Write pseudocode for one or more selection statements to decide whether a year is a Leap year. The rules are:

A year is generally a Leap Year if it is divisible by 4, except that if the year is divisible by 100, it is not a Leap year, unless it is also divisible by 400. Thus 1900 was not a Leap Year, but 2000 was a Leap year.

Answers

Answer 1
Year = input()

isLeapYear= false
if Year%4 = 0
if Year%100 != 0 or Year%400 == 0
isLeapYear = true
print(isLeapYear)

Answer 2

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

Year = input()

isLeapYear= false

if Year%4 = 0

if Year%100 != 0 or Year%400 == 0

isLeapYear = true

print(isLeapYear)

See more about python at brainly.com/question/26104476

Write Pseudocode For One Or More Selection Statements To Decide Whether A Year Is A Leap Year. The Rules

Related Questions

the fast speed of _______ available today enable computers to work very fast​

Answers

Answer:

main hardware components such as:

1. CPU

2. RAM

3. Motherboard (bus speed)

4. Hard drive

5. Video Card

6. Cache

7. Latest operating system (Windows XP, Windows 10, etc.)

what is the most common type of storage device for transferring files from one computer to another?

Answers

Answer:

USB flash drives is the most common type of storage device for transferring files from one computer to another

_____ selling is used when a product is sold from one business to another .

Answers

Answer: cross-selling

Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.

where should the works cited page appear in the document?

Answers

Answer:

The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).

Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.

Answers

The 3rd onee i think if not 4th

what sort of software programs are used to determine are of origin

Answers

Answer:

Explanation: Tools used to determine area of convergence and area of origin include: Elastic strings and protractors. Mathematical equations - (tangent trigonometric function) Computer software programs such as BackTrack™ or Hemospat.

Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever​

Answers

Cross bracing I think

Which is considered both an input and output device?

Keyboard
Microphone
Speaker
Touchscreen monitor

Answers

Answer: touchscreen monitor

Explanation:

devices are the pieces of hardware used by a human (or other system) to communicate with a computer. For instance, a keyboard or computer mouse is an input device for a computer, while monitors and printers are output deviceshope this help.

Answer:

Touchscreen monitor

Explanation:

You touch it to input commands since it's a touchscreen and it is also a visual output device that interprets data into a picture.

Hope this helps :)

what is the answer ?????​

Answers

Answer:

1) Driver or option D

2) Kindle or option C

Which options are available in the Conditional Formatting dialog box?

Answers

Answer:

all but b are correct.

Explanation:

what are the unique ICT needs for casinos?

Answers

Answer:

This is one of those slot game developers that not only create games, but it also creates entire platforms for online casinos and they have to pay for the games.

Explanation:

did someone actually hang themselves on the wizard of oz set

Answers

No - its a rumour started since the films 50th anniversary in 1989.

unable to find valid certification path to requested target

Answers

Answer:

Explanation:

This issue might arise if you are using a self-signed certificate or a certificate that's been issued by an internal certificate authority, or if your clients (e.g., browser, Java) are outdated. Trust is handled by having the root and intermediate certificates of your SSL certificate on a trusted keystore.

why does messenger keep saying waiting for network

Answers

you prob need to fix your data or redownload it again

How can we repair a head jack of a laptop charger.????​

Answers

Answer:

Step one turn off the laptop. And take out the battery step two remove the Phillips screw. And then take out the back. Cover. Step three remove four phillips screws. And then take out the hard.

Explanation:

A document used to convince a panel of potential funders to help a product, programor service become reality.

Answers

Answer:

Concept paper

Explanation:

did someone really hang themselves on wizard of oz

Answers

i think so the cast is def scary

search engines use software that combs the web to find webpages and add new data about them to the database. what is this software called?

Answers

Answer:

They basically use a technology called spider or web crawling, it basically just comb through the internet to find websites or webpages.

please give brainliest.

cui documents must be reviewed to which procedures before destruction?

Answers

Answer:

Documents containing CUI must be destroyed by shredding..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

The procedure before the destruction of the CUI document will be Records Management.

What is the CUI documents procedure?

Any CUI must go through the Records Management processes before it may be deleted. It must be determined if it is transient or persistent and then treated accordingly. Agencies are required to destroy CUI in a way that makes it unrecoverable, unreadable, and indecipherable, even when information is in electronic form.

Agencies are required to apply the procedure specified by law, legislation, or government-wide policy when destroying records. Cross-cut shredding that results in particles that are 1 mm x 5 mm (or less) in size or crushing are two techniques that have been authorized for eliminating paper-based CUI.

To acquire regulatory advice for records management and destruction processes, go to the course resources.

The CUI document must be reviewed to which procedures before destruction by Records Management.

More about the CUI documents procedure link is given below.

https://brainly.com/question/29871876

#SPJ12

How would you rate your prior knowledge or comfort level with the topic of technology applications?


A.

I am a technology application expert.

B.

I know a lot, but not everything about technology applications.

C.

I know a few things about technology applications.

D.

I am not familiar at all with technology applications.

Answers

Answer:

A

Explanation:

I know cyber security and Javascript and also a framework called svelte to create websites.

please help me i will give brainly

Answers

Answer:

CPU: central processing unit.

Operating System: system software that is installed on a computer to control and organize its component parts.

RAM: random access memory.

save as: command in the File menu that enables users to save their file to a different location.

Folder: an object that contains multiple documents or files.

icons: pictures that represent different commands or actions that you want the computer to perform.

Directory: index of all the files stored on the computer.

FAT: an organizational system used to organize files.

Difference between batabse and database management system

Answers

Answer:A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ... The data can then be easily accessed, managed, modified, updated, controlled, and organized.

Explanation:A database could be grades that students get at school and to manage it we can use a spreadsheet program like excel

Why would you browse by entering a URL rather than use a link in a Web page

Answers

Answer:

Rather than entering a URL in a web browser, I prefer to browse the webpage. Because if you do browse in the browser you can see other alternative options to that website.

only cool people answer this question.




are you cool?

Answers

Answer:

Yes

Explanation:

I like frogs

Answer:

always been coolswag

what does your dns server might be unavailable mean?

Answers

Answer:

flush your dns

Explanation:

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

what level of system and network is required for cui

Answers

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

Please please help ASAP please

Answers

Answer:

he say yes would i do so way 2 be hey i oh peepo

Explanation:

____ is the state of not sharing information with or being observed by others.

Answers

Answer:

Privacy(guessed ,not really sure about it).

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."

A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.

A device driver is a form of software file that ensures hardware device functions as designed.

Several types of device drivers include:

BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.

Hence, in this case, it is concluded that the correct answer is Device Driver.

Learn more here: https://brainly.com/question/19473613

Other Questions
Cmo se formaron los conjuntos numricos? BRAINLIEST FOR WHOEVER ANSWER CORRECTLY!!! please give me an explanation and your work Is anyone good at science please help for brainliest. Which statement provides the best explanation of the difference in biomass of organisms found at each trophic level? Jackson is interested in the number of memories people can recall. He knows that the number of memories recalled is normally distributed in the general population, with a population mean of 30 and a population standard deviation of 5. What is the probability that Jackson randomly selects a person from this population who recalls between 26 and 29 memories Could someone give me the answer to this question A bowl of berries contains 2 strawberries, 4 blackberries, 1 raspberry, and 3 blueberries Loue will randomly select two berries one at a time from the bowl and not put them back. What is the probability that the first berry Louie selects will be a raspberry and the second berry will be a blueberry? .) 3/9 b) 3/10 c) 1/30 d) 1/90 A delivery truck covers a distance of 50 miles every hour. Write the equation that represents, d, the truck has covered over h hours. An increase price caused no change in quantity demanded. Thus, demand must beHide answer choicesA C) elasticB D) perfectly elasticC B) inelasticA) perfectly inelastic Conjugate: Ustedes(JUGAR) HELP!!!!!!!!!!!The word photograph comes from 2 greek words that translate to???elementsnewspaperlight drawingscrap paper which health issue is associated with exposure to indoor air pollution If you wanna get oil to 180 celcius when it starts at 20 how many units of thermal energy is needed? 12.-3C45 What is the product of the 4th square number and the 2nd squarenumber? True or False - Cool Jazz, Modern Jazz and Smooth Jazz are three (3) names given to the same style of Jazz If a fish is trying to capture insect hovering above the surface of water how will it jump to catch it? Will it aim above or below what it sees? Explain. Rozlyn invested $2000 in an account that pays 4.25% annualsimple interest. She will not make any additional deposits orwithdrawals. How much interest will Rozlyn earn on herinvestment in 10 years? i got 3790.53617 can someone just make sure Julius bought F boxes of 24 plastic forks. He already had 39 plastic forks. Now, he has 135 plastic forks. How many boxes of plastic forks did Julius buy in all?What is the best eqation? A. f - 24 39 = 135 B. f + 24 39 = 135 C. f 24 - 39 = 135 D. f 24 + 39 = 135 The Fugitive Slave Act had all of the following effects EXCEPT A. Requiring escaped slaves to be sent back to their plantations B. Forcing escaping slaves to continue North to Canada to stay free C. Angering Northerners who did not want to help catch escaped slaves D. Angering Southerners who wanted to be able to execute escaped slaves Steam Workshop Downloader