1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
11

Write a program that uses a dictionary to store students birthdays. Your program should ask the user what their name is, and loo

k it up in the dictionary . If their birthday is known, it should tell them their birthday.
Computers and Technology
1 answer:
tekilochka [14]3 years ago
3 0

di = {"student":"10/30/1984", "student2":"11/16/2020"}

name = input("What is your name? ")

if name in di:

   print(di[name])

else:

   print("Your name is not in the dictionary.")

You can change the values inside the dictionary. I hope this helps!

You might be interested in
What is the navigation aid that shows users the path they have taken to get to a web page located within a website?
mylen [45]
The breadcrumb trail is the navigation aid that shows users the path they have taken to get to a web page located within a website. This graphical control element helps and allows<span> users to keep track of their locations within programs, documents, or websites.
</span><span>Example: a user can see where the current page is in relation to the Web site's hierarchy.</span>
3 0
4 years ago
​___________ contain microprocessors and tiny antennas that allow them to​ receive, store, and transmit​ data, such as the locat
Gwar [14]

Answer:

The correct option is C: Radio frequency identification tags

Explanation:

Radio frequency identification tags also known as RFID tags involves the use of radio waves to​ receive, store, and transmit​ data which are usually stored on a tag that is attached to an object. A tag contains microprocessors and tiny antennas and whether it is in line of sight or not, it can be tracked and information transmitted from it.

4 0
3 years ago
_____ crime involves the use of computers and the internet to commit acts against people, property, public order, or morality. v
den301095 [7]
Hi,


Answer => Cyber


Good Lessons
6 0
4 years ago
Kali linux os and window os who is the best​
kogti [31]

Answer:

Windows

Explanation:

It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.

4 0
3 years ago
Read 2 more answers
The computer mouse is used to
Murrr4er [49]
Make it easier to click, copy and paste,and open new tabs.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • Question: when using a line graph, why is it important to only graph 1-3 series of data?
    8·1 answer
  • What is a file that has an .iso extension? What does this extension indicate?
    8·1 answer
  • Which of the following is not a major reason for an email bounce?
    8·1 answer
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The fi
    5·1 answer
  • What is the purpose of a router
    13·2 answers
  • Write a program that can perform three different activities:
    8·1 answer
  • Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better main
    12·1 answer
  • Which testing is used for a program's individual components functionality testing?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!