If you aren’t familiar with the idea of a leap year, read “Why Is There a Leap Day?” before continuing with the lab.

Your friend is writing a program that will allow the user to input a year and then print “LEAP!” if that year is a leap year or print “not a leap year” if it is not. However, the program isn’t working properly, and your friend asked you for help in debugging.

Before you take a look at the program, you should know these rules for leap years:

A year is a leap year if it can be divided by 400 without a remainder.
A year is a leap year if it can be divided by 4 without a remainder, unless it can also be divided by 100 without a remainder; if that is the case, it is not a leap year.
All other years are not leap years.
Here is your friend’s code:

year=int(input()
if year%400=0:
print("LEAP!")
else:
print(not a leap year")
elseif year%4==0 and year%100!=0
print(“not a leap year")
Note: You may not have seen the % symbol used this way before. It calculates the remainder of the number to the left of it when it is divided by the number to the right of it. So, 10%3 is 1, because when you divide 10 by 3, the remainder is 1.

Answers

Answer 1

The correct debugged code is attached below

What is a leap year

A leap year is a year with 366 days and this year occurs once every 4 years. The debugged code line of code of the program written, is as attached below. because the line of code in the question lacks some functions and symbols

Hence we can conclude that the correct debugged code is attached below.

Learn more about Python coding : https://brainly.com/question/16397886

#SPJ1

If You Arent Familiar With The Idea Of A Leap Year, Read Why Is There A Leap Day? Before Continuing With

Related Questions

You have a single router that connects your private network to the Internet. You have two subnets on the private network, and the Internet connection is through the Serial0/0/0 interface. Your ISP has given you 6 outside addresses that you can use for NAT configuration. You can use addresses 70. 0. 0. 64 through 70. 0. 0. 69. All hosts on your private network must be allowed Internet access using those six addresses. There should be no limit to the number of clients on the private network that can access the Internet at the same time. Complete the following tasks: Designate both FastEthernet interfaces as inside NAT interfaces. Configure the Serial0/0/0 interface as an outside NAT interface. Create a standard access list number 50 that allows both inside networks. Create a NAT pool named my_addrs identifying the 6 addresses. Use the netmask parameter to configure the addresses using a 29-bit mask. Use the ip nat inside source command to link the access list with the address pool. Be sure that all inside clients can simultaneously access the Internet. Save your changes

Answers

Select Fiji.

Press Enter to get started.

At the Fiji> prompt, type enable and press Enter.

At the Fiji# prompt, type config t and press Enter.

At the Fiji(config)# prompt, type interface fa0/0 and press Enter.

At the Fiji(config-if)# prompt, type ip nat inside and press Enter.

At the Fiji(config-if)# prompt, type interface fa0/1 and press Enter.

At the Fiji(config-if)# prompt, type ip nat inside and press Enter.

At the Fiji(config-if)# prompt, type interface s0/0/0 and press Enter.

At the Fiji(config-if)# prompt, type ip nat outside and press Enter.

At the Fiji(config-if)# prompt, type access-list 50 permit 192.168.1.0 0.0.0.255 and press Enter.

At the Fiji(config)# prompt, type access-list 50 permit 192.168.2.0 0.0.0.255 and press Enter.

At the Fiji(config)# prompt, type ip nat pool my_addrs 70.0.0.64 70.0.0.69 netmask 255.255.255.248 and press Enter.

At the Fiji(config)# prompt, type ip nat inside source list 50 pool my_addrs overload and press Enter.

Press Ctrl + Z.

At the Fiji# prompt, type copy run start and press Enter.

Press Enter to begin building the configuration.

Glenda is searching airline schedules on HolApp, a mobile Web application. While browsing the application, a banner appears on the mobile screen showcasing offers and discounts on air tickets. The banner is best referred to as a(n) ________.

Answers

Answer:

online display advertisement

Explanation:

Q:

Glenda is searching airline schedules on HolApp, a mobile Web application. While browsing …

A. online display advertisement

B. contextual advertisement...

A:

A

Type the correct answer in the box. Spell all words correctly.////////////////////////////////////////////////////////
////////////////////////////////////////////////////////In a manufacturing system, a sensor determines whether a furnace is at an appropriate temperature. The sensor’s information governs the flow of fuel to the furnace. Identify the elements of this manufacturing system.////////////////////////////////////////////////////////
This particular manufacturing system has an additional fourth element known as
.

Answers

Answer:

Where are the words to put in

Explanation:

Answer:

mm I dont understand where do the words go

Explanation:

Which package is required for shadow passwords to be enabled?.

Answers

Answer:

For shadow passwords the shadow-utils package to be enabled

Explanation:

The shadow-utils package includes the necessary programs forconverting UNIX password files to the shadow password format, plusprograms for managing user and group accounts. The pwconv commandconverts passwords to the shadow password format. The pwunconv commandunconverts shadow passwords and generates a passwd file (a standardUNIX password file). The pwck command checks the integrity of passwordand shadow files. The lastlog command prints out the last login timesfor all users. The useradd, userdel, and usermod commands are used formanaging user accounts. The groupadd, groupdel, and groupmod commandsare used for managing group accounts.

For shadow passwords, the shadow-utils package is to be enabled.

What are shadow passwords?

On Linux and Unix, shadow accounts improve login security. Normally, passwords are stored in a publicly accessible table in an encryption key.

The hashed login encoding for a Linux user is stored in the bottommost along with extra information pertaining to the user password.

The programs required to convert UNIX credential files to the shadow login format, as well as applications for managing user and band accounts, are all included in the ghost package. Passwords are converted to the shadow password format using the tool.

Hence "The shadow-utils package must be enabled for shadow passwords".

To learn more about shadow passwords,

https://brainly.com/question/13034007

#SPJ12

William brought some data into his Tableau Book, but the data had some null values and incorrect column headers. What did William have to do to clean up the data

Answers

William  had to manually edit the data if he wants to remove the null values and incorrect column headers.

What is data editing?

Data editing is known to be a term that connote the act of making changes, reviewing or adjustment  some survey data.

Note that by editing one can remove want one do not want from a group of data and as such,  William  had to manually edit the data if he wants to remove the null values and incorrect column headers.

Learn more about data from

https://brainly.com/question/26711803

#SPJ1

By default, how many levels does the outline view contain?.

Answers

Answer:

Nine

Explanation:

By default, how many levels does the Outlining View contain? Nine.

Soft skills high module 7

Answers

Yes this is the fight answer I hope it helps

What term refers to a hacker that uses
technology to announce or deliver a social,
ideological, religious. or political message?

Answers

Answer:

Hacktivist

Explanation:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.

The three main objectives of information security are.

Answers

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

85 points hurry pls
Which of the following statements are true regarding barriers to communication? Select 3 options.

The barriers to communication make it difficult to build trust and rapport on a cross-cultural team.
The barriers to communication make it difficult to build trust and rapport on a cross-cultural team.

The only choice for reducing language barriers on a multilingual team is to have a person translate all interactions.
The only choice for reducing language barriers on a multilingual team is to have a person translate all interactions.

Even when language is not a barrier to communication, issues can arise because of differing communication styles.
Even when language is not a barrier to communication, issues can arise because of differing communication styles.

To reduce barriers caused by speaking different languages, effective teams should only choose team members that speak a common language.
To reduce barriers caused by speaking different languages, effective teams should only choose team members that speak a common language.

Barriers to communication can be best addressed with an open mind and positive attitude.
Barriers to communication can be best addressed with an open mind and positive attitude.

Answers

The statements which are true regarding barriers to communication are: A, C, and D.

What are barriers to communication?

Barriers to communication can be defined as form of obstacle or hindrance that typcically affects the swift and easy communication of an information between two or more parties.

This ultimately implies that, barriers to communication are impediments to effective communication between two or more parties and these include the following:

Language differenceCommunication stylesCultural difference

Read more on communication here: brainly.com/question/26152499

#SPJ1

Answer:

-The barriers to communication make it difficult to build trust and rapport on a cross-cultural team.

-Barriers to communication can be best addressed with an open mind and positive attitude.

-Even when language is not a barrier to communication, issues can arise because of differing communication styles.

Explanation:

sorry for adding no letters, the order is different for everyone!

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

Answers

Answer:

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

What is the first step you should take if unable to make bill payments on time?

Answers

Answer:

"talk to your landlord, creditors or bank about your financial situation to see if they can offer any leniency or a payment plan". just ask for extra time

Explanation:

A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users. What is the most likely cause of the problem

Answers

Answer:

The printer driver is incorrectly installed by the user.

7.6.8: What's in a Name? code hs help

Answers

The exercise here is to write a code that prints the result "What's in a Name?". See the soluton for this below.

What is the code for the above exercise?

The CodeHS that states: "What 's in a name?" is:

print('Hello,', input('What's in a name? '))

CodeHS refers to an online platform for learning that is interactive. It offes turorials on general computer science knowledge as wella s programming.

Learn more about CodeHS at

https://brainly.com/question/15599262

#SPJ1

Do you think that smart televisions are going to replace media players?

Answers

Answer:

yes because smart television give more information

Write a Python program to solve the problem described above. Define a function satisfactory_meal(Meal) which takes a single parameter, Meal, and returns True or False. Meal is a list of lists of the form [Dish_number, Organic, Has_dairy, Has_meat, Locally_sourced] where the Dish_number is a positive integer and the other list items are 1 or 0. The function should return True if the meal is satisfactory, and should return False otherwise. You may assume that the Meal list will be in the correct format when the function is called; you do not have to error-check for a non-list or an incorrectly formed list. The dishes in list Meal are not necessarily sorted by dish numbers or any other order. In your program, you may write and call any additional functions that are helpful in the computation. Examples: satisfactory_meal([ [8, 0, 0, 0, 1], [9, 1, 1, 0, 1], [23, 1, 0, 0, 1], [2, 1, 0, 1, 0], [6, 0, 0, 1, 1] ]) should return True, satisfactory_meal([ [4, 1, 0, 0, 0], [7, 0, 1, 0, 1], [90, 0, 0, 0, 0], [3, 0, 0, 1, 1] ]) should return False, and satisfactory_meal([ ]) should return False.

Answers

def dx(fn, x, delta=0.001):

   return (fn(x+delta) - fn(x))/delta

def solve(fn, value, x=0.5, maxtries=1000, maxerr=0.00001):

   for tries in xrange(maxtries):

       err = fn(x) - value

       if abs(err) < maxerr:

           return x

       slope = dx(fn, x)

       x -= err/slope

   raise ValueError('no solution found')

this ingredient is often used as decoration for both hot and cold dessert​

Answers

Answer: cream

Explanation: Cream This ingredient is often used as a decoration or accompaniment for both cold and hot desserts, but may also be used as one of the recipe ingredients.

Please mark as brainliest

Which part of the nist cybersecurity frameworks defines the activities needed to attain the different cybersecurity results?.

Answers

The part of the NIST framework that defines the activities to attain different cybersecurity results is the Framework core.

What is cybersecurity?

The term 'cybersecurity' makes reference to the strategies aimed at protecting information on the deep web.

Cybersecurity techniques are fundamental to protect sensitive data such as passwords from hackers.

In conclusion, the part of the NIST framework that defines the activities to attain different cybersecurity results is the Framework core.

Learn more  about cybersecurity here:

https://brainly.com/question/17579545

#SPJ1

The page .Product contains data retrieved from an external system of record using a data page. How do you ensure .Product always contains the most current data from the data page

Answers

Answer:

Select refer to a data page on .Product

Explanation:

Q:

The page .Product contains data retrieved from an external system of record using a data p…

A. Select Refer to a data page on .Product.

B. Select Copy data from a data page on .Product...

A:

A

difference between communication service and communication media​

Answers

Explanation:

Communication Devices :

A communication device is a hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers or mobile devices. A widely used communication device is a modem.

2. communication Media :

Communication media means of sending or receiving information or data. And in telecommunication, Communication media refers to the channel or tool or device through which data will be transmitted. Different communication media’s used for sending the data or information from one computer or terminal to another inside some kind of network.
Communication Device

Communication service means the act of communicating using any system or the act of transmission and receipt of information between two or more points. Each point must be capable of both transmitting and receiving information if communication is to occur.


Media:

Communication media refer to the ways, means or channels of transmitting message from sender to the receiver. Communication media indicate the use of verbal or non-verbal language in the process of communication.

What are three coding languages that are used to build websites?

Answers

Answer:

Python, Javascript, and Java

Explanation:

These are the main coding languages used for building most websites.

Find the 66th term of the arithmetic sequence
25,10,−5

Answers

Answer:

the answer is 33825

Explanation:

Answer:

-950

Step-by-step explanation:

Arithmetic sequence=a+(n-1)d

a=first number

n=nth term

d=difference

a=25

n=66

d=-15

So let's solve

25+(66-1)(-15)

25+(65)(-15)

25-975

-950

So the 66th terms is -950

What is the device that converts a sign from binary or analog form into a signal of another form

Answers

Answer:

A digital-to-analog converter is a device that converts a discrete signal in the form of a binary digital quantity into an analog quantity based on a standard quantity (or reference quantity), referred to as a DAC or D/A converter. Electronic Basics #10: Digital to Analog Converter (DAC) Catalog Ⅰ Composition and characteristics

Explanation:

What do you call a software program that runs on a web server? Please respond ASAP! Please no comments unless you have a legit answer!

Answers

A software program that runs on a web server is a web browser

What are the limits of hashing and verifying that files haven’t changed?

Answers

The hashing function can take any number of key-value pairs and there is no specific limit to it.

What is hashing?

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

https://brainly.com/question/13106914

#SPJ1

You want to e-mail your grandparents a recording of your pieces for your upcoming piano recital. which audio file format will allow your grandparents to download the files, considering they have an older computer with a slower internet connection?

pcm wav

alac

mp3

flac

Answers

Based on the above, the audio file format that will allow your grandparents to download the files is Mp 3.

What is MP3 Format?

MP3 is known to be a kind of coding format that is made just for digital audio.

Note that in Based on the above, the audio file format that will allow your grandparents to download the files is Mp 3 as it can help to play the audio.

Learn more about e-mail from

https://brainly.com/question/24506250

#SPJ1

Companies learn a lot about customers because they leave clues in all of the following ways EXCEPT: Group of answer choices actions taken when navigating a company website. how they write code. searches with search engines. making comments about the company on social media.

Answers

Companies learn a lot about customers because they leave clues in all of the ways above except how they write code.

What is learning  about customers?

The act of learning  about customers  is known to be the act or the process whereby firm studies and know more about their potential customers through survey, feedback, etc.

Note that Companies learn a lot about customers because they leave clues in all of the ways  except how they write code as they do not need them for that.

Learn more about customers from

https://brainly.com/question/380037

#SPJ1

A combination of numbers and symbols used to express a calculation. Question 11 options: Formula Formula Bar Worksheet Workbook

Answers

Answer:

Formula

Explanation:

Formulas are functions that can express a calculation.

Select the correct term to complete the sentence.

A is an application with browser functionality embedded within an application written for a specific platform.


A is an application run through a browser enabling cross-platform access.


A is an application written for a specific device and operating system.

Answers

Answer:

A program that searches a database for specific words and returns a list of webpages or documents in which the search term was found. ... A _____ is an application that runs in a

Explanation:

First blank: Hybrid App

Second Blank: Web App

Third blank: Native App

PROOF:

Often, a single source does not contain the data needed to draw a conclusion. It may be necessary to combine data from a variety of sources to formulate a conclusion. How could you do this in this situation of measuring pollution on a particular river?

Answers

To measure the pollution of a particular river, one must take the sample of the river and take the sample of pure water, then draw the conclusion, it will tell the amount of pollution in the river water.

What is pollution?

Pollution is the mixing of unwanted or harmful things in any substance or compound.

Water pollution is the mixing of toxics and chemicals in water.

Thus, to measure the pollution of a particular river, one must take the sample of the river and take the sample of pure water, then draw the conclusion, it will tell the amount of pollution in the river water.

Learn more about pollution

https://brainly.com/question/23857736

#SPJ1

Other Questions
Factor the polynomial completely. 2x^2-9x+7 What does Juliet say she would rather do than marry Paris please answer all number parts Easy math pls help quick will give brainlest Hello, help me please)) 9 in11 in5 ft19 in12 inSurfaceSurface Area =9)3)I need the surface area some please help Leanne and her family plan to attend a symphony at an orchestra hall. Before booking the tickets, Leanne checked a website where visitors rated the view of the symphony's soloist from their seating section. The data from the website is summarized in the table.Section Number of reviewers who sat in the section Number of reviewers who rated the view as "perfect"L1 90 57L2 52 33L3 75 47U1 84 55U2 43 27U3 35 22According to the data from the website, in which seating section should Leanne's family book the tickets if they want to maximize their chances of having a "perfect" view of the symphony's soloist? 45.348 to two decimal places Why does the man fail to notice the water before he wets his feet? a 10 gallinas,un costal de alimentos les dura 30 dias .cuanto dias les durara el mismo costal de alimentos a un grupo de 15 gallinas y a otro de 25 gallinas? OMG GUYS HELP ME I GIVE 100 points what is 1+1 and what is 2-1 tell me!!! QUICK How many different three-digit numbers can be written using digits from the set {3, 4, 5, 6, 7}without any repeating digits? Read the excerpt from Roosevelts "Four Freedoms.Since the beginning of our American history, we have been engaged in changein a perpetual peaceful revolutiona revolution which goes on steadily, quietly adjusting itself to changing conditionswithout the concentration camp or the quick-lime in the ditch. The world order which we seek is the cooperation of free countries, working together in a friendly, civilized society.What purpose does this paragraph serve in Roosevelts argument? A meter stick hurtles through space at a speed of 0. 95c relative to you, with its length perpendicular to the direction of motion. You measure its length to be equal to. my sons were j.r., gary, and bobby, and i was married to jock. my show was on starting in the late 1970s. which tv mom am i? A flagpole casts a shadow that is 50 feet long. At the same time, a woman standing nearby who is 6 feet tall casts a shadow that is 3 ft long. How tall is the flagpole? Improving quality can increase firm value because a.firms can increase costs. b.firms can increase activities. c.firms can increase customer demand. d.All of these choices are correct. 2 Humans have been selectively breeding corn for generations. During the processof domestication, the wild form of corn was eventually changed into a form thathas more favorable traits.Early farmers most likely used corn seed that had -A thin stalks to withstand stronger wind.B a darker color so that they would blend with the field and be protected frompredators.Clarger leaves that could be used for compost.D the ability to grow in a large number of climates, soil types, and producedthe largest amount of kernels. Describe one change in human anatomy that allowed speech, as well as one cost of this change How many cubes with side lengths of 1/2 cm does it take to fill the prism.