1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
10

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac

count for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are:
1) The year must be divisible by 4

2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400

Some example leap years are 1600, 1712, and 2016.

Write a program that takes in a year and determines whether that year is a leap year.

Ex: If the input is:

1712
the output is:

1712 - leap year
Ex: If the input is:

1913
the output is:

1913 - not a leap year
LABACTIVITY

5.24.1: LAB: Leap year

0 / 10

main.py

Load default template...

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

else

isLeapYear = false;

}

else

isLeapYear = true;

}

else

isLeapYear = false;

if(isLeapYear)

System.out.println(inputYear + " is a leap year.");

else

System.out.println(inputYear + " is not a leap year.");

}
Computers and Technology
1 answer:
alexgriva [62]3 years ago
5 0

Answer:

hmmmmmmmmmmmmmmmmmmmmmmmmmmm

You might be interested in
The speed of sound depends on the material the sound is passing through. Below is the approximate speed of sound (in feet per se
german

Answer:

The Java Program for the given problem is as below. Directly copy the code and run it on your machine.

Explanation:

Refer the Screenshots attached for the output.

import java.io.BufferedReader;

import java.io.InputStreamReader;

public class TheSpeedOfSound {

public static void main(String[] s)

{

String medium;

double distance;

double time;

try{

BufferedReader choice = new BufferedReader(new InputStreamReader(System.in));

System.out.println("Enter one of the following: air, water, or steel: ");

medium = choice.readLine(); // reading input i.e. air, water or steel

//check for air water and steel

if (medium.equalsIgnoreCase("air") || medium.equalsIgnoreCase("water") || medium.equalsIgnoreCase("steel")){

System.out.println("Enter the distance the sound wave will travel: ");

distance = Double.parseDouble(choice.readLine()); // read distance value if it is air water or steel

switch (medium)

{

//if medium is air

case "air":

time = distance/1100;

System.out.print("It will take " + time + " seconds.");

break;

//if medium is water

case "water":

time = distance/4900;

System.out.print("It will take " + time + " seconds.");

break;

//if medium is steel

case "steel":

time = distance/16400;

System.out.print("It will take " + time + " seconds.");

break;

}

}

else{

System.out.print("Sorry, you must enter air, water, or steel.");  

}

}

catch(Exception e){

e.printStackTrace();

}

}

}

8 0
3 years ago
In what ways can information be slanted in a news report? List at least five ways.
Sedbober [7]

Answer:

author, journalist and speaker/media trainer this is all I know so

author, journalist and speaker/media trainer

6 0
3 years ago
Read 2 more answers
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
3 years ago
¿Cuales son las empresas mas exitosas que aún usan hoja de cálculo? porfa es urgentee
dem82 [27]

Answer:excel

Explanation:

6 0
2 years ago
To make the most informed purchasing decision, you should:
musickatia [10]

Answer:

its either A or B but im leaning more towards B

Explanation:

6 0
2 years ago
Other questions:
  • When you include a word cover page in a multi page document, the cover page is not considered the first page. True or false?
    13·1 answer
  • End-user development: the process by which an organization's non-it specialists create software applications.
    8·1 answer
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • Managers looking for advice on properly dealing with obsolete technology hardware can: a) consult the e-Stewards program b) seek
    9·1 answer
  • Columns are labeled with letters and Rows are labeled with numbers.
    5·1 answer
  • Apple's macOS and Microsoft Windows are examples of ________ software. utility application communication operating system
    13·1 answer
  • Benefits of computer in bank​
    5·1 answer
  • I need a explanation for this 02 question for a test I will have .
    11·1 answer
  • What is control structure write it's types​ .
    15·1 answer
  • Determine the value of a and b at the end of the following code segment:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!