Display a message saying the date is not magic

Assignment Help Basic Computer Science
Reference no: EM131236405

The date June 10, 1960 is special because when we write it in the following format, the month times the day equals the year.
6/10/60

Write a program that asks the user to enter a month (in numeric form), a day, and a two-digit year. The program should then determine whether the month times the day is equal to the year. If so, it should display a message saying the date is magic. Otherwise it should display a message saying the date is not magic.

Reference no: EM131236405

Questions Cloud

What are the advantages of a virtual organization : What are the advantages and disadvantages of a virtual organization? Explain. Contrast the mechanistic and organic model.Which would you personally rather work for? Why?
Define realism as a major art movement : Define "Realism" as a major art movement during the nineteenth century. Google images of Courbet, such as "The Stone Breakers" and "Burial at Ornans." Courbet used to brag that he was known as "the first socialist painter."
Determine il if output terminal is accidental shorted : Determine vO for (i) IL = 5μA, (ii) IL = 5 mA, and (iii) IL = 25 mA. -  Determine IL if the output terminal is accidental shorted to ground.
Rococo artists fragonard and boucher : Google "The Swing" and "Nude on a Sofa" by Rococo artists Fragonard and Boucher, and the neoclassical works "The Oath of the Horatii" and "La Grande Odalisque" by David and Ingres. Write a paper contrasting the amoral decadence and excess of the R..
Display a message saying the date is not magic : The date June 10, 1960 is special because when we write it in the following format, the month times the day equals the year.6/10/60
Identify two business situation within your current industry : Identify two business situations or problems within your current organization or industry. Articulate how one of these lends itself to a simple linear regression and how one does not.
Identify the pros and cons of each learning approach : Briefly define Kirkpatrick's Four Levels of Evaluation. Then, discuss which particular level you would use in your Portfolio Project assignment to measure training, and why that level offers a better strategy than utilizing any other level. Offer ..
Nietzsche provides a defense of myth : From the Birth of the Tragedy: In section 23, Nietzsche provides a defense of myth. He juxtaposes a people whose self-understanding is rooted in myth and a people whose self-understanding is totally un-mythical or is opposed to myth.
Display the roman numeral version of that number : Converter Write a program that asks the user to enter a number within the range of 1 through 10. Use a switch statement to display the Roman numeral version of that number. Input Validation: Do not accept a number less than 1 or greater than 10.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Show how to the final heap created in the previous problem

1) show the result of inserting the following values one at a time into    an initially empty binary heap. (show the heap after the insert).     use trees to illustrate each heap.    42,11,28,8,13,61,18 2) show how to the final heap created in the ..

  Find an evaluation study

Find an evaluation study from http://usableweb.com or one of your own choice. Please answer the questions and submit via the Assignment Link- you may use Zip format for submission. Instructions:

  Malicious threat sources to physical security

Identify the malicious threat sources to physical security and their corresponding countermeasures. Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments?

  First name, last name, phone number

First Name, Last Name, Phone Number, email address (add additional elements as desired)  2. Include a search criteria based on last name or any of the elements created for your phone book entries in order to retrieve the information requested.

  Names and majors of students

Print the names and majors of students who are taking one of the College Geometry courses. (Hint: You'll need to use the "like" predicate and the string matching character in your query.)

  Using the assigned journal article for the week compose a

using the assigned journal article for the week compose a two page paper on the unified modeling language uml. what is

  Give the forwarding tables for each of the bridges

As in the previous problem, consider the arrangement of learning bridges shown in Figure 3.38. Assuming all are initially empty, give the forwarding tables for each of the bridges B1-B4 after the following transmissions:

  Identifying a medicine

A healthcare center in Baltimore employs seven doctors and two receptionists. Patients are registered with one doctor, but can arrange appointments with any available one. These appointments may subsequently be cancelled. Some appointments result ..

  What is the maindifference between the fms attack

What is the maindifference between the FMS attack and Chopchop attack? Clearly explain youranswer in 600 words.

  Rapid technological change in it

The memory unit of a computer has 256K words of 32 bits each. The computer has an instruction format with 4 fields: an opcode field; a mode field to specify 1 of 7 addressing modes; a register address field to specify 1 of 60 registers; and a memo..

  Four consecutive clock pulses

A given FSM has an input w, and an output,z. During four consecutive clock pulses, a sequence of four values of the w is applied. Derive a state table for the FSM that produces z = 1 when it detects that either the sequence w: 0101 or w: 0111 has bee..

  Can the ifft flow graph be obtained from the one

Can the IFFT flow graph be obtained from the one for the direct FFT?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd