Write a program that uses a dictionary to store students birthdays. Your program should ask the user what their name is, and look it up in the dictionary . If their birthday is known, it should tell them their birthday.

Answers

Answer 1

di = {"student":"10/30/1984", "student2":"11/16/2020"}

name = input("What is your name? ")

if name in di:

   print(di[name])

else:

   print("Your name is not in the dictionary.")

You can change the values inside the dictionary. I hope this helps!


Related Questions

Write an application that stores the following nine integers in an array: 10, 15, 19, 23, 26, 29, 31, 34, 38. Display the integers from first to last, and then display the integers from last to first.

Answers

Following are the code to this question:

Program Explanation:

Defining an array "arr1" of an integer value is declared, which stores 9 elements. In the next step, an integer variable "i" is declared, which uses two for loops to print the value in the given order.In the first for loop, it starts from 0 and ends when its value is less than 9, and prints the array value.In the second for loop, it starts from 9 and ends when the index value is equal to 0, and prints the array value in reverse order.

Program:

#include <iostream>// header file

using namespace std;

int main()//main method

{

int arr1[]= {10, 15, 19, 23, 26, 29, 31, 34, 38};//defining array of integer values

int i;//defining integer variable

cout<<" Array from first to last: ";//print message

for(i=0;i<9;i++)//use for loop to print array

{

cout<<arr1[i]<<" ";//print array value

}

cout<<"\n Array from last to first : ";//print message

for(i=9-1;i>=0;i--)//defining for loop to print array in reverse order

{

cout<<arr1[i]<<" ";//print array

}

return 0;

}

Output:

Array from first to last: 10 15 19 23 26 29 31 34 38  

Array from last to first : 38 34 31 29 26 23 19 15 10  

Learn more:

brainly.com/question/12906023

In a team if someone gets stuck with the selected tasks for the iteration, what is the immediate next step?

Answers

Answer:

The team member has to immediately inform the lead or onsite coordinator without wasting time and take up another task

Explanation:

In a situation where someone in a team is unable to move further to another tasks the next step is for the team member to immediately inform the onsite coordinator in order for them to take up another task reason been that the onsite coordinator sole responsibility is to ensure the completion of tasks without any flaw and Secondly if the team members did not inform the onsite coordinator immediately it will eventually lead to waste of time due to the time spent on the tasks thereby affecting the next tasks.

Therefore the immediate next step is for the team member to immediately inform the lead or onsite coordinator without wasting time and take up another task.

You should use _____ text on a light blue background.

yellow
black
lavender
white

Answers

You should use black text on a light blue background.

Explanation:

The other colors are too light for a light blue background and wouldn't show up well enough to read it easily.

Answer:

black cause you want a darker shade

Explanation:

EMERGENCY- I am giving 55 points for this, please help. WITH working out
What would be the size of a sound file, which is 30 seconds in length and has a bitrate of 96kbps? You must show your working out.

Answers

Answer:

360 kilobytes

Explanation:

(Time × Bitrate) / 8

30 × 96 = 2880 / 8

360 kilobytes

8: kilobits in a kilobyte

Time is always in seconds to obey the kb*ps* rule

Bitrate is always on bits so thats kilobits not kilobytes purpose of conversion

for the following graph, what is the goal state?

Answers

Answer:

E

Explanation:

Answer:

the answer is b

Explanation:

I got it right on the test

Write a program that uses key events to make a circle larger and smaller.

Your circle should start at a radius of 100 and a position of 250, 250. Each time the user hits the left arrow, the circle should decrease by 10. If the user hits the right arrow, it should increase by 10.

Hint: Use the get_radius() and set_radius() method to change the size of your circle. Find more details and examples on these functions in the DOCs tab.

Challenge: Can you prevent the circle from getting smaller than a radius of 10 and larger than a radius of 400?


in python code

Answers

Answer:

circ = Circle(100)

circ.set_position(250, 250)

circ.set_color(Color.yellow)

add(circ)

def grow_circle(event):

   if event.key == "ArrowLeft":

       circ.set_radius(circ.get_radius() - 10)

   if event.key == "ArrowRight":

       circ.set_radius(circ.get_radius() + 10)

   

add_key_down_handler(grow_circle)

Explanation:

By making it that when the left/right arrow is clicked the radius of the circle is first taking into account before anything else, then each time the arrow is clicked the current radius either gets 10 added or removed from it.    

In a mobile phone network, how many times as strong would

Answers

Answer:

how many times as strong would what?

put your question in the replies to this answer and I'll gladly answer it

Explanation:

May I have brainliest please? :)

Which of the following will increase the level of security for personal information on a mobile device if the device is lost or stolen

Answers

Answer:

this is a very cool day for me yeah know

I would simply just say it is what it ez

What is the output by the code below system.out.print(8-4+2);

Answers

Answer:

6

Explanation:

Justify the existence of programming languages to precisely communicate instructions?

Answers

Answer:

Machines don't understand human language and so must be communicated to using programming languages

Explanation:

Machines help make our lives easier. A machine as simple as a Zip can help to make keep one from an embarrassing situation.

Computers have evolved from simple calculators to what they are today. In the case of a zip, the user thinks up the instructions and executes it. Because a computer is more autonomous and automated than a simple zip because it is given a set of instructions and left to execute them. Because machines are not humans and do not understand any human language, the man had to invent machine language which in it's most basic form is 0 and 1. 0 for 'Off' or 'No' and 1 for 'On' or 'Yes'.

This basic form of language, just like the human language too, has evolved into several more complex and varied forms of languages. They remain relevant and continue to evolve to enable man to communicate with the machine as easily as possible because

Without the programming languages, we would be unable to efficiently describe our commands to the computer. The existence of many languages stems from the fact that languages are deemed more efficient when one is able to communicate more with fewer words. An advanced program is one that enables the programmer to do more with fewer and fewer lines of code.

Cheers!

Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following tasks is she likely to perform as part of a sequence of actions do that? Right-click the file and choose the Copy option. Open the application and select the File menu. Right-click the file and select the Delete option. Go to the location where you want to save the file. Right-click an empty area and select the Paste option.​

Answers

Answer:

Right-click the file and choose the Copy option, Go to the location where you want to save the file, Open the application and select the File menu, and Right-click an empty area and select the Paste option.

Explanation:

You would not need to Right-click the file and delete it to back up her Halloween photos, but you would need to upload them to an external application. To do that, you would basically do every step besides right-clicking and deleting the file (Right-click the file and select the Delete option)

Answer: A, D, E

Explanation: correct on Plato, plus you wouldn’t select the file menu or delete the files.

With __________________________, the IT resource is relocated to a host with more capacity. For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk-based SAN storage device with 8 GB per second I/O capacity.

Answers

Answer:

Dynamic Relocation.

Explanation:

The dynamic relocation is one of the methods used to implement a dynamic scalability architecture amongst others such as dynamic horizontal scaling and dynamic vertical scaling.

With dynamic relocation, the IT resource is relocated to a host with more capacity. For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk-based SAN storage device with 8 GB per second I/O capacity.

Jenny has entered data about models of laptops from company A and company B in a worksheet. She enters model numbers of laptops from company A along with their details in different columns of the worksheet. Similarly, she enters details of all the laptop models from company B, Which option will help Jenny view the data for company A and company B in two separate sections after printing? The option will help her view the data for company A and company B in two separate sections after printing.

Answers

Answer:

The Split option under the view tab.

Explanation:

Click the View tab on the Ribbon, then select the Split command. The workbook will be split into different panes. You can scroll through each pane separately using the scroll bars, allowing you to compare different sections of the workbook.

Answer:

Split

Explanation:

Select all the correct answers.
Shari is using a word processor to type a recipe for making chocolate chip cookies. Which of the following tasks can she perform using the tools provided in the word processor?

include a numbered list of steps in the procedure

insert an image of the chocolate chip cookies

email the recipe to her friend as an attachment

convert quantities measured in cups to metric units

print a copy of the recipe to have handy while baking

Answers

Answer:

The correct options are:

include a numbered list of steps in the procedure

insert an image of the chocolate chip cookies  

email the recipe to her friend as an attachment

print a copy of the recipe to have handy while baking

Explanation:

Microsoft word provides several features which can be used to perform different tasks.

Lets look at each option one by one:

include a numbered list of steps in the procedure

The Bullets and Numbering" feature can be used for this purpose.

insert an image of the chocolate chip cookies

Can be inserted via "Add picture" Option

email the recipe to her friend as an attachment

"Share" option can be used for this purpose.

convert quantities measured in cups to metric units

Calculations cannot be done in MS word

print a copy of the recipe to have handy while baking

Print option can be used for this purpose.

Hence,

The correct options are:

include a numbered list of steps in the procedure

insert an image of the chocolate chip cookies  

email the recipe to her friend as an attachment

print a copy of the recipe to have handy while baking

Write a program that tells the user what animal and personality characteristics he/she is likely to have based on the Chinese Zodiac Calendar. The program should ask the user for the year in which he/she was born. The twelve animals of the Zodiac and some of their associated years are rat (1924, 1936, 1948, 1960) · ox (1925, 1937, 1949, 1961) tiger (1926, 1938, 1950, 1962) rabbit (1927, 1939, 1951, 1963) dragon (1928, 1940, 1952, 1964) snake (1929, 1941, 1953, 1965) horse (1930, 1942, 1954, 1966) goat (1931, 1943, 1955, 1967) monkey (1932, 1944, 1956, 1968) rooster (1933, 1945, 1957, 1969) dog (1934, 1946, 1958, 1970) pig (1935, 1947, 1959, 1971) Each year is associated with a particular animal. The years cycle through the animals hence the animal repeats every twelve years. Some characteristics of each animal are as follows Rat: industrious, sensitive, sociable Ox: dependable, modest, patient Tiger: rebellious, daring, impulsive

Answers

Answer:

I have a question for you

.

.

Are you a INDIAN?

.

.

IF YES

THEN,

BOYCOTT CHINA

Assume that the OS uses a minimum page size of 16 KB. Assume that your L1 cache must be 4-way set-associative. If you're trying to correctly implement a virtually indexed physically tagged cache (with no additional support from the OS or hardware), what is the largest L1 cache that you can design

Answers

Answer:

The largest size of L1 = 16 bits

Explanation:

hello attached below is the diagram related to the solution

assuming that the OS uses a minimum page size of 16 KB

when we assume that our L1 cache must have 4-way set-associative

The largest L1 cache that you can design = 16 bits ( when the L1 cache is of a page size )

The L1 cache is closest to the processor and also the L1 is slowest and the largest of all

Write a calculate_sq_inches_of_good_pizza function that accepts the diameter of a pizza and returns the area of the pizza minus 1 inch at the edge.

Answers

Answer:

#include <iostream>

using namespace std;

float calculate_sq_inches_of_good_pizza(float diameter) {

   float radius= diameter/2;    

   float pi=3.14;

   float area;        

   area = pi*(radius*radius );

   return area;

}

int main() {  

   float d;

   cout<<"enter the diameter of pizza"<<endl;

   cin>>d>>endl;

   float area_of_pizza = calculate_sq_inches_of_good_pizza();

   return 0;

}

Explanation:

Above program is written in C++ language which has function namely    float calculate_sq_inches_of_good_pizza(float diameter). This will calculate area of pizza from  given diameter and return it to main() function.

As we know pizza is circle and area of circle is equal to:

Area = π * radius*radius

π =pi=3.14

and we have calculated radius from given diameter

radius = diameter/2;

If you only want function not whole program than ignore main () function and only consider float calculate_sq_inches_of_good_pizza(float diameter) function which is in ITALIC notation.

6.6 Code Practice: Question 1 in Edhesive
If u have done Edhesive and done this code practice show me how to make the boat please.

Answers

Answer:

import simplegui

width = 600

height = 400

def draw(canvas):

   # Water:

   for x in range (1, 800, 120):

       canvas.draw_circle ((x, 330), 60, 3, "Blue")

   canvas.draw_line((1, 300), (width, 300), 70, "White")

   # Boat

   canvas.draw_circle((width/2, 280), 90, 5, "Black", "White")

   canvas.draw_line((1, 220), (width, 220), 150, "White")

   canvas.draw_line((210, 298), (390, 298), 5, "Black")

   canvas.draw_line((width/2, 295),(width/2, 210), 5, "Black")

   canvas.draw_line((width/2 + 60, 280),(width/2, 210),5, "Black")

   canvas.draw_line((width/2 + 60, 280),(width/2, 280),5, "Black")

frame = simplegui.create_frame('Boat in Water', width, height)

frame.set_canvas_background("White")

frame.set_draw_handler(draw)

frame.start()

What tips do you have for learning at home???

Answers

Answer:

nothing

Explanation:

Answer:

listen to music stay in a quiet space in your house and always have a snack with you

How many Leaf Nodes in the Binary Tree shown in figure:

Answers

Answer:

There are 2 leaf nodes in the given binary tree.

Explanation:

A tree stores the elements in the form of a hierarchal structure. The first node which has children is called the root of the tree. And the nodes with no children are called leaf nodes.

In the given diagram, we can see that all nodes have children except C and D so C and D are leaf nodes.

Hence,

There are 2 leaf nodes in the given binary tree.

Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management strategy? An indirect benefit? Provide examples.

Answers

Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.

It gives an illustration of the relationship of the National preparedness mission elements of risk.

Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.

However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.

Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.

When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.

THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.

"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.

Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.

The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi pounds, where vi and wi are integers. The thief wants to take as valuable a load as possible, but he can carry at most W pounds in his knapsack, for some integer W . Which items should he take?

Answers

Step by step Explanation:

Based on what we could deduce from the above statement, the items he should take are:

must either take one single item or must leave the other behind,and only a whole amount of an item must be taken,in which an item cannot be taken more than once into his knapsack.

Hence, the thief needs to carefully determine items with an optimal value which still falls within his specified weight (W).

Write a program which takes a String input, and then prints the number of times the string "sh" appears in the String (s and h can be any case).

Hint - remember there are String methods which return a copy of the String it is called on with all letter characters changed to the same case.

Sample run

Input String:
She sells seashells on the seashore
Contains "sh" 3 times.

Answers

import java.util.Scanner;

public class JavaApplication61 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Input String:");

       String text = scan.nextLine();

       text = text.toLowerCase();

       char c = ' ', prevC = ' ';

       int count = 0;

       for (int i = 0; i < text.length(); i++){

           c = text.charAt(i);

           if (c == 'h' && prevC == 's' && i >= 1){

               count += 1;

           }

             

            prevC = c;

       }

       System.out.println("Contains \"sh\" "+count+" times.");

       

       

   }

   

}

This works for me. Best of luck.

import java.util.Scanner;

public class{

public static void main(String[ ] args){

Scanner reader = new Scanner(System.in);

System.out.println(“Input String:”);

String input = reader.nextLine();

input = input.toLowerCase();

int count = 0;

for (int i = 0; i < input.length()-1; i++){

if (input.substring(i, i+2).equals(“sh”)){

count++;

}

}

System.out.println(“Contains \”sh\” ” + count + “times.”);

}

}

What study skill is being used when taking a large project and breaking it down into smaller manageable tasks?

Answers

Not sure but I think it’s called prioritizing

Answer:

prioritization

Explanation:

this is the answer

John's father specifically asked him to get a magnetic disk from the store in his neighborhood. What should John buy?
A. a floppy disk
B. a DVD
C. a CD-ROM
D. a Blu-ray disk

Answers

Answer:

A floppy disk

Explanation:

A floppy disk uses a thin sheet of magnetic material to store data. It would make the most sense as the other choices use an entirely different system.

If you are caught in a situation with an active shooter, which order should you plan a safe escape? A. Hide, Fight, Run B. Fight, Run, Hide C. Run, Hide, Fight D. Run, Fight, Hide

Answers

Answer:

The answer is C

Explanation:

the answer is run, hide, fight.

the first thing to do is try and run and get away.

the second thing you should do if you can't run is hide. Then if you can't run away nor hide you have to fight.

Pretty sure it’s C LOL hope dis helps

Create a dictionary that maps a fruit name to its color. Both the keys and the values should be stored as strings. Include only the following three entries in the dictionary: apple (red), orange (orange), and banana (yellow). Store the dictionary in a variable named fruit_dictionary.

Answers

Answer:

Written in Python:

fruit_dictionary = {}

fruit_dictionary = {'apple': 'red', 'orange': 'orange', 'banana': 'yellow'}

Explanation:

First (although, not necessary), we create an empty dictionary named fruit_dictionary on line 1

Next, we populate the dictionary using the following syntax:

{key-1:value-1, key-2:value-2,......,key-n:value-n}

In this case, the entry would be:

{'apple': 'red',

'orange': 'orange',

'banana': 'yellow'}

The items on the first column (i.e. apple, orange and banana) are the keys while the items on the second (i.e. red, orange and yellow) are the values of the dictionary

To print the items in the dictionary, you can add  the following line of code:

print(fruit_dictionary.items())

Plz help!! ASAP!! And thank you!!

Answers

Answer:

first one, become vulnerable to online harassment

It may be the first one because the other person said so

In tynker, it is not possible to create a

Answers

Answer:

whats tynker

Explanation:

What’s the question

When you are fit, you can exercise and do physical work without getting too tired. A. True B. False\

Answers

Answer:

A.

Explanation:

But all of us get tired

Answer: I did the test it's A

Explanation:

Other Questions
Which sentence contains a correctly punctuated parenthetical phrase?O The children my nieces and nephews, had to wash their hands before eating dinner. Reading a book, a good daily activity, gives anyone a first-class ticket to other worlds and other times.The television, the one with the broken screen is going to be discarded.O The runner the one from New Plains crossed the finish line first, and won the competition. -14 7/8 1 3/4 -1/2 Marilyn managed to sell 3/5 of her cakes. a. What percentage of cakes was sold?b. What percentage of cakes was left? Calculate the number of kilojoules of energy required to convert 50.0 grams of solid DMSO initially at a temperature of 19.0C to gas at 250.0C. 2.) What are three American strengthswhen war breaks out? What are good reasons for a married couples choosing to have a child? f(-5)= ? Anybody know it's from khan academy A committee that exists permanently in either the House of Representatives or the Senate is called a __________.A.permanent committeeB.long-term committeeC.standing committeeD.enduring committee A polynomial function is represented by the data in the table. x = -5, -4, -3, -2, -1f(x) = -15, -6, 1, 6, 9 Choose the function represented by the data.f(x) = 6x + 15f(x) = 6x 45f(x) = x2 40f(x) = x2 + 10 Solve each multi-step linear equation12-6x=-8x+7+7x If u have read chapter 3 of animal farm can u plz answer this question. If a friend is making lemonade from an instant mix, which set of conditions would lead to a faster rate of dissolving the mix in the pitcher of water?Cold water and powdered lemonadeCold water and lemonade tabletsWarm water and powdered lemonadeWarm water and lemonade tablets What is an example of a source that is less likely to be copyrighted? Edgenutiy 2020 9th i honeslty just need the answer . (3+3x)+(2x-8) whats the answer? y = 4x + 7 at x = -2 ? Thesis statement why is mathematics important? What is the distance, in meters, between adjacent fringes produced by a diffraction grating having 125 lines per centimeter Which set of numbers is included as part of the solution set of the compound inequalityx < 6 or x > 10?{7, 1.7, 6.1, 10}{3, 4.5, 13.6, 19}{0, 6, 9.8, 14}{8.5, 9.1} Elvie can encode a document 4 hours more than EJ does.The two worked together in 3 hours when EJ left for an important appointment.Elvin continued the job and completed it in two hours.