads a string from the user containing a date in the form mm/dd/ yyyy. It should print the date in the for

m April 12, 2017. Hint: Get the "mm" from the user entered date "mm/dd/yyyy", then convert the "mm" into a month number. You may use an list month_list
Computers and Technology
1 answer:
Oxana [17]3 years ago
3 0

Answer:

months_info = ['January', 'February','March','April', 'May','June', 'July','August', 'September', 'October', 'November', 'December']

date = input('Enter a date using the mm/dd/yyyy format ')

m, d, y = date.split('/')

m = int(m) - 1

name_of_month = months_info[m]

print('{} {}, {}'.format(name_of_month, d, y))

Explanation:

  • Create a list of all months and store them in the months_info variable.
  • Get the date as an input from user and then split the date.
  • Finally display the date by following the specific layout using the built-in format method.
You might be interested in
Run the C-LOOK algorithm (requests can only be serviced when the head is moving toward higher numbered tracks); the head is curr
IRISSAK [1]

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to get the diagram which would be used to explain the question above.

6 0
4 years ago
Worksheet-I • Make a list of 10 application software and 5 utility programs installed in your computer, along with their uses. U
Andru [333]

Answer:

An antivirus is a utility software that helps to keep the computer virus-free. Moreover, it notifies when any malicious file is detected and removes such files. In addition, it scans any new device attached to the computer and discards any virus if there. Moreover, it also scans the system from time to time for any threats and disposes of them. Examples of antivirus are McAfee Antivirus, Quick heal Antivirus, Windows Defender, etc.

These utility software are used to manage files of the computer system. Since files are an important part of the system as all the data is stored in the files. Therefore, this utility software help to browse, search, arrange, find information, and quickly preview the files of the system.

An important part of a computer is storage space, it is very important to maintain this storage. Therefore, we use certain utility software to compress big files and decrease their size, these are compression tools. The format of the files changes while compressing and we cannot access or edit them directly. In addition, we can easily decompress the file and get the original file back. Examples of compression tools are WinZip, WinRAR, 7-Zip, etc.

These utility software are used to manage data on disks. Moreover, they perform functions like partitioning devices, manage drives, etc. Examples of disk management tools are Mini Tool Partition Wizard, Paragon Partition Manager, etc.

This utility software helps to free up the disk space. In addition, the files which are no longer in use are removed from the disk. Examples are Cortex, C Cleaner, etc.

Explanation:

hope it helps

mark as brainiest

happy to help

ask more I'll help if I know the answer

8 0
3 years ago
Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
Fynjy0 [20]
Files and email messages sent over the internet are broken down into smaller pieces called packets
6 0
4 years ago
Https://forms.gle/eP8F5eKC2AUaCsB67
Deffense [45]

Answer:

NO .THATS NOT A GOOD QUESTIONS.

Explanation:THOSE R PERSONAL

3 0
3 years ago
he wide range of materials used to create the Buk (mask) of the Torres Strait has been interpreted as evidence of the islanders'
Kamila [148]

Answer:

The wide range of materials used to create the Buk (mask) of the Torres Strait has been interpreted as evidence of the islanders' far-reaching trade networks

C preference for local natural resources

Explanation:

The Buk (mask) aged middle to late 19th century C.E., was located in Australia, Mabuiag Island, Queensland, Torres Strait, which is between Australia and Papua New Guinea with many small mostly uninhabited islands around. Archaeological excavations show people´s  arrival at  Mabuiag islands around 7,300 years ago, being very dependent on ocean´s products to survival.

Few surviving pieces, made out of local resources materials such as turtle shell, wood, fiber, cassowary feathers, resin and paint, tell us feathers were a throughoutly artistic material used in Oceania , but  turtle shells masks were Torres Strait´s people hand-crafted and unique hallmark to be used during assorted ceremonies.

7 0
3 years ago
Other questions:
  • In a word processing program, the ribbon or menus contain the
    12·1 answer
  • A network administrator wants to have the same network mask for all networks at a particular small site. The site has the follow
    11·1 answer
  • Su wants to apply the new font to the other slides of the presentation. She knows she can use the Format Painter tool
    12·1 answer
  • Light travels at 3 × 108 meters per second. A light-year is the distance a light beam travels in one year.Write a PYTHON program
    14·1 answer
  • Select the term used to describe the process, within the context of Active Directory, that allows a person with higher security
    5·1 answer
  • What is the main type of energy used to help convert metamorphic rocks into igneous rocks in the rock cycle ?
    10·1 answer
  • Provide 50000 customers with internet service, however it is only given a pool of 256 ip addresses. suggest an address allocatio
    14·1 answer
  • What is the difference between KE an PE
    8·1 answer
  • Busco....................... Novio
    8·2 answers
  • Debug
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!