1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
13

Which of the following statements is NOT a valid way to create a date object named birthday?

Computers and Technology
1 answer:
dem82 [27]3 years ago
4 0

Answer:

var birthday = "12/2/1978";

Explanation:

It does not create a date object named birthday because in this statement the birthday is a string which contains 12/2/1978 a date it is not date object it is a string.All other three options are correct way to create a date object.

var birthday = new Date();

creates a date object with the current date and time.

we can also pass date string in the new Date().So var birthday = new Date("12/2/1978"); is also correct.

we can also pass year,month,day in new Date() In this order only.So option fourth is also correct.

You might be interested in
Write a question that the database will understand. Which records are not equal to 5? < 5 > 5 > =5 < > 5
Novay_Z [31]

Answer:

In the given question the option "<5, >5, and < >5" is not equals to 5.

Explanation:

In this question the option "<5, >5, and < >5" is not equal to 5. That can be described as:

  • In the following options, the value that is 5 is less than, greater than and less than greater than that means all option is not equal to 5.
  • In these options, only the third option is equal to the value.

That's why the answer to this question is "<5, >5, and < >5".

4 0
3 years ago
After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
liberstina [14]

Answer:

a, c, & e

Explanation:

7 0
3 years ago
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
Technician A says that OBDI and OBDII use different DLC connectors. Technician B says that OBDII standardizes the designations f
Ivenika [448]

Answer:

The answer is "Technician B"

Explanation:

The OBDII is a standardized, automated framework which the USA EPA had approved and installed into its whole year of modeling (MY) 1996 and then into modern light-duty vehicles and trucks, recognized as "on-board diagnostics II."  

  • The DTC framework is a set of problematic diagnostic codes that used alert you if a vehicle is unable to operate using an on-board Diagnostic System.
  • If the system of the automobile identifies a problem, a special DTC code is generated as well as a position sensor is sent to the instrument cluster, that's why Technician B is correct.
8 0
3 years ago
Which of the following changes the features (e.g., thickness of the line, shadow, 3-D effect, single or double, etc.) of the bor
lilavasa [31]
Border style
I hope it’s work
8 0
3 years ago
Other questions:
  • How is a Personal Fact Sheet used? a. A Personal Fact Sheet is a tool used to market yourself and build your network b. A Person
    13·2 answers
  • True or False
    10·2 answers
  • Heres the last questions
    5·1 answer
  • A typical day in programming and software development would involve
    7·1 answer
  • Why can it be helpful to perform mathematical calculations using programming? Choose the best answer.
    11·1 answer
  • Math and science are the foundation from which drafters work<br><br> True<br> False
    8·1 answer
  • 1. Which of the following is not true about high-level programming language s? (a) Easy to read and write (b) Popular among prog
    12·1 answer
  • Choose the response that best completes the following statement.
    14·2 answers
  • What is 2+2 I need to know hurry
    12·2 answers
  • What would the input, process, outcome and feedback be for a class assignment
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!