1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
3 years ago
7

Explain two ways by which the calendar meets or fails to meet the criteria of showing the correct data

Computers and Technology
1 answer:
gtnhenbr [62]3 years ago
7 0

Answer:

The two ways the calendar meets the criteria of showing the correct date are;

1) The calendar can give dates in the 12 months in a year

2) The calendar can show up to the 31 different days in a month

Explanation:

The two ways in which the calendar meets the criteria of showing the correct date are;

1) The number number of long blocks with 4 different months each = Three

Therefore, the total number of months the blocks can hold = 3 × 4 months = 12 months = The number of months in a year

2) The number of faces on each dice = 6 faces

The number of dice = 2 dice

The total number of faces = 12

The number of identical faces = 2 (11th and 22nd of the month)

The number of unique faces = 10

The number of combinations of the dices = ₁₀C₂ = 45

The number of combination of faces required to show = 1 to 31 = 31 combination

Therefore, there are adequate combinations on the dice to show all the dates of month

You might be interested in
Which option is an example of a Boolean operator?<br> O A. HTML<br> O B. <br> C. SEO<br> D. NOT
gayaneshka [121]

Answer:

D

Explanation:

Boolean Operators are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine or exclude keywords in a search, resulting in more focused and productive results. ... Proximity Operators (with, near and others) can also help you in searching. See Using Proximity Operators for more details and examples.

8 0
3 years ago
a customer receives a message from the bank asking him/her to provide login information. assuming the message is intended to def
gizmo_the_mogwai [7]

The type of infiltration technique used here is phishing. Phishing is a form of social engineering attack that is often used to obtain user information such as login and credit card information.

Phishing is a type of social engineering in which an attacker delivers a false (e.g. fake, fake, or other deceptive) communication designed to trick a person into providing critical information to the attacker, or to install malicious software, such as ransomware, on the victim. infrastructure.

Phishing attacks are becoming more sophisticated and often transparently mirror the website being attacked, allowing the attacker to track everything the victim is doing there and bypass other security barriers with them.

By far the most common attack by hackers as of 2020, according to the FBI Internet Crime Complaint Center, which records more phishing incidents than any other type of cybercrime combined.

To know more about phishing click here:

brainly.com/question/24156548

#SPJ4

7 0
10 months ago
Which type of address is the ip address 232. 111. 255. 250?.
svp [43]
I think it’s a multicast
8 0
2 years ago
If you want to copy data from one cel to another cell that is several rows down in a worksheet, which method should you use?
bogdanovich [222]

copy and paste

so you can keep the data in the current cell and add it to other cells that you want that data in as well

5 0
3 years ago
Hurrryyyy it’s either a or c
Veseljchak [2.6K]

Answer and Explanation:

I believe its A. Modularity enables multiple programmers to work on a program at the same time..

Let me know if I'm wrong..

4 0
3 years ago
Other questions:
  • #Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The fun
    14·1 answer
  • Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?
    8·1 answer
  • /*
    8·1 answer
  • Please help me I don’t know what to do
    13·2 answers
  • Whats a field in databases?
    5·1 answer
  • What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y
    11·1 answer
  • Fill in the blanks:
    15·1 answer
  • Horizontal and vertical scaling usually refer to increasing the capacity of
    6·1 answer
  • What is the main difference between weathering, erosion and leaching​
    9·1 answer
  • When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representi
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!