1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
3 years ago
7

Explain two ways by which the calendar meets or fails to meet the criteria of showing the correct data

Computers and Technology
1 answer:
gtnhenbr [62]3 years ago
7 0

Answer:

The two ways the calendar meets the criteria of showing the correct date are;

1) The calendar can give dates in the 12 months in a year

2) The calendar can show up to the 31 different days in a month

Explanation:

The two ways in which the calendar meets the criteria of showing the correct date are;

1) The number number of long blocks with 4 different months each = Three

Therefore, the total number of months the blocks can hold = 3 × 4 months = 12 months = The number of months in a year

2) The number of faces on each dice = 6 faces

The number of dice = 2 dice

The total number of faces = 12

The number of identical faces = 2 (11th and 22nd of the month)

The number of unique faces = 10

The number of combinations of the dices = ₁₀C₂ = 45

The number of combination of faces required to show = 1 to 31 = 31 combination

Therefore, there are adequate combinations on the dice to show all the dates of month

You might be interested in
In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
Hunter-Best [27]
I believe that the multiple questions attached to this question is 

a) Hello
b) Link groups
c) Path groups
d) Heartbeats

The Answer is B and C
The physical interfaces that are supposed to be monitored are connected into a link group and a firewall failure can be triggered when one or all physical interfaces in the group failPath Monitoring helps monitor the full path to mission critical IP addresses. By default, any one of the IP addresses becoming unreachable will end up causing the firewall to change the HA to tentative state
7 0
3 years ago
how can you create fades with the smart tool? How can you specify the types of fade curves that are used with the smart tool?
ra1l [238]

Answer:

The correct answer to the following question is:

To create fades you can click and then drag the end of the clip with a smart tool.

Fade Dialog Box is the fade curve.  

Explanation:

Smart Tool is an application which also provide their users with the features of the quick access menu by which they can easily access their programs or the software.

By using smart tool the user also creates a crossfade.

8 0
3 years ago
Given a Student class, create a class with following characteristics:
Kay [80]

Answer:

ssume that,

Maximum “students” count can be 10.

*Driver Class*

*Solution class*

import java.util.*;

class Student {

private String name;

private int rollNo;

public String getName() {}

public void setName(String name) {}

public int getRollNo() {}

public void setRollNo(int rollNo) {}

};

class ClassRoom {

private int i;

private Student[] students;

public void addStudent(String name, int rollNo) {}

public Student[] getAllStudents() {}

};

8 0
3 years ago
A software computer error, is a error produced by the malfunctioning of a computer part. E.g. RAMImmersive Reader
Andru [333]

Answer:

? is this you question true or false because i dont know the answer yet

Explanation:

4 0
3 years ago
Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R
Igoryamba

Answer:

Risk assessment, Input validation and Output validation.

Explanation:

Software development life cycle, SDLC, is a systematic process a software being created must pass through or follow, from the stage of conception to death of the application.

There are various processes that occurs at the beginning of SDLC, a few of the activities are risk management, input and output validation.

Risk management is used to determine the feasibility, usefulness and profitability to cost of the software before development. The input and output validation is for security control access to the data of the software.

3 0
3 years ago
Other questions:
  • How is a recession determined?
    10·1 answer
  • Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
    14·1 answer
  • Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
    9·1 answer
  • What kind of app or technology would you like to create?  Why ? <br><br><br>​
    11·1 answer
  • 8. A sprite is a simple spider shaped thing with n legs coming out from a center point. The angle
    10·1 answer
  • How are programs and algorithms related? A program is a part of an algorithm. They are not connected at all. An algorithm is a p
    12·1 answer
  • Explain why the operating system hides certain folders ​
    5·1 answer
  • You send a friend a private message about something personal that is going on with you. Without permission, she forwards your te
    10·1 answer
  • The higher the ____________________, the faster the ____________________.
    5·1 answer
  • Write a method named addCommas that accepts a string representing a number and returns a new string with a comma at every third
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!