1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
2 years ago
10

Write a class called Date that represents a date consisting of a day, month, and year. A date object should have the following m

ethods: public Date(int day, int month, int year) -- Constructs a new Date object to represent the given date public int getDay() -- returns the day value of this date public int getMonth() -- returns the month value of this date public int getYear() -- returns the year value of this date public void addDays(int days) -- Moves the Date object forward in time by the given number of days public int daysTo(Date other) -- Returns the number of days between this Date and the other Date public boolean isLeapYear() -- Returns true if the year of this Date is a leap year. A leap year occurs when the value of the year is divisible by 4, except when it is divisible by 100 and not 400 (so 1700, 1800, and 1900 are not leap years) public String toString() -- returns a String representation of this date in the form day/month/year Write a program in which to test your class. This program should prompt the user to enter the days, months, and years of two separate dates, and then print out the number of days between these two dates.
Computers and Technology
1 answer:
Inessa [10]2 years ago
7 0

Answer:

No

Explanation:

Because it's years and its also very public

You might be interested in
You conduct an experiment to find the probability of a flipped coin landing on
AleksAgata [21]

Answer:

Experimental probability describes how frequently an event actually occurred in an experiment. So if you tossed a coin 20 times and got heads 8 times, the experimental probability of getting heads would be 8/20, which is the same as 2/5, or 0.4, or 40%.

5 0
2 years ago
Read 2 more answers
In excel, a number can contain the characters__
KATRIN_1 [288]
Comma and period? You can have numbers like 123,456.78
7 0
3 years ago
60 POINTS!! WILL MARK BRAINLEST!!
polet [3.4K]

design of the network

security for the network

documentation

identifying and fixing issues

8 0
3 years ago
You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules a
Anna35 [415]

Answer:

Social Engineering

Explanation:

Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.

4 0
3 years ago
Compare userNumber with compareNumber and display 'Numbers are not equal' if the numbers are different. Then, display 'Variables
masya89 [10]

Answer:

Following are attached images that will help you understand the complete code. The code is tested with different variables and different outputs are obtained. All the necessary description is given in the form o comments inside the code.

Explanation:

3 0
3 years ago
Other questions:
  • What is the automotive name for the large wires that allow more electrical current to flow ?
    12·1 answer
  • 1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (
    12·1 answer
  • When one user could perform a query to determine which recordings had a track length of four minutes or more, and another user c
    9·1 answer
  • Your computer has a single hard disk w/ a single volume used by the C:\ drive. You have previously upgraded the disk to a dynami
    6·1 answer
  • What is a special type of variable used in subroutines that refers to a piece of data?
    15·1 answer
  • Give 4 examples of mnemonic codes, and what do they do?
    15·1 answer
  • While the Internet is used to share many useful services and information, there are growing concerns about the way that the Inte
    8·1 answer
  • Technical term of stealing personal information in social media.​
    5·1 answer
  • Heeeeeeeeeeeeeeeeeeeeeeeeelp pat.2
    12·1 answer
  • Why is experience in their own factory setting
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!