Provide a programme to determine whether a year is a leap year by using the criteria that it must be divisible by 4 and, if a century year, by 400.
Why is a leap year 366 days long?A solar year, which is the length of time it takes for Earth to orbit the Sun, is 365.25 days. The days in a calendar year are typically rounded up to 365. We add a day to our calendar every four years or so to make up for the lost part of the day.
YTD = int(input()),
If year%4 == 0, then
If year%100 >= 0, then
if 400 year% == 0:
print(year, "- leap year") (year, "- leap year")
if not: print (year, "- not a leap year")
if not: print (year, "- leap year")
if not: print (year, "- not a leap year")
Input:\s2000
2000 is the leap year.
Input:\s1900
The year 1900 was not a leap year.
To know more about programme visit:-
https://brainly.com/question/30307771
#SPJ1
The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance.
Hub
Hub has a detrimental effect on the functioning of the network Any incoming signal on any of its ports is recreated and sent out on any associated ports, which is a drawback of utilising this device.
In a local area network, a hub is a layer one (physical) device that connects different network components like switches and routers (LAN). It has several ports that are used to link different local area network segments (LAN). Because frames are replicated to every other port on the network when they are received at a hub's port, hubs are typically thought of as being.
Due to the fact that each incoming signal on any of a hub's ports is recreated and sent out on any associated ports, employing a hub has a detrimental effect on network performance.
Learn more about Network here:
https://brainly.com/question/17272513
#SPJ4
Which of the following is the correct binary representation of the number 2?
Answer:
10 i think
Explanation:
What does the coding phase involve?
A.
testing and debugging code to remove all possible errors
B.
writing sequences of statements in a suitable programming language to produce the desired program
C.
designing a proper pseudocode using human-readable language
D.
compiling and interpreting programs into machine language
E.
breaking down the entire code into workable modules
Answer:
I do believe it is D im not sure
Answer:
Ay homie the answer is B
Explanation:
Edmentum
Let's say set1 contains the following values: 1, 2, 3. set2 contains 3, 4, 5. Please name the difference between set1 and set2:
a. 4,5
b. 3
c. None of the above / below.
d. 1,2,3,4,5
e. 1,2
Answer:
c
Explanation:
None of the above /below
what are the difference between bit address 7ch and byte address 7ch
so a byte address can only send a get bytes (8 bits)
when a bit address can be more detailed as it can send a get not only bytes but bits also
-scav
A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. studylib
Answer:
Moderate.
Explanation:
A breach of security can be defined as any incident which results in an unauthorized access or privileges to a network, computer, software application, classified informations or data and services. There are three (3) levels of impact on an individual or organization when there's a breach of security; low, moderate and high.
A moderate level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. It causes a serious adverse effect on individuals, employees or organizational assets and operations.
However, in order to prevent a breach of security, it is advisable to use the following programs: firewall, demilitarized zone (DMZ), Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) etc.
types of function in python programming language
Answer:
there is help() min() and input() they are the base for python language!
there are some harder ones like User-Defined Functions (UDFs) and set()
2.
Review Later
Given the below screenshot, which of the following functions (when used in cell H9) using
=CHOOSE properly toggles between metal price scenarios?
B
D
G
H
2016
1 Price Deck
2 Management
3 Consensus
1
1,500
21
F
Metal Prices
Management
Gold
Silver
Consensus
Gold
Silver
Active Price Deck in Model
Gold
Silver
2
1350
20
Consensus
10
11
=CHOOSE(G9, H3, H6)
-CHOOSE(SG59, H4, H7, H10)
=CHOOSE(SGS9, H3, H6)
-CHOOSE(SFS25,616,619,622)
TE
Type here to search
a
CA
You can run a macro by: Selecting the button assigned, Using the shortcut keys assigned, Using the view tab, Selecting run macro from the status bar
Answer:
Run a macro by pressing a combination shortcut key In the Macro name box, click the macro that you want to assign to a combination shortcut key. Click Options. The Macro Options dialog box appears. In the Shortcut key box, type any lowercase or uppercase letter that you want to use with the shortcut key.
Explanation:
Answer:
the answer is D... Macros can carry viruses that can harm a computer.
Explanation:
YOUR WELCOME BABES!!!
plz help me with this I will mark as brainlest
In order to keep PCs from a home connected to each other
8. Suppose you've created a bulleted list, but the bullets are too close to the text. What is the best way to fix this?
To fix a bulleted list that are too close to the text, you need to add space using the space key on your keyboard or adjust the indentation bullets on the ruler.
How to add spacing in MS Word?To format a bulleted list in this software, it is necessary to use the context menu by clicking with the right mouse button and displaying the List Paragraph dialog box, located in the styles panel, which makes it possible to adjust and apply the ideal spacing.
Therefore, you can use additional formatting on List Paragraph and adjust your work to your preferences.
Find out more information about MS Word here:
https://brainly.com/question/1538272
You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next?
a) Check for data you have previously hidden.
b) Make the columns wider.
c) Check that the worksheet is not Read-Only.
d) Change the format to reduce the font size.
Answer:
a)
Explanation:
Since the worksheet contains most of the data that you need, there is a decent possibility that it also contains the data that you are missing. Therefore, you should check for data you have previously hidden. Sometimes, some data in a worksheet may become irrelevant in a given moment, and instead of deleting it since it may be useful later most people tend to make that data hidden. So checking for previously hidden data may be the best solution in this scenario.
Does woman hair grow over time in dayz?
In which of the following situations must you stop for a school bus with flashing red lights?
None of the choices are correct.
on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus
you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus
The correct answer is:
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school busWhat happens when a school bus is flashing red lightsWhen a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.
It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.
Learn more about school bus at
https://brainly.com/question/30615345
#SPJ1
_____ can be lost or stolen by cybercriminals. Select 2 options.
Free WiFi
Computer devices
Computer networks
Antivirus software
Portable devices
Answer:
Free WiFi
Computer networks
Explanation:
They cant really take your stuff they can only take virtual objects.
Filtering is a function of _____.
Describe what the 4th I.R. Means; and List the 4 most Important Variables of the How the 4th I.R. will change the lives of how we would Live and Work?
Answer:
The Fourth Industrial Revolution (4IR) is the ongoing transformation of the traditional manufacturing and industrial sectors through the integration of advanced technologies such as artificial intelligence, the Internet of Things (IoT), robotics, big data, and automation.
The four most important variables that will change the way we live and work in the 4IR are:
Automation: The increased use of robotics and automation will revolutionize the manufacturing industry and lead to more efficient and cost-effective production processes. This could lead to significant job displacement, but it could also create new opportunities for workers with new skills.
Big Data: The collection and analysis of massive amounts of data will allow businesses to gain new insights into customer behavior, supply chain efficiency, and product performance. This could lead to more personalized and efficient services, but also raise concerns around privacy and data security.
Artificial Intelligence: The use of advanced algorithms and machine learning will enable machines to perform complex tasks previously thought to require human intelligence. This could lead to more efficient and effective decision-making, but also raise concerns around the impact on jobs and the ethical implications of AI decision-making.
Internet of Things: The proliferation of connected devices will enable the automation and integration of various systems and processes, leading to more efficient and effective resource utilization. This could lead to significant improvements in healthcare, transportation, and energy management, but also raise concerns around privacy and security risks.
Overall, the 4IR is expected to bring significant changes to our economy, society, and daily lives, with both opportunities and challenges that we will need to navigate as we move forward.
Write a script to check command arguments (3 arguments maximum). Display the argument one by one. If there is no argument provided, remind users about the mistake. If there is an easy way to use a loop to get all arguments, use it?a) Display the source code in an editor b) Execute your script in the terminal, and display the command and the result
Answer:-args (
if:args=true
-cont
if:args=false
-cont investigating
if:args=irrelevance
-loop restate args
)
compile exec
Explanation:
What is the codebook?
Python dictionary of code shortcuts
Standard survey shorthand codes
Documentation of the survey questions, the design of the study and the encoding of the responses
General term for development code books
Answer:
Option C
Explanation:
A codebook gives following information
a) Content
b) Structure of the codebook
c) Layout of the data collected
In general it is a document that contain information about the purpose and format of the codebook along with the methodological details.
Hence, Option C is correct
A talented professional uses applicable information to create innovative solutions to a complex problem. This is an example of
OA critical thinking.
OB. work ethic.
OC diversity awareness.
OD. organization
Reset
Next
Since talented professional uses applicable information to create innovative solutions to a complex problem. This is an example of A critical thinking.
What is the critical thinking?Critical thinking involves examining data, detecting recurring trends, and assessing proof to duly arrive at logical conclusions and address obstacles. Smartly paraphrased: Creative and rational thinking combined with problem-solving skills is utilized to come up with innovative solutions to intricate issues.
The professional is characterized in the statement as utilizing relevant information to devise original remedies, which constitutes a vital element of critical thinking.
Learn more about critical thinking from
https://brainly.com/question/25434379
#SPJ1
Which one of the following does not contain information?
1) A weather report
2) A time table
3) A price list displayed in a supermarket
4) An unlabeled chart
Answer:
4
Explanation:
4 is the ans as weather;timtable and price list display information
4. What information is in the payload section of the TCP segments?
The actual data being transferred, such as the content of a web page, an email message, or a file transfer, is contained in the payload part of the TCP segments.
The content of a TCP segment is what?A segment header and a data chunk make up a TCP segment. There are ten required fields and one optional extension field in the segment header (Options, pink background in table). The payload data for the application is carried in the data section, which comes after the header.
What is the TCP Wireshark payload size?In established mode, a packet's maximum payload size is 1448 bytes (1500 - 20 IP header - 32 TCP header).
To know more about data visit:-
https://brainly.com/question/29851366
#SPJ1
Do you think that it is acceptable to base employment decisions solely on historical data?
No, the historical data may be biased against some candidates.
Yes, because knowing what worked before leads to choosing qualified candidates.
No, previous decisions should not be considered.
Yes, since the data can be used to create a decision-making algorithm.
Answer:
no
Explanation:
No, the historical data may be biased against some candidates.
The employment decisions should base solely on historical data because the data can be used to create a decision-making algorithm.
What is historical data?A historical data is the data that is collected based on past events and circumstances concerning an individual during an employment or about an organisation.
Employment decisions by human resource officers should be based solely on the historical data of their employees because it will give them insight on final decision to make.
Learn more about data here:
https://brainly.com/question/26711803
#SPJ2
In ……………cell reference, the reference of a cell does not change.
Answer:
In absolute cell reference, the reference of a cell does not change.
What is a disadvantage of a company having a widespread data capture strategy
Answer: it is illegal to generate data about a person
You may review Chapter 2, pages 67-71 of the textbook or communication skills.
Now please answer the following questions:
• What communication systems do you believe are best to be used at a help desk?
• What may be a couple of reasons for the satisfaction disparity?
• How can you ensure that all employees are satisfied with the help desk's services regardless of how
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 50-100-w
found to be compelling and enlightening. To help you with your discussion, please consider the following
• What differences or similarities do you see between your posting and other classmates' postings?
**what communication system do you believe are best to be used at a help desk?
The communication systems that are said to be used at help desks are:
Phone as well as Call Center SystemThe use of Email SystemThe use of Ticketing SystemWhat is the communication systems?In terms of Phone as well as Call Center System: This is seen as a form of a traditional system of communication that is often used as help desks.
It is one that gives room for a lot of users to be able ot call as well as speak directly with the person who is a help desk agents for any form of assistance.
Hence the choice of communication the the person who is help desk wants to use can depend on a lot of factors.
Learn more about communication systems from
https://brainly.com/question/30023643
#SPJ1
QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin
Answer:
Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.
Explanation:
If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least
If you buy $1000 bicycle, the credit payoff strategy that will result in your paying the least is option c) Pay $250 per month until it's paid off.
Which credit card ought to I settle first?You can lower the total amount of interest you will pay over the course of your credit cards by paying off the one with the highest APR first, then moving on to the one with the next highest APR.
The ways to Pay Off Debt More Quickly are:
Pay more than the required minimum.more than once per month.Your most expensive loan should be paid off first.Think about the snowball approach to debt repayment.Keep track of your bills so you can pay them faster.Learn more about credit payoff strategy from
https://brainly.com/question/20391521
#SPJ1
See full question below
If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least
a) Pay off the bicycleas slowly as possible
b) Pay $100 per month for 10 months
c) Pay $250 per month until it's paid off
Devision of floating binary
(100.0001)÷(10.1)
1.101 is the correct answer for floating-point binary (100.0001)÷(10.1).
The sign of a binary floating-point number is represented by a single bit. A 1 bit indicates a negative number, and a 0 bit indicates a positive number.
What is Binary Number System?
One of the four types of number systems is a binary number system. Binary numbers are represented in computer applications by only two symbols or digits, namely 0 (zero) and 1 (one). The binary numbers in this example are written in the base-2 numeral system. \(101_{2}\) is an example of a binary number. In this system, each digit is referred to as a bit.
A binary number is defined in digital electronics and mathematics as a number expressed in the binary system or base 2 numeral system. It denotes numerical values with two distinct symbols: 1 (one) and 0. (zero). The positional notation with 2 as a radix is the base-2 system.
Because of its direct implementation in electronic circuits using logic gates, the binary system is used internally by almost all modern computers and computer-based devices. Every digit is known as a bit.
To know more about Binary Number, visit: https://brainly.com/question/8649831
#SPJ1
The OSHA Publication
explains 8 rights that
workers have under the
OSH Act.
The OSHA Publication explains 8 rights that workers have under the OSH Act is known to be Workers' Rights - OSHA.
What is Workers' Rights - OSHA?This is known to be the making of the Occupational Safety and Health Administration (OSHA) and it is one that was said to be done in 1970
This is one that tends to provide all workers with their right to be in a safe and healthful work environment.
Hence, The OSHA Publication explains 8 rights that workers have under the OSH Act is known to be Workers' Rights - OSHA.
Learn more about OSHA Publication from
https://brainly.com/question/13708970
#SPJ1