Answer:
In Java
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
int mnth, yr;
Scanner input = new Scanner(System.in);
System.out.print("Month: "); mnth = input.nextInt();
System.out.print("Year: "); yr = input.nextInt();
boolean lpYear = (yr % 4 == 0 && yr % 100 != 0) || (yr % 400 == 0);
if(mnth == 1 || mnth == 3 || mnth == 5 || mnth== 7 || mnth == 8 || mnth == 10 || mnth == 12){
System.out.print("31 days"); }
else if(mnth == 2){
System.out.print(((lpYear) ? "29 days" : "28 days")); }
else if(mnth == 9 || mnth == 6 || mnth == 4 || mnth== 11){
System.out.print("30 days"); }
else{ System.out.print("Invalid"); }
}
}
Explanation:
See attachment for complete program where comments were used as explanation.
Answer:
The answer is Pastoral society
Explanation:
- Pastoral originates from the Latin word pastor that's meaning is shepherd.
- The term Pastoral Society stands for a nomadic band of people looking for food with a herd of domesticated animals.
- It consists of pastoralists that means people whose lives are focused on grazing the land and caring for herds of animals.
Answer:
we can communicate many peoples
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
I do not know, i really hope you dont fail!!!!!!!!!