3.25 LAB: Leap year
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are:

1) The year must be divisible by 4

2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400; therefore, both 1700 and 1800 are not leap years

Some example leap years are 1600, 1712, and 2016.

Write a program that takes in a year and determines whether that year is a leap year.

Ex: If the input is:

1712
the output is:

1712 - leap year
Ex: If the input is:

1913
the output is:

1913 - not a leap year

Answers

Answer 1

Provide a programme to determine whether a year is a leap year by using the criteria that it must be divisible by 4 and, if a century year, by 400.

Why is a leap year 366 days long?

A solar year, which is the length of time it takes for Earth to orbit the Sun, is 365.25 days. The days in a calendar year are typically rounded up to 365. We add a day to our calendar every four years or so to make up for the lost part of the day.

YTD = int(input()),

If year%4 == 0, then

If year%100 >= 0, then

if 400 year% == 0:

print(year, "- leap year") (year, "- leap year")

if not: print (year, "- not a leap year")

if not: print (year, "- leap year")

if not: print (year, "- not a leap year")

Input:\s2000

2000 is the leap year.

Input:\s1900

The year 1900 was not a leap year.

To know more about programme  visit:-

https://brainly.com/question/30307771

#SPJ1


Related Questions

The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance.
Hub

Answers

Hub has a detrimental effect on the functioning of the network Any incoming signal on any of its ports is recreated and sent out on any associated ports, which is a drawback of utilising this device.

In a local area network, a hub is a layer one (physical) device that connects different network components like switches and routers (LAN). It has several ports that are used to link different local area network segments (LAN). Because frames are replicated to every other port on the network when they are received at a hub's port, hubs are typically thought of as being.

Due to the fact that each incoming signal on any of a hub's ports is recreated and sent out on any associated ports, employing a hub has a detrimental effect on network performance.

Learn more about Network here:

https://brainly.com/question/17272513

#SPJ4

Which of the following is the correct binary representation of the number 2?

Answers

Answer:

10 i think

Explanation:

What does the coding phase involve?
A.
testing and debugging code to remove all possible errors
B.
writing sequences of statements in a suitable programming language to produce the desired program
C.
designing a proper pseudocode using human-readable language
D.
compiling and interpreting programs into machine language
E.
breaking down the entire code into workable modules

Answers

Answer:

I do believe it is D im not sure

Answer:

Ay homie the answer is B

Explanation:

Edmentum

Let's say set1 contains the following values: 1, 2, 3. set2 contains 3, 4, 5. Please name the difference between set1 and set2:

a. 4,5
b. 3
c. None of the above / below.
d. 1,2,3,4,5
e. 1,2

Answers

Answer:

c

Explanation:

None of the above /below

what are the difference between bit address 7ch and byte address 7ch

Answers

so a byte address can only send  a get bytes (8 bits)

when a bit address can be more detailed as it can send a get not only bytes but bits also

-scav

A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. studylib

Answers

Answer:

Moderate.

Explanation:

A breach of security can be defined as any incident which results in an unauthorized access or privileges to a network, computer, software application, classified informations or data and services. There are three (3) levels of impact on an individual or organization when there's a breach of security; low, moderate and high.

A moderate level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. It causes a serious adverse effect on individuals, employees or organizational assets and operations.

However, in order to prevent a breach of security, it is advisable to use the following programs: firewall, demilitarized zone (DMZ), Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) etc.

types of function in python programming language​

Answers

Answer:

there is  help()  min()  and input() they are the base for python language!
there are some harder ones like User-Defined Functions (UDFs) and set()

2.
Review Later
Given the below screenshot, which of the following functions (when used in cell H9) using
=CHOOSE properly toggles between metal price scenarios?
B
D
G
H
2016
1 Price Deck
2 Management
3 Consensus
1
1,500
21
F
Metal Prices
Management
Gold
Silver
Consensus
Gold
Silver
Active Price Deck in Model
Gold
Silver
2
1350
20
Consensus
10
11
=CHOOSE(G9, H3, H6)
-CHOOSE(SG59, H4, H7, H10)
=CHOOSE(SGS9, H3, H6)
-CHOOSE(SFS25,616,619,622)
TE
Type here to search
a
CA

2.Review LaterGiven the below screenshot, which of the following functions (when used in cell H9) using=CHOOSE

Answers

Im pretty sure it is b

You can run a macro by: Selecting the button assigned, Using the shortcut keys assigned, Using the view tab, Selecting run macro from the status bar​

Answers

Answer:

Run a macro by pressing a combination shortcut key In the Macro name box, click the macro that you want to assign to a combination shortcut key. Click Options. The Macro Options dialog box appears. In the Shortcut key box, type any lowercase or uppercase letter that you want to use with the shortcut key.

Explanation:

Answer:

the answer is D... Macros can carry viruses that can harm a computer.

Explanation:

YOUR WELCOME BABES!!!

plz help me with this I will mark as brainlest​

plz help me with this I will mark as brainlest

Answers

In order to keep PCs from a home connected to each other

plz help me with this I will mark as brainlest

8. Suppose you've created a bulleted list, but the bullets are too close to the text. What is the best way to fix this?

Answers

To fix a bulleted list that are too close to the text, you need to add space using the space key on your keyboard or adjust the indentation bullets on the ruler.

How to add spacing in MS Word?

To format a bulleted list in this software, it is necessary to use the context menu by clicking with the right mouse button and displaying the List Paragraph dialog box, located in the styles panel, which makes it possible to adjust and apply the ideal spacing.

Therefore, you can use additional formatting on List Paragraph and adjust your work to your preferences.

Find out more information about MS Word here:

https://brainly.com/question/1538272

You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next?
a) Check for data you have previously hidden.
b) Make the columns wider.
c) Check that the worksheet is not Read-Only.
d) Change the format to reduce the font size.

Answers

Answer:

a)

Explanation:

Since the worksheet contains most of the data that you need, there is a decent possibility that it also contains the data that you are missing. Therefore, you should check for data you have previously hidden. Sometimes, some data in a worksheet may become irrelevant in a given moment, and instead of deleting it since it may be useful later most people tend to make that data hidden. So checking for previously hidden data may be the best solution in this scenario.

Does woman hair grow over time in dayz?

Answers

it grows but not drastically but you’ll be able to see the difference of length in a few months or even years depending on the person.

In which of the following situations must you stop for a school bus with flashing red lights?

None of the choices are correct.

on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus

you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

Answers

The correct answer is:

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

What happens when a school bus is flashing red lights

When a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.

It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.

Learn more about school bus at

https://brainly.com/question/30615345

#SPJ1

_____ can be lost or stolen by cybercriminals. Select 2 options.

Free WiFi

Computer devices

Computer networks

Antivirus software

Portable devices

Answers

Answer:

Free WiFi

Computer networks

Explanation:

They cant really take your stuff they can only take virtual objects.

Free Wifi and Computer Networks

Filtering is a function of _____.

Answers

The answer is: switches.

Explanation:

Filtering is a function of switches.

Describe what the 4th I.R. Means; and List the 4 most Important Variables of the How the 4th I.R. will change the lives of how we would Live and Work?

Answers

Answer:

The Fourth Industrial Revolution (4IR) is the ongoing transformation of the traditional manufacturing and industrial sectors through the integration of advanced technologies such as artificial intelligence, the Internet of Things (IoT), robotics, big data, and automation.

The four most important variables that will change the way we live and work in the 4IR are:

Automation: The increased use of robotics and automation will revolutionize the manufacturing industry and lead to more efficient and cost-effective production processes. This could lead to significant job displacement, but it could also create new opportunities for workers with new skills.

Big Data: The collection and analysis of massive amounts of data will allow businesses to gain new insights into customer behavior, supply chain efficiency, and product performance. This could lead to more personalized and efficient services, but also raise concerns around privacy and data security.

Artificial Intelligence: The use of advanced algorithms and machine learning will enable machines to perform complex tasks previously thought to require human intelligence. This could lead to more efficient and effective decision-making, but also raise concerns around the impact on jobs and the ethical implications of AI decision-making.

Internet of Things: The proliferation of connected devices will enable the automation and integration of various systems and processes, leading to more efficient and effective resource utilization. This could lead to significant improvements in healthcare, transportation, and energy management, but also raise concerns around privacy and security risks.

Overall, the 4IR is expected to bring significant changes to our economy, society, and daily lives, with both opportunities and challenges that we will need to navigate as we move forward.

Write a script to check command arguments (3 arguments maximum). Display the argument one by one. If there is no argument provided, remind users about the mistake. If there is an easy way to use a loop to get all arguments, use it?a) Display the source code in an editor b) Execute your script in the terminal, and display the command and the result

Answers

Answer:-args (

if:args=true

-cont

if:args=false

-cont investigating

if:args=irrelevance

-loop restate args

)

compile exec

Explanation:

What is the codebook?
Python dictionary of code shortcuts
Standard survey shorthand codes
Documentation of the survey questions, the design of the study and the encoding of the responses
General term for development code books

Answers

Answer:

Option C

Explanation:

A codebook gives following information

a) Content

b) Structure of the codebook

c) Layout of the data collected

In general it is a document that contain information about the purpose and format of the codebook along with the methodological details.

Hence, Option C is correct

A talented professional uses applicable information to create innovative solutions to a complex problem. This is an example of
OA critical thinking.
OB. work ethic.
OC diversity awareness.
OD. organization
Reset
Next

Answers

Since talented professional uses applicable information to create innovative solutions to a complex problem. This is an example of A critical thinking.

What is the critical thinking?

Critical thinking involves examining data, detecting recurring trends, and assessing proof to duly arrive at logical conclusions and address obstacles. Smartly paraphrased: Creative and rational thinking combined with problem-solving skills is utilized to come up with innovative solutions to intricate issues.

The professional is characterized in the statement as utilizing relevant information to devise original remedies, which constitutes a vital element of critical thinking.

Learn more about  critical thinking from

https://brainly.com/question/25434379

#SPJ1

Which one of the following does not contain information?
1) A weather report
2) A time table
3) A price list displayed in a supermarket
4) An unlabeled chart

Answers

Answer:4




Explanation: common sense

Answer:

4

Explanation:

4 is the ans as weather;timtable and price list display information


4. What information is in the payload section of the TCP segments?

Answers

The actual data being transferred, such as the content of a web page, an email message, or a file transfer, is contained in the payload part of the TCP segments.

The content of a TCP segment is what?

A segment header and a data chunk make up a TCP segment. There are ten required fields and one optional extension field in the segment header (Options, pink background in table). The payload data for the application is carried in the data section, which comes after the header.

What is the TCP Wireshark payload size?

In established mode, a packet's maximum payload size is 1448 bytes (1500 - 20 IP header - 32 TCP header).

To know more about data  visit:-

https://brainly.com/question/29851366

#SPJ1

Do you think that it is acceptable to base employment decisions solely on historical data?
No, the historical data may be biased against some candidates.
Yes, because knowing what worked before leads to choosing qualified candidates.
No, previous decisions should not be considered.
Yes, since the data can be used to create a decision-making algorithm.

Answers

Answer:

no

Explanation:

No, the historical data may be biased against some candidates.

The employment decisions should base solely on historical data because the data can be used to create a decision-making algorithm.

What is historical data?

A historical data is the data that is collected based on past events and circumstances concerning an individual during an employment or about an organisation.

Employment decisions by human resource officers should be based solely on the historical data of their employees because it will give them insight on final decision to make.

Learn more about data here:

https://brainly.com/question/26711803

#SPJ2

In ……………cell reference, the reference of a cell does not change. ​

Answers

Answer:

In absolute cell reference, the reference of a cell does not change. 

What is a disadvantage of a company having a widespread data capture strategy

Answers

Answer: it is illegal to generate data about a person

You may review Chapter 2, pages 67-71 of the textbook or communication skills.
Now please answer the following questions:
• What communication systems do you believe are best to be used at a help desk?
• What may be a couple of reasons for the satisfaction disparity?
• How can you ensure that all employees are satisfied with the help desk's services regardless of how
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 50-100-w
found to be compelling and enlightening. To help you with your discussion, please consider the following
• What differences or similarities do you see between your posting and other classmates' postings?
**what communication system do you believe are best to be used at a help desk?

Answers

The communication systems that are said to be used at help desks are:

Phone as well as Call Center SystemThe use of Email SystemThe use of Ticketing System

What is the communication systems?

In terms of Phone as well as Call Center System: This is seen as a form of a traditional system of communication  that is often used as help desks.

It is one that gives room for a lot of users to be able ot call as well as speak directly with the person who is a help desk agents for any form of assistance.

Hence the choice of communication  the the person who is help desk wants to use can depend on a lot of factors.

Learn more about   communication systems from

https://brainly.com/question/30023643

#SPJ1

QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin

Answers

Answer:

Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.

Explanation:

If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least

Answers

If you buy $1000 bicycle, the credit payoff strategy that will result in your paying the least is option c) Pay $250 per month until it's paid off.

Which credit card ought to I settle first?

You can lower the total amount of interest you will pay over the course of your credit cards by paying off the one with the highest APR first, then moving on to the one with the next highest APR.

The ways to Pay Off Debt More Quickly are:

Pay more than the required minimum.more than once per month.Your most expensive loan should be paid off first.Think about the snowball approach to debt repayment.Keep track of your bills so you can pay them faster.

Learn more about credit payoff strategy from

https://brainly.com/question/20391521
#SPJ1

See full question below

If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least

a) Pay off the bicycleas slowly as possible

b) Pay $100 per month for 10 months

c) Pay $250 per month until it's paid off

Devision of floating binary
(100.0001)÷(10.1)

Answers

1.101 is the correct answer for floating-point binary (100.0001)÷(10.1).

The sign of a binary floating-point number is represented by a single bit. A 1 bit indicates a negative number, and a 0 bit indicates a positive number.

What is Binary Number System?

One of the four types of number systems is a binary number system. Binary numbers are represented in computer applications by only two symbols or digits, namely 0 (zero) and 1 (one). The binary numbers in this example are written in the base-2 numeral system. \(101_{2}\) is an example of a binary number. In this system, each digit is referred to as a bit.

A binary number is defined in digital electronics and mathematics as a number expressed in the binary system or base 2 numeral system. It denotes numerical values with two distinct symbols: 1 (one) and 0. (zero). The positional notation with 2 as a radix is the base-2 system.

Because of its direct implementation in electronic circuits using logic gates, the binary system is used internally by almost all modern computers and computer-based devices. Every digit is known as a bit.

To know more about Binary Number, visit: https://brainly.com/question/8649831

#SPJ1

The OSHA Publication
explains 8 rights that
workers have under the
OSH Act.

Answers

The OSHA Publication explains 8 rights that workers have under the OSH Act is known to be Workers' Rights - OSHA.

What is Workers' Rights - OSHA?

This is known to be the making of the Occupational Safety and Health Administration (OSHA) and it is one that was said to be done in 1970

This is one that tends to provide all  workers with their right to be in a safe and healthful work environment.

Hence, The OSHA Publication explains 8 rights that workers have under the OSH Act is known to be Workers' Rights - OSHA.

Learn more about OSHA Publication from

https://brainly.com/question/13708970

#SPJ1

Other Questions
my Christmas present to you Which statement best describes the majority of soldiers that George Washington commanded?They were hired from other countries to fight.They were citizen-soldiers who served for only a short time,They were rugged men from the frontierThey were experienced veterans of the French and Indian War. help me please you don't have to answer all , only 1 is okay. thank you so much slope y-intercept form of an equation for a line that has an x-intercept of "-3" and goes through (-2,2) b cells are induced to switch to alternative immunoglobulin isotypes under the influence of which component? Tight monetary policy theory dictates that when the economy is faced with inflation, the government should:______ The Family Inventory of Life Events and Changes (FILE) measures the severity of different stressors. The most severe of all is How do Supreme Court justices decide how to rule in a case? Copper is an element. How do these images of copper illustrate this? Madame Malkin's Robes Ltd. has fixed costs of $400,000 and variable costs are 40% of sales. What amount of total sales are required for Madame Malkin to meet a target net income of $20,000? Enamel is the hardest substance in the human body. Justify your answer. which somatic sensory receptor is rapidly adapting and responsible for fine touch? Ritas recipe uses 3 cups of sugar to make 3 1/2 dozen cookies. Which recipe uses more sugar for a dozen cookies? hey yall i need help pls dont flag me neither Pituitary dwarfism and pituitary gigantism are both caused by improper secretions from the pituitary gland and primarily affect a person's: do this look right? its asking for the correct formal command Choose or write the equation that models the situation. Do NOT solve.Write an equation to model the final cost of the book C. The final cost is p, theoriginal price of the book, minus a 25% of the original book price. Combine liketerms.C = 0.75pC = p - 25C=P - 25O p = 0.250 I WILL GIVE BRAINERLEST ABD LIKE AND 5 STARS IF YOU ANSWER How many people n would be seated ineach section if there were 27 totalpeople in the gym? help meplease i dont understand what is the purpose of the firm under the shareholder theory of the firm? multiple choice question. to generate jobs for the general public to create new and improved products for customers to serve to create value for society to maximize its long-term market value