1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
11

You have imported a library with the birthMonth() function. Based on the API, how many strings are inputed to calculate the birt

h month?
Computers and Technology
1 answer:
Kruka [31]3 years ago
8 0

Answer: Only 1 string is entered

str(dayWeek) is the only string entered into the function.

str(return) is outputted, not inputted.

Numbers are not strings.

// calculate birth month based on the day of the month, day of the week, and the birth year

// dayMonth {number} - a day of a month from 1 to 31

// dayWeek {string} - the name of the day of the week

// year {number} - the birth year

// return {string} - the month you were born

BirthdayLibrary.birthMonth(dayMonth, dayWeek, year);

You might be interested in
Technology that verifies a person's identity is _____. a smart card Automated Fingerprint Verification an EPD a digital ink pen
tresset_1 [31]
The answer is Automated fingerprint.
 Automated Fingerprint is the process that verifies a person's identity. It is primarily used for law enforcement agencies for criminal identification initiatives. It is important because it includes identifying a person suspected of committing a crime or linking suspects to unsolved crimes. 

3 0
3 years ago
Read 2 more answers
How many bits per pixel does a black and white image require?
allochka39001 [22]
Depends on the size of the image

Hope this is helpful
8 0
3 years ago
Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message
barxatty [35]
Sam’s Public Key. Hope it helps)
6 0
3 years ago
It is important to ____ the line in the code editing window in the exact location where you want to insert a code snippet to pro
stepan [7]

Answer:

right -click

Explanation:

<h2><u>Fill in the blanks </u></h2>

It is important to <u>right - click</u>  the line in the code editing window in the exact location where you want to insert a code snippet to produce the shortcut menu with the Insert Snippet command.

8 0
3 years ago
You give an object a more meaningful name by setting the object’s _________________ property.
viva [34]

Answer:

The correct answer to this question is "Name".

Explanation:

In the programming language, the object is a part of the object-oriented programming language (oops).In all (oops) programming language we use class and object. where class is a collection of data member and member function, and object is a real-world entity. An Object is an instance of a Class. When a class is created, no memory is assigned but when we create the object of the class then memory is allocated.

In this question except option (d), all options are wrong.

7 0
3 years ago
Other questions:
  • Which of the following statements is false? Speaking to your computer is a form of input. Playing a video is an example of outpu
    10·1 answer
  • Which description of the plain text file format is most accurate?
    10·1 answer
  • Can anyone help me<br> I will make you a brainalist
    13·1 answer
  • Which of the following statements are valid in Java? (Assume that console is Scanner object initialized to the standard input de
    15·1 answer
  • Create the following new exceptions: PokemonException, which extends the Exception class. It must have a no-parameter constructo
    13·1 answer
  • Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
    8·1 answer
  • A collection is a container object (data structure) that represents a group of objects often referred to as data or elements of
    6·1 answer
  • A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the admi
    7·1 answer
  • What is the function of this logical comparator! =?
    8·1 answer
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!