1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
2 years ago
12

Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this

date of birth as incorrect 06/13/2014. Why was this not accepted?Why do you think this error occurred
Computers and Technology
1 answer:
Marina CMI [18]2 years ago
3 0

Answer:

i. This value was not accepted because we have 12 months and not 13.

ii. This is because the user entered the value for the day as value for the month.

Explanation:

i. Why was this not accepted?

This value was not accepted because we have 12 months and not 13. The user entered a value that was above the maximum value registered for the number of months in a year- which is 12.

ii. Why do you think this error occurred

This is because the user entered the value for the day as value for the month.

This could be because the user uses a date system different from that of the program.

You might be interested in
The Internet is written in a "language" called
olganol [36]

Answer:

HTTP

Explanation:

I hope it helps u.

Mark Me as brainlist answer

4 0
2 years ago
Read 2 more answers
Can you please provide sample rexx code?
Aleks04 [339]

Answer:

/*  My first REXX program  */

say 'Hello world'

Explanation:

REXX is an OS/2 scripting language.

7 0
3 years ago
A colleague sent you an awesome article about using proper ergonomics while sitting at the computer. You don't have time to read
lys-0071 [83]

Answer: Select the article attachment and save it to your computer.

Explanation:

5 0
2 years ago
Write a program that prompts for a file name and then reads the file to check for balanced curly braces, {; parentheses, (); and
Phoenix [80]

Answer:

Explanation:

The program is written in C++

/*

 C++ Program to check for balanced parentheses in an expression using stack.

 Given an expression as string comprising of opening and closing characters

 of parentheses - (), curly braces - {} and square brackets - [], we need to  

 check whether symbols are balanced or not.  

*/

#include<iostream>

#include<stack>

#include<string>

using namespace std;

// Function to check whether two characters are opening  

// and closing of same type.  

bool ArePair(char opening,char closing)

{

if(opening == '(' && closing == ')') return true;

else if(opening == '{' && closing == '}') return true;

else if(opening == '[' && closing == ']') return true;

return false;

}

bool AreParanthesesBalanced(string exp)

{

stack<char>  S;

for(int i =0;i<exp.length();i++)

{

 if(exp[i] == '(' || exp[i] == '{' || exp[i] == '[')

  S.push(exp[i]);

 else if(exp[i] == ')' || exp[i] == '}' || exp[i] == ']')

 {

  if(S.empty() || !ArePair(S.top(),exp[i]))

   return false;

  else

   S.pop();

 }

}

return S.empty() ? true:false;

}

int main()

{

/*Code to test the function AreParanthesesBalanced*/

string expression;

cout<<"Enter an expression:  "; // input expression from STDIN/Console

cin>>expression;

if(AreParanthesesBalanced(expression))

 cout<<"Balanced\n";

else

 cout<<"Not Balanced\n";

}

5 0
2 years ago
What can be controlled through IoT? Choose four answers.
Maru [420]

<em>The answer is: </em>

<em> </em>

<em>Door locks, light switches, security cameras and desktops (even laptops too) </em>

<em> </em>

<em>When we say Internet of Things, it is basically all objects that can be connected to internet (objects that are parts of our daily lives) can be included in this phrase or quote). There are technologies pertaining to common household items such as locks, switches and cameras that can be controlled through the use of phones and internet. These things collect and stores data such as names, fingerprints, pictures and scans that are used for verification and authentication purposes. </em>

<em> </em>

<em />

5 0
2 years ago
Other questions:
  • To employ an access key, press and hold down the ____ key as you tap the access key.
    14·1 answer
  • If you have 5 bits, how high can you go in binary?
    15·1 answer
  • Which of the following statements is true about scalability? Choose 3 options.
    9·2 answers
  • Explain why the control bus is not a bus.
    7·1 answer
  • Why would you use a custom filter?
    11·1 answer
  • Which clauses in the Software Engineering Code of Ethics are upheld by a whistleblower (check all that apply). "Respect confiden
    15·1 answer
  • How can I make a website login system with only using php?​
    6·1 answer
  • what is one example of the decomposers taking from the ecosystem and one of them giving to the ecosystem
    14·1 answer
  • ((11111111-1011100) X (10100 / 10))- ( 110010000+ 1110011)
    14·1 answer
  • Please complete the spelling please tell fast.​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!