We know that February has either 28 or 29 days, but there is a year in the future, February will have 30 days
What exactly is this year?

Answers

Answer 1

Answer:

39 days is the offensive number

Explanation:

cuz calendar no have that numer


Related Questions

Which of the following expressions in Java is equal to 4?

3% 7
7 % 3
17 % 7
11 % 7
28 % 7

Answers

Answer:

3% 7

Explanation:

because 7 because seven ate nine and three was lonely so seven decided to also eat three and became a lesser number somehow because three apparently was not as big as the number 9 so maybe eating three caused him to go down to 4

The expression "11 % 7" in Java is equal to 4.

The "%" operator calculates the remainder of a division operation.

In Java, the "%" operator is used to calculate the remainder of a division operation.

So, let's evaluate each expression and see which ones equal 4:

3 % 7 = 3 (remainder of dividing 3 by 7)

7 % 3 = 1 (remainder of dividing 7 by 3)

17 % 7 = 3 (remainder of dividing 17 by 7)

11 % 7 = 4 (remainder of dividing 11 by 7)

28 % 7 = 0 (remainder of dividing 28 by 7)

Based on these evaluations, the expression "11 % 7" is equal to 4.

To learn more about programming visit:

https://brainly.com/question/14368396

#SPJ3



does industry-recognized certifications (microsoft office suite) boost your resume and
increase your earning potential?

Answers

Answer:Having Microsoft Office training can make you more productive, confident, and satisfied with your job. ... Productivity is crucial to success in the administrative assisting field, and your employers will thank you for it. 3. Industry-recognized certification will boost your resume and increase your earning potential.

Explanation: i no it

Types of cloud storag?

Answers

Answer:

There r 3 types of data storage: object storage, file storage, and block storage. Each offers their own advantages and have their own use cases: Object Storage - Applications developed in the cloud often take advantage of object storage's vast scalablity and metadata characteristics.

ive atleast 10 examples of FAKE anti-virus and anti- spyware software

Answers

Answer:

Explanation:

protegent

spysheriff

doctor antivirus

winwebsec

spybouncer

thespybot

malwarealarm

macsweeper

spywarestop

spylocked

What is a segmentation?

Answers

Answer:

Segmentation means to divide the marketplace into parts, or segments, which are definable, accessible, actionable, and profitable

In which of these images would lines become an evaluating factor?

Answers

Answer: The fish?

Explanation:

Answer:

birds in flight  and railroad tracks

Explanation:

i got it right

Question
What protocol is used to discover the hardware address of a node with a certain IP address?

Answers

Answer:

ARP is a simple query–response packet protocol used to match workstations hardware addresses to IP addresses. In other words, ARP is the protocol used to identify nodes in a LAN. ARP is described in RFC 826

A reference is _____.

Answers

Answer:

a written or spoken comment that mentions somebody/something

the action of mentioning or alluding to something.

A field name can be up to 64 characters long

Answers

Answer:

Explanation:

cool ..........................,...............................

what are computer specification​

Answers

Answer:

They are basically all of your computer's information. It displays everything that has to do with the computer like model name, processor speed and etc.

They are basically all of your computer

What kind of loop repeats until something else (determined by the program) happens?
iterative number loop
condition-controlled loop
count-controlled loop
forever loop

Answers

Answer:

The Condition-controlled loop

Explanation: Because its called a Condition and it does not stop untill something happens thats why its called "condition".

Answer: It's Condition-controlled loop

Explanation: The meaning of condition-controlled loop is Blocks will keep repeating until a condition is satisfed, Also beacuse I already did the quiz.

Which telemetry is used for monitoring astronauts in space​

Answers

Answer:

I believe it is medical telemetry

It’s Astroskin for there health the use the to help them in space

IT professionals ensure servers connected to the network operate properly. (2 points) True False

Answers

Answer:

True

Explanation:

Thats one of their most important jobs

phân tích cạnh tranh của cocacola và pepsi

Answers

I don’t understand please speak English

Write a program that can add, Subtract, multiply and divide entered numbers.

Answers

In Python:

def add(x, y):

   return x + y

def subtract(x, y):

   return x - y

def multiply(x, y):

   return x * y

def divide(x, y):

  return x / y

What is another name for a switch A.Number system B.Variable C.Logic Gate D.Boolean

Answers

Answer:

logic gate

Explanation:

took the test lol

ACTIVITY NI MATCHING TYPE Directions: Match Column A with Column B. Write the letter of the correct answer on the space provided before the number a. Trion your nails b. visits the dentist c. scrub your hands with soap and water d. wear deodorant taking a bath 18111411 hely wear suitable clothes at work g. avoidis open wounds while working with food h. Regularly out your hair. 1. Use a seperate towel or cloth wiping hands. . keep sanitizer. 10.​

Answers

Answer:

Mark me a brainless plss i need that i am blink plss

Please answer the following question in Verilog.

To test our functions we will generate a 3-bit vector that counts up by one every cycle which we will use as the inputs to the decoder. The decoder output will then be fed into the inputs of the encoder to produce an inverted version of the original 3-bit test vector. For every input vector you should toggle the enable signal to both the encoder and decoder function which can be easily done by using the clock waveform used to determine when to increment the input vector as the enable signal as well.

Answers

Answer:

345678909 my number

Explanation:

What are the data type(s) will be used to declare the variable(s) needed to
create the algorithm?*

1.. integer only
2.. real only
3..integer and real
4..real and string

Answers

The three primitive data types used in this course are int (integer numbers), double (decimal numbers), and boolean (true or false). Each variable has associated memory that is used to hold its value.

When you use a library in your code, how do you give attribution?

Answers

When you use a library in your code, you give attribution: by writing the source, title, author and license in your code.

Attribution can be defined as a process which typically involves the citation (reference) of an original source of information such as a library, quote, paraphrase or summary, especially by using the author's full name, source, and job title (position) as the case may be.

In software development, you give attribution when you use a library in your code by writing the following:

The source in your code.The title in your code.The author in your code.The license in your code.

Read more: https://brainly.com/question/21172316

a. Get a value for x from the user.

b. Test to determine if x is positive. If not, tell the user that he or she has made a mistake.

c. Take the cube root of x.

d. Do Steps 1.1, 1.2, and 1.3 x times

Answers

Program (Python):-

[tex]\tt x=int(input("Enter\:your\:number:"))[/tex]

[tex]\tt if \:x<0:[/tex]

[tex]\tt \qquad print("You\:have\:made\: mistake")[/tex]

[tex]\tt else:[/tex]

[tex]\qquad\tt print("Well\:done")[/tex]

[tex]\tt cuberoot=x**1/3[/tex]

[tex]\tt print("Cube\:root=",cuberoot)[/tex]

[tex]\tt for\:i\:in\:range(x):[/tex]

[tex]\qquad\tt print(x)[/tex]

Sample output

Enter your number:-8

You have made mistake

Cuberoot=-2

-8

-8

-8

-8

-8

-8

-8

-8

Complete the following sentences by either filling in the blank or writing out the rest of the sentence (when there is a … ):

The internet is made up of _________ networks that all connect together to make a ____________ network.

The job of a router on the internet is to…


Clients allow people to…


Servers store _____________________ and send those to _____________ over the internet.


The internet is physically connected across the world using _______________


Computers break up information, like photos and emails, into ________________



The ___________ protocol tells computers how to break up the information and orders it.


The ________________ protocol tells the packets where they are going and where they are coming from.


The packets get to their destination by…


When the packets get to their destination, the __________ protocol…



Computers get the _______________ of servers by asking the ______________



Computers use the _____________ protocol to display a webpage.

Answers

Answer

hundreds,  massive, connect to the internet gigabytes, people, computers,

bytes, TCP/IP, TCP, internet, TCP, answers, questions, HTTP

Explanation:

Language is Python
9.9 LAB: Count input length without spaces, periods, exclamation points, or commas

Given a line of text as input, output the number of characters excluding spaces, periods, exclamation points, or commas.

Ex: If the input is:

Listen, Mr. Jones, calm down.
the output is:

21

Answers

Answer:

text = input('Please enter a line of text')

text = text.replace(" ", "")

text = text.replace(".", "")

text = text.replace("!", "")

text = text.replace(",", "")

print(len(text))

Explanation:

i answered this same exact question the other day.

line by line, the first line asks for input with a prompt.

the second line replaces spaces, the next one replaces periods, the next exclamation marks, the next commas. then the last line prints the total number of characters

In this exercise we have to use the computer language knowledge in python to write the code as:

the code is in the attached image.

In a more easy way we have that the code will be:

text = input('Please enter a line of text')

text = text.replace(" ", "")

text = text.replace(".", "")

text = text.replace("!", "")

text = text.replace(",", "")

print(len(text))

See more about python at brainly.com/question/26104476

What is printed when the following code has been executed?
int x = 15;
int y = 4;
System.out.println((2 * x + y) % x);
15
4
34
2
19

Answers

Hey it is 15 hope this helps

Select the correct locations on the image.
In which of these images would the rule of thirds become an evaluating factor?

Answers

Answer:

apple

Explanation:

the one of the apple is right

Which of the following factors is most likely to result in low shipping and handling costs? A higher than average hourly pay rate for material handlers A rare but high-in-demand packaging material A promotion for free shipping on orders over a predetermined order total All of the above​

Answers

Answer: A higher than average hourly pay rate for material handlers

Explanation:

Shipping and handling cost describes costs related to the total cost of an ordered item which are included in the fees used to deliver the item to the buyer. Hence, the correct option is C

Shipping and handling cost usually depend on the size of the item, the buyer's location and fragility of the item purchased.

From the options given, handling and shipping fee may be reduced as a result of free promotional shipping on orders.

Handler and drivers who are paid above average will result in increased shipping fee and rare in-demand items won't come cheap either.

Hence, low shipping fee will most likely be as a result of promotion for free shipping on orders over a predetermined order total.

Learn more : https://brainly.com/question/20533392

Hey all! How would you write write this code?

Write a C++ program using variables and loops in order to implement the Hi-Low strategy of card counting and keep a running count. The Hi-Low strategy of card counting assigns one of three values to a card, based on its face value. The table below breaks down these values. FACE VALUE ASSIGNEDVALUE 2, 3, 4, 5, 6 +1 7, 8, 9 0 10, J, Q, K, A -1 In a typical game of Blackjack, a card counter will start with a fresh deck and a count of 0. Each time a card is played, its assigned value is added (or subtracted) from what is known as the running count. The running count rolls over from hand to hand. For instance, if the first 7 cards of a game were: Queen, Jack, 4, 6, 7, Jack, 9, then the running count would be (0) -1 -1 + 1 + 1 + 0 –1 + 0 =-1

Answers

The program is an illustration of loops.

Loops are used to perform repetitive actions.

The program in C++ where comments are used to explain each line, is as follows:

#include <string>

#include <iostream>

using namespace std;

int main(){

   //This declares all variables

   int n, count = 0; string k;

   //This gets input for the number of cards

   cin>>n;

   //The following is repeated n-times

   for(int i = 0;i <n;i++){

       //This gets input for the current card value

       cin>>k;

       //If the card is a digit

       if(isdigit(k[0])){

           //This checks if the card number is between 2 and 6 (inclusive)

           if(stoi(k) >= 2 && stoi(k) <= 6){

               //If yes the face value is increased by 1

               count+=1;

           }

           //This checks if the card number is 10

           else if(stoi(k) == 10){

               //If yes the face value is decreased by 1

               count-=1;

           }

       }

        //This checks if the card number is J, Q, K or A

       else if (k == "J" || k == "Q" || k == "K" || k == "A") {

           //If yes the face value is decreased by 1

           count-=1;

       }

   }

   //This prints the face value

   cout<<count;

   return 0;

}

At the end of the program, the face value is printed.

Read more about similar programs at:

https://brainly.com/question/24578223

What protocol is used to discover the hardware address of a node with a certain IP address?

Answers

Answer: ARP hope this helps

what are the components of computer system??

Answers

Answer:

1. A motherboard.

2. A Central Processing Unit (CPU)

3. A Graphics Processing Unit (GPU), also known as a video card.

4. Random Access Memory (RAM), also known as volatile memory.

5. Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)

(Please give me brainliest)

explain how communication in fuses management efficiency​

Answers

Explanation:

Effective communication is pivotal in increasing productivity because it directly influences the behavior of the staff and the way they perform. ... That is why it is essential that you practice communicating with your staff. It will improve understanding and, in the result, will elevate productivity and efficiency.

Other Questions
Robin earned $4,320 in 9 weeks and worked 40 hours in each week. How much did he earn per hour? which one would it be WILL GIVE BRAINLIEST!!Hookes Law for an elastic spring states that the distance a spring stretches varies directly as the force applied. If a force of 180 newtons stretches a spring 5 cm, how much will a force of 270 newtons stretch the same spring? It takes 46 pounds of seed to completely plant a 5 acre field how many pounds of seeds are needed per acre The application of ________ during metamorphism causes elongated crystals to align parallel with each other. When this happens, the rock develops ________. a. pressure; foliation b. high temperatures; foliation c. differential stress; foliation d. pressure; a homogeneous texture Suggest one peice of laboratory apparatus which is suitable to be used for transferring the concentrated acid into a beaker. Explain your answer Question 11 of 15Which characteristic applies to early civilizations in India but not in China?A. Use of oracle bones for ritualsB. Cities with complex sewage systemsC. Use of rivers for water and fertile soilD. Limited contact with other civilizations Only a few organisms become extinct each year.TrueFalse the family and medical leave act allows employees to take unpaid leave for which of the following reasons ALREADY SOLVED Thank you for looking. The Tell - Tale Heart Assessment Questions Common Lit 1. Which statement best describes a major theme of the story? A. People can never truly escape the terrible things they have done.B. People without remorse can commit terrible crimes without consequences.C. People often make a mistake while committing a crime because of their arrogance.D. People who are very lonely may turn their feelings on others and cause them harm.I chose A is that correct? 10) The mother looked for her kid wherever she could 'Wherever she could' is clause a) Adverb b) Adjective c) Noun d) Independent Someone help this is a test and i need to finish this quick i will give brainliest of it lets me justify each step and write their properties2(7-v)-3v How did the alien and sedition acts help the Federalist Party control national politics?A. by prohibiting the formation of any new political partiesB. by restricting peoples ability to criticize the government C. by limiting the ability of the states to challenge the federal governmentD. by empowering the president to remove member of the Supreme Court 8. Negative three times the sum of a number and two is fifteen Which can lead scientists to change a theory that has already been accepted? Check all that apply.changes to scientific lawsnew experimental methodsnew hypothesestechnological inventionsrepetitions of old experiments What is the most commonly used insanity defense? point S lies an AB. If AB=34 units, AS=5+2x units, and SB=x+2 units, what is the length of AS in units? What is the Domain and range of y = 2 x - 11 + 2