1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
7

The following method is intended to return true if and only if the parameter val is a multiple of 4 but is not a multiple of 100

unless it is also a multiple of 400. The method does not always work correctly public boolean isLeapYear(int val) if ((val 4) == 0) return true; else return (val & 400) == 0; Which of the following method calls will return an incorrect response?
A .isLeapYear (1900)
B. isLeapYear (1984)
C. isLeapYear (2000)
D. isLeapYear (2001)
E. isLeapYear (2010)
Computers and Technology
1 answer:
Tresset [83]3 years ago
5 0

Answer:

.isLeapYear (1900) will return an incorrect response

Explanation:

Given

The above method

Required

Which method call will give an incorrect response

(a) will return an incorrect response because 1900 is not a leap year.

When a year is divisible by 4, there are further checks to do before such year can be confirmed to be a leap year or not.

Since the method only checks for divisibility of 4, then it will return an incorrect response for years (e.g. 1900) that will pass the first check but will eventually fail further checks.

<em>Hence, (a) answers the question;</em>

You might be interested in
Plagiarism occurs when writers
pentagon [3]

Answer:

<h3><em>A</em>- Use others' ideas and writing as their own</h3>

Explaniation:

it's plagiarism, just don't take other people's work and pass it as your own. smh lol

3 0
3 years ago
Read 2 more answers
A 'deny any-any' rule in a firewall ruleset is normally placed: a. Nowhere in the ruleset if it has a default allow policyb. Bel
tia_tia [17]

Answer:

D. . At the bottom of the ruleset

Explanation:

The main purpose of firewalls is to drop all traffic that is not explicitly permitted. As a safeguard to stop uninvited traffic from passing through the firewall, place an any-any-any drop rule (Cleanup Rule) at the bottom of each security zone context

6 0
4 years ago
Illusions in physcology​
qaws [65]

<u>Illusions in Psychology​:</u>

An illusion is a mutilation of the faculties, which can uncover how the human mind typically sorts out and deciphers tangible incitement. Despite the fact that hallucinations twist our impression of the real world, they are commonly shared by a great many people.

They can happen for some reason, for example, the impact of light on an item, inadequate tangible data about an article, or mistakes in a person's handling of tactile subtleties.  

Most deceptions will, in general, hoodwink the eyes, ears, and skin, while there are a few fantasies that may misshape observation because of changes in interior body structures.

The three primary sorts of dreams incorporate optical fantasies, sound-related deceptions, and material figments. Likewise, Illusions give incredible insights into how the cerebrum forms data. Deductively, they can represent an issue for experimental research as they show the manners by which even direct perception can be deluding.

6 0
4 years ago
What mode is generally used when delivering a presentation to an audience?
dybincka [34]

Answer:

delivery mode

Explanation:

there it is

7 0
3 years ago
Read 2 more answers
The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal
KIM [24]

Answer:

Software requirement and estimation.

Explanation:

In this step, the proposals are collected, and best from them is made, and then checked for feasibility, and the SRS document is formulated finally. Now the each developer, designers, writers are being assigned the task, then finally the development phase starts. However, since this is SDLC, you will not find any iteration, and the defects are checked only after testing which is the last phase. And a lot of errors remain even after delivery sometimes. Also, it is time consuming to edit the errors in this manner. Hence, agile methodology is preferred.

6 0
3 years ago
Other questions:
  • Many people view drug and alcohol abuse as a social problem.<br> A. TRUE<br> B. FALSE
    9·1 answer
  • Select the instances in which you should include a comma.
    14·1 answer
  • Once you create a slide show, it is not easy to rearrange things, so you should plan your presentation ahead of time.
    14·1 answer
  • A bank has reworked its mortgage application process so that several steps are handled by computer software, and some steps are
    11·1 answer
  • Can you get banned on this
    10·2 answers
  • Which actions changed the look of the following word?
    11·2 answers
  • A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.
    8·1 answer
  • Different the need for external or secondary memory​
    12·1 answer
  • Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
    5·1 answer
  • In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!