1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
9

Write a program that prompts the user to enter a date, using integer values for the month, day, and year, and then prints out th

e day of the week that fell on that date. According to the Gregorian Calendar, January 1, 1601 was a Monday. Observe all leap years (and keep in mind that 1700, 1800, and 1900 were not leap years).
Computers and Technology
1 answer:
attashe74 [19]3 years ago
5 0

Answer:

import datetime

user = input("Enter date in yyyy,m,d: ").split(",")

int_date = tuple([int(x) for x in user])

year, month, day =int_date

mydate = datetime.datetime(year, month, day)

print(mydate)

x = mydate.strftime("%B %d, %Y was a %A")

print(x)

Explanation:

The datetime python module is used to create date and time objects which makes it easy working with date-time values. The user input is converted to a tuple of integer items, then they are converted to date time objects and parsed to string with the strftime method.

You might be interested in
Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st
lyudmila [28]

Answer:

Check the explanation

Explanation:

Selecting the bio-metric technique fingerprint, it requires a scanner to read the fingerprint The cost for a scanner is in between 1000 and 5000 Placing two scanners at two entrance of office win cost bellow 10,000 So the cost needed for this technique is medium as compared with other bio-metric techniques

Attacks on this technique can be in saner, channel from scanner to feature extractor, in feature extractor, way in between feature extractor and marcher, in marcher, in database etc this attacks can be protect by using security methods such as cryptography, hashing, watermarking, noses etc

By using watermarking, cryptography and stenography methods, fingerprint has less false detection rate I e it gives high accuracy

I recommend fingerprint technique. Because of it is a standard technique, it has good accuracy and cost is less, and easy to handle, and it is taking small storage space in database.

Kindly check the attached image below.

7 0
3 years ago
About how long did it take to photograph Daguerre's photograph of the street?
pogonyaev
<span>I doubt if anyone knows the exact exposure time for any particular daguerreotype image. That being said, the typical exposure time was a variable between 15 to 40 seconds. This is because the plate was sanitized by iodine fumes. The time of the fuming was a variable. Depending of the quality of the camera lens and the brightness of the day let make a guess – the exposure was likely at about 30 seconds. 

The first permanent photograph was taken in 1827. The process was the invention of Nicephore Niepce and is titled A View From The Window at Le Gras. This picture was taken in France and it is now at the University of Texas at Austin. The exposure was 8 hours long. Leuis Jacques Mande Daguerre using an improved process took two pictures of the street titled Two Views of the Boulevard du Temple, Paris. Now at the Bayerisches National Museum, Munich.</span>
4 0
3 years ago
According the Keown book, which Web-based personal financial planning website is known as "the best free way to manage your mone
daser333 [38]

Answer:

Mint.com

Explanation:

Mint.com: It is a free, and web-based personal management service that manages finance in the US and Canada, and has been developed by Aaron Patzer. It at the beginning used to leverage users to link various of their financial accounts via the deal with the Yodlee, however, since then it has started to take the services of the intuit to connect all the financial accounts of a user altogether.

The Level Money provides the details that help in understanding the cash flow through the automatic income detection and expenses that are fixed.

WSJ.com

This site provides the latest news.

YahooFinance.com

And this one provides the stock quotations for free, latest news, social interaction and mortgage rates, and resources for portfolio management.

Hence, the correct option is Mint.com. And we can find this in  Keown book as well.

4 0
3 years ago
What are the challenges of Cyber Law???? Needed ASAP ​
lilavasa [31]

Answer:

Explanation:

Few challenges that the technology space faces in cyber security are the following:

Digital Data Threat: Growing online transactions generate bigger incentives for cybercriminals. Besides, establishments looking to mine data—for instance, customer information, results of product surveys, and generic market information—create treasured intellectual property that is in itself an attractive target.

Supply Chain Inter-connection: The supply chains are increasingly interconnected. Companies are urging vendors and customers to join their networks. This makes a company’s security wall thin.

Hacking: This action is penetrating into someone’s system in unauthorized fashion to steal or destroy data, which has grown hundred folds in the past few years. The availability of information online makes it easier for even non-technical people to perform hacking.

Phishing: The easiest to execute and can produce the results with very little effort. It is the act of sending out Fake emails, text messages and create websites to look like they're from authentic companies.

6 0
3 years ago
Join my discord server! CODE IS (CebjBXN)​
11Alexandr11 [23.1K]

Answer:

sure

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati
    11·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • Create a program that generates a report that displays a list of students, classes they are enrolled in and the professor who te
    11·1 answer
  • Among the second generation home console companies,which managed to come out on top
    10·1 answer
  • IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in
    7·1 answer
  • Write a couple of paragraphs about the usefulness of computer​
    5·1 answer
  • What is this?
    15·2 answers
  • Write a program that takes a string as an input. If the string entered is equal to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!