1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
7

The current calendar, called the Gregorian calendar, was introduced in 1582. Every year divisible by four was declared to be a l

eap year, with the exception of the years ending in 00 (that is those divisible by 100) and not divisible by 400. For instance, the years 1600 and 2000 are leap years, but 1700, 1800, and 1900 are not. Write a program that requests a year as input and states whether it is a leap year. (Test the program on the years 2008, 2009, 1900, and 2000.)
Computers and Technology
1 answer:
Naily [24]3 years ago
8 0

Solution :

Public Function Is a Leap_Year(Year As_Integer) As Integer

'Dim Tor_F for local variable declaring if value is t/f.

Dim TorF As For Boolean

'Pre conditions: Year > 1581 and Year < 3000

If Year > 1581 And Year <> 1700 Or 1800 Or 1900 Then

IsLeapYear = Year / 4

Else

IsLeapYear = False

TorF = False

End If

End Function

You might be interested in
what key aspects did you learn regarding the creation, analysis, and management of information systems? How will this impact you
Lady_Fox [76]

Answer:

Explanation:

What key aspects did you learn regarding the creation, analysis and management of information systems?

First of all, that there are several methodologies to develop an information system, each of them have their own steps to follow and it is really important to do echa one corretly because all the process is important.

Another important aspect is that once the information system is created, it is very important to keep maintaining it, check it regularly, this is for a goo management of it.

How will this impact ypur future?

Information systems nowadays are very common, for every aspect of our lives you can develop ahelpful one, this is how it will impact my future.

What thoughts or issues were developed that require further exploration?

Several questions must be investigated and answered once the system is working, such as...

Was the data the correct one? (correct methodology)

Is the system really having an impact?

Does it fill the time-quality-cost triangle aspect?

7 0
4 years ago
The term used to describe the shape and layout of a computer component such as a motherboard or hard drive is __ factor?
Flauer [41]
FORM factor. Example are ATX, micro ATX, and many more. ATX and MATX are the most common next to servers as well
3 0
3 years ago
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
3 years ago
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
Traveling abroad to have sex with underage children is known as?
insens350 [35]
The correct answer I believe is A Sex offender
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which online text source would include a review of a new TV show?
    9·2 answers
  • True / False
    5·1 answer
  • Why are I/O (input/output operations) important in database environment?
    8·1 answer
  • Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the
    12·1 answer
  • The first known permanent photograph was called "View from the Window at Le Gras." True False
    9·1 answer
  • Pls help me<br> first one to answer correctly gets brainly points
    6·2 answers
  • Web design and development tools
    13·1 answer
  • Suppose a byte-addressable computer using set-associative cache has 2 16 bytes of main memory and a cache size of 32 blocks and
    10·1 answer
  • Identify and explain 3 methods of automatically formatting documents​
    8·1 answer
  • The _____ of a story describes the time and location of a story.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!