Create a program that will ask the user some personal information. the program should be able...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Create a program that will ask the user some personal information. the program should be able to display a paragraph using the information provided by the user. it should also determine the remaining years that the user have before getting 60 years old. sample output: Enter First Name: Juan Enter Last Name: Dela Cruz Enter Age: 18 Enter City: Angeles Hello, Juan Dela Cruz from Angeles! in 42 years, you will become 60 years old. create a program that will ask the user to enter two numbers (first number, second number). the program should be able to determine which number is bigger. example: num1: 4 num2: 8 the second number is bigger! Create a program that will ask the user some personal information. the program should be able to display a paragraph using the information provided by the user. it should also determine the remaining years that the user have before getting 60 years old. sample output: Enter First Name: Juan Enter Last Name: Dela Cruz Enter Age: 18 Enter City: Angeles Hello, Juan Dela Cruz from Angeles! in 42 years, you will become 60 years old. create a program that will ask the user to enter two numbers (first number, second number). the program should be able to determine which number is bigger. example: num1: 4 num2: 8 the second number is bigger!
Expert Answer:
Answer rating: 100% (QA)
Python Personal Information Program firstname inputEn... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these programming questions
-
Over the telephone, America's Clothing Market orders 100 T-shirts with a custom design printed on the front from Outfit Manufacturing for $1,500. The following day, America's Clothing Market calls to...
-
THIRD AVENUE SOFTWARE HEALTH-CARE APP PROJECT This case is new for the ninth edition of Information Technology Project Management . The case provides an opportunity to apply agile and Scrum...
-
Write a project management plan. we have a template and project description. we need to edit the template(table of contents) with our own ideas. CPSC 8820-01 Project Management Plan Your Unique...
-
What conditions must apply for Andersons classification of tectonic stress to be strictly valid?
-
Gallup conducted a national survey of 1008 American adults, asking "As you may know, as part of its efforts to investigate terrorism, a federal government agency obtained records from larger U.S....
-
The following logic circuit is similar to the one in Question 4, except that the AND and OR gates are in reversed positions. Complete the corresponding truth table by calculating the output value for...
-
You are designing a new glass factory near the ocean. Sand is to be mined wet from the beach. However, wet sand carries with it seawater entrained between sand grains. Salt must be removed by a...
-
Following is a statement of cash flows (indirect method) for Hartford, Inc., for the year ended December 31, 2011. Also shown is a partially completed comparative balance sheet as of December 31,...
-
Write an "appreciation" of van Gogh's Night Cafe from a formalist perspective.
-
A steam power plant operating on a regenerative cycle, as illustrated in Fig. 8,5, includes just one feed water healer. Steam enters the turbine at 650(psia) and 900(oF) and exhausts at 1(psia)....
-
In 2012, there was an experiment that college students were given either four quarters or a $1 bill and they could either keep the money or spend it on gum. The results are summarized in the table....
-
What is entropy? Information systems staff often have a very high rate of turnover in their jobs. Is this a form of entropy in information systems? If so, how can concurrent auditing techniques be...
-
Outline the difference between the snapshot and extended record concurrent auditing techniques.
-
Describe two methods of removing the effects of ITF transactions and the relative advantages and disadvantages of each method.
-
Describe two methods of entering test data for an ITF application and discuss the relative advantages and disadvantages of each method.
-
Briefly describe the nature of ITF.
-
Solve 16X2 Al dx
-
Reconsider Prob. 1474. In order to drain the tank faster, a pump is installed near the tank exit as in Fig. P1475. Determine how much pump power input is necessary to establish an average water...
-
I. Explain how it is a widely held view that these unsecured, dial-up connection points represent a substantial exposure to attack. II. Comprehend that an attacker who suspects that an organization...
-
Explain that the national Infra Gard program began as a cooperative effort between the FBIs Cleveland field office and local technology professionals, and it was established in January 2001....
-
Identify that EC Council is a new competitor in certifications for security management. They offer a Certified CISO (CCISO) certification which tests security domain knowledge as well as knowledge of...
-
Arich uncle allows you to stipulate which of two ways you receive your inheritance: a. \($850,000\) one year after his death or b. \($250,000\) on his death and \($200,000\) each year at the end of...
-
You have the right to receive \($30,000\) at the end of each of the next four years, and money is worth 8%. Using the PV tables, your financial calculator, or Excel, compute the present value of this...
-
Briefly describe the concept of the time value of money.
Study smarter with the SolutionInn App