The python code which can be used to read dates from input, one date per line and each date's format must be as follows: March 1, 1990, is:
<h3>Python code</h3>
import datetime
inputs = []
result = []
#read the inputs
date = input()
inputs.append(date)
while not date == "-1":
date = input()
inputs.append(date)
#check if the input is in the correct format and convert it.
for date_text in inputs:
try:
date_text = datetime.datetime.strptime(date_text,"%d %B, %Y")
result.append(date_text.strftime("%d/%m/%Y"))
except ValueError:
pass
print(*result, sep = "\n")
The above code would parse the string and extract the date. The split() method was used to break the input into tokens.
Read more about python programming here:
brainly.com/question/27666303
#SPJ1
The answer is enhance traditional instruction. Computers are often used by teachers so that the teachers may have an easier time with their visual aids. Now that we have tools like powerpoint presentations and excel files, it will be easier for the teachers to prepare
Answer:
The answer is E: All of the above
Explanation:
All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.
The answer is a. Title Bar
The Title Bar displays the name of the program and the name of the current open file, whether it is just displayed or being edited. It is located at the top of the program window.
Answer:
d. Internet Protocol
Explanation:
Internet Protocols suite are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.
Therefore, Internet Protocol is responsible for packet forwarding.