answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
1 year ago
13

Write an application that allows a user to enter the names and birthdates of up to 10 friends. Continue to prompt the user for n

ames and birthdates until the user enters the sentinel value ZZZ for a name or has entered 10 names, whichever comes first. When the user is finished entering names, produce a count of how many names were entered, and then display the names. In a loop, continuously ask the user to type one of the names and display the corresponding birthdate or "Sorry, no entry for name" if the name has not been previously entered. The loop continues until the user enters ZZZ for a name.
Computers and Technology
1 answer:
baherus [9]1 year ago
7 0

Answer:

<em>Written in Python</em>

names= []

birthday = []

name = input("Name: ")

bday = input("Birthday: ")

for i in range(1,11):

    names.append(name)

    birthday.append(bday)

    if name == "ZZZ":

         break;

    else:

         name = input("Name: ")

         bday = input("Birthday: ")

print("Length: ", end='')

print(len(names))

checknm = input("Check Name: ")

while checknm != "ZZZ":

    if checknm in names:

         ind = names.index(checknm)

         print(birthday[ind])

    else:

         print("Sorry, no entry for name")

    checknm = input("Check Name: ")

Explanation:

<em>The program is written in Python and I've added the full source code as an attachment where I used comments to explain difficult lines</em>

<em />

Download txt
You might be interested in
Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the m
Ymorist [56]

Answer:

C) Exit all programs and shut down the compute

Explanation:

4 0
2 years ago
The maximum number of times the decrease key operation performed in Dijkstra's algorithm will be equal to ___________
katovenus [111]

Answer:

b) Single source shortest path

Explanation:

These are the options for the question

a) All pair shortest path

b) Single source shortest path

c) Network flow

d) Sorting

Dijkstra's algorithm is algorithm by

Edsger Dijkstra arround the year 1956, this algorithm determine the shortest path, this path could be between two nodes/vertice of a graph.

The steps involves are;

✓setting up of the distances base on the algorithm.

✓ calculation of the first vertice up to vertice adjacent to it

✓The shortest path result.

It should be noted that maximum number of times the decrease key operation performed in Dijkstra's algorithm will be equal to Single source shortest path.

3 0
1 year ago
A remediation liaison makes sure all personnel are aware of and comply with an organization's policies.
Ratling [72]

Answer:

False.

Explanation:

I believe this should be the work of a compliance liaison. Assume you have opened up an organization that is growing each day. You have employees who are required to be compliant with all the security standards and policies. Hiring a compliance liaison will ensure that these compliances are being carried out. Each department in an organization should work with a compliance liaison to ensure that its employees understand and comply fully with all security policies.

8 0
1 year ago
What is an input to the Program Increment Planning process that highlights how Product Management plans to accomplish the Vision
Tatiana [17]

Answer:

Business Context

Explanation:

The input "business context" is an input to Program Increment Planning that helps understand what is the vision in Product Management.

6 0
1 year ago
Early Intel processors (e.g., the 8086) did not provide hardware support for dual-mode operation (i.e., support for a separate u
Firlakuza [10]

Answer:

Uneven use of resources

Explanation:

Potential problem associated with supporting multi - user operation without hardware support is:

Uneven use of resources: In a situation where we assign a set of resources to user 1 and if a new user comes, then it would be difficult to allocate new resources to him. The processor would get confused between the two users. And the tasks would not be completed. This can affect task processing.

8 0
1 year ago
Other questions:
  • What name are input devices, output devices, and auxiliary storage devices collectively known?
    9·1 answer
  • Survey Q, Non-scoring: What role are you playing in your team?
    5·2 answers
  • Does the Boolean expression count &gt; 0 and total / count &gt; 0 contain a potential error? If so, what is it?
    8·1 answer
  • When trying to improve performance of a slow system, you notice in Task Manager that the superfetch service is using a high perc
    11·1 answer
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • For any element in keysList with a value greater than 60, print the corresponding value in itemsList, followed by a semicolon (n
    14·2 answers
  • In cell J4, calculate
    8·1 answer
  • Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
    5·1 answer
  • Your project must satisfy the following requirements:
    7·1 answer
  • Suggest how the following requirements might be rewritten in a quantitative way. You may use any metrics you like to express the
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!