Create a class called Date that includes three pieces of information as data members -- a month (type int), a day (type int) and a year (type int). Your class should have a constructor with three parameters that uses the parameters to initialize the three data members. For the purpose of this exercise, assume that the values provided for the year and day are correct, but ensure that the month value is in the range 1-12; if it isn't, set the month to 1. Provide a set and a get function for each data member. Provide a member function displayDate that displays the month, day and year separated by forward slashes (/).

Answers

Answer 1

Answer:

please mark me brainlist

Explanation:

Create A Class Called Date That Includes Three Pieces Of Information As Data Members -- A Month (type

Related Questions

Information Technology Question

What is the best topic in Information Technology ever?.​

Answers

Answer:

I don't know about others but I like Binary

Answer:

Explanation:

5 Key Actions for IT Leaders for Effective Decision Making

Progressive leaders reengineer data and analytics to turn decision making into a competitive advantage.

This Gartner eBook shows you the power and potential of reengineered decision making and guides you to:

Identify what decisions to reengineer, and why

Prioritize decisions, analytics and data

Fit artificial intelligence into decision making

Rethink your D&A architecture

Build skills, habits and teams geared for effective decision making

Pls help me this quation give me the answer Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as well as the company? Why?

Answers

Answer:

yes, in case of big data demand it's duty of person as well as company to follow ethical principal and adhere the moral standard for keeping the information of the big data company confidential.

Explanation:

may it's help you

if (accountBalance < 1000.00):
print(“SAVINGS3”)
elif (accountBalance < 2000.00):
print(“SAVINGS2”)
elif (accountBalance < 3000.00):
print(“SAVINGS1”)
else:
print(“SAVINGS”)

Answers

Answer:

See explanation

Explanation:

Given

The code segment

Required

The output

The code segment is incomplete, as the value of accountBalance is not given.

However, I will explain the given segment using few illustrations.

The following will be executed if accountBalance is less than 1000.00

if (accountBalance < 1000.00):

   print(“SAVINGS3”)

Take for instance:

accountBalance = 500.0; "SAVINGS3" will be printed

The following will be executed if accountBalance is less than 2000.00 but more than or equal to 1000.00

elif (accountBalance < 2000.00):

   print(“SAVINGS2”)  

Take for instance:

accountBalance = 1500.0; "SAVINGS2" will be printed

The following will be executed if accountBalance is less than 3000.00 but more than or equal to 2000.00

elif (accountBalance < 3000.00):

    print(“SAVINGS1”)

Take for instance:

accountBalance = 2500.0; "SAVINGS3" will be printed

Lastly, if accountBalance is 3000.00 or greater, the following will be executed

else:

   print(“SAVINGS”)

Take for instance:

accountBalance = 3500.0; "SAVINGS" will be printed

What is a status update?

A. An automatic enhancement to a computer's performance

B. Any new software that can be downloaded for free

C. A short post in which users write what they are doing

D. A news flash that announces new government posts

Answers

It should be letter c i hope this help let me know if you need help
the correct answer should be C above ^

How to save a file for the first time?​

Answers

Answer:

i have the website version of word but you want to click file and save as then click whatever option you need to personly if you are submitting online i download it to my computer then I will submit it from downloads. thats how i do it

Write a program to input value of three sides, to check triangle is triangle is possible to form of not​

Answers

Answer:

Explanation:

import java.util.Scanner;

public class KboatTriangleAngle

{

  public static void main(String args[]) {

      Scanner in = new Scanner(System.in);

      System.out.print("Enter first angle: ");

      int a1 = in.nextInt();

      System.out.print("Enter second angle: ");

      int a2 = in.nextInt();

      System.out.print("Enter third angle: ");

      int a3 = in.nextInt();

      int angleSum = a1 + a2 + a3;

       

      if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {

          if (a1 < 90 && a2 < 90 && a3 < 90) {

              System.out.println("Acute-angled Triangle");

          }

          else if (a1 == 90 || a2 == 90 || a3 == 90) {

              System.out.println("Right-angled Triangle");

          }

          else {

              System.out.println("Obtuse-angled Triangle");

          }

      }

      else {

          System.out.println("Triangle not possible");

      }

  }

}

OUTPUT:

Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.

Answers

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

list three social implications of the wider range of piracy​

Answers

Answer:

Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.

Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance for up to one disk failure A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration RAID 5 allows up to two disk failures During a RAID 5 disk failure, read performance is not impacted A RAID 1 configuration of four 1TB disks has a storage capacity of 2TB

Answers

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

A RAID 1 is the configuration of the 4 disks that has higher storage capacity than a RAID 0 configuration. This option A is correct.

What is the RAID ?

The RAID is a redundant array of the inexpensive disks and refers to the storage visualization technology that combines multiple physical disk drives. Its contract with earlies highly reliable mainframe disk drives.

The RAID one needs mini of two physical drives as the data is given simultaneously in two places. These drives are mirror images as ne fails the other can take over.

Find out more information about the RAID.

brainly.com/question/26980060.

What is difference between base font and font tags​

Answers

Basefont tag is used to define default font, size and color for the whole text in an html document. On the other hand font tag is used to define font, size, color etc for a text which enclosed with in this tag. ... On the other hand you have to enclose the text within the font tag to apply changes.

#LETS STUDY#BRAINLEST LOVE❣️

The term wiki refers to a(n): Group of answer choices type of short-message blogging, often made via mobile device and designed to provide rapid notification to their readership. Web site that can be modified by permitted users, from directly within a Web browser. online community that allows users to establish personal profiles and communicate with others. record of online journal entries, usually made in a reverse chronological order. link in a blog post that refers readers back to cited sources.

Answers

Answer:

Web site that can be modified by permitted users, from directly within a Web browser.

Explanation:

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

Wiki is an abbreviation of the domain name Wikipedia and it's a website that provides a detailed background information about people, places, countries, things, etc.

The term wiki refers to a website that avails permitted users the ability to modify or edit its contents, especially from directly within a web browser.

In conclusion, wiki is a web-based service that provides information about virtually everything in the world.

The HTML tag for the smallest heading is​ what

Answers

Answer:

The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.

Explanation:

Rachel is planning on writing code that will have to do computations with very large
numbers. Which of the following is the most important issue she should check
before writing her code?
PLEASE

Answers

Group of answer choices.

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

B. Rachel should reset her machine to store data using hexadecimal values instead of binary.

C. Rachel should run a program to ensure that she has enough memory on her machine to write the program itself.

D. Rachel does not have to worry about the size of the numbers

Answer:

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

Explanation:

In Computer programming, a bit is a short word for the term binary digit and is primarily the basic (smallest) unit measurement of data or information.

A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;

1. True or ON, which is equal to one (1).

2. False or OFF, which is equal to zero (0).

Additionally, a binary numbering represents all numeric values that are to be written in sequences of ones (1s) and zeroes (0s). Therefore, a binary number refers to any numerical value (number) that is expressed in base-2 numerical system; 0s and 1s.

Also, the total numbers which can be represented with an 8 bit binary (base-2) system is 256.

For all computations that would involve the use of very large numbers, it's important to look up how many bits are used to store integers and floating point numbers.

In this context, Rachel should ensure that she check how many bits the chosen high-level programming language uses to store integers and floating point numbers before writing her codes.

Sue follows these steps to create a chart in her presentation.
Step 1: Navigate to the Insert tab.
Step 2: Click the Chart button in the Illustrations command group.
Step 3: Choose the column chart.
Step 4: Click OK.
Which objects appear on the slide after she clicks OK? Check all that apply.
a fully completed table
a fully completed chart
a table with blank values
a chart with blank values
a table with sample values
a chart with sample values

Answers

Answer:

A chart with sample values

Answer:

A table with sample values

A chart with sample values

Explanation:

grow a sentence frame a small and simple sentence. then expand it. Expand this sentence -I am a gril​

Answers

Answer:

I am a young lady.

Explanation:

simply sentence or expand more:

I am a young lady in my teens. ​I am a young woman in her twenties. ​I am a twenty-year-old lady who is just starting off in life. ​I am a twenty-year-old woman who is just getting her feet wet in the world. ​

Answer:

I am a girl, I love playing games, but before that, I will finish my homework first.

~~~~~~~~~~~~~~~~~~~~

Hope it helps!

#CarryOnLearning

[tex]Park \: Sun-min[/tex]

Phím tắt nào sau đây được sử dụng để chuyển sang các cửa sổ đang mở khác? A. Ctrl+Tab B. Shift+Tab C. Alt+Tab D. Window+Tab

Answers

Câu trả lời:

C. Alt + Tab

Giải trình:

Các phím tắt được sử dụng trên các hệ thống máy tính để điều hướng nhanh chóng chẳng hạn như chuyển đổi giữa các cửa sổ, thực hiện một số tác vụ và hoạt động nhất định, v.v. hoạt động. Trong cửa sổ, người ta có thể dễ dàng điều hướng và di chuyển qua các tab hoặc cửa sổ đang mở khác nhau bằng cách sử dụng nút 'Alt và Tab'. Sau khi nhấn nút Alt, tab sẽ được nhấp để điều hướng qua tất cả các cửa sổ đang mở khác nhau.

what is VLSI stand for​

Answers

very large scale interrogation

An open area is one that has something in the path of travel that blocks the continuation of travel in that lane. a) True b) False 2 Questions 2 A driver's emotions usually have no impacton his or her ability to effectively implement a search system. a) True b) False 3 Question 3 Glare is enhanced by heat and impairs a driver's visibility. a) True b) False 4 Question 4 A driver must maintain which of the following to ensure implementation of an effective space management system

Answers

Answer:

Question 1. B) False

Question 2. B) False

Question 3. A) True

Question 4.

a) Looking ahead

b) Lookout for hazards

c) Focus on the big picture

d) Ensure visibility of her or his vehicle

e) Always have an exit route for safety

Explanation:

Question 1. An open area or condition is a availability of a large area space to drive unrestricted. In an open area, the road ahead is open space and there is continuation of the lane of travel and there is nothing that blocks the road

Therefore, the correct option is B) False

Question 2. A drivers emotion such as anger has remarkable influence on the behavior while driving such that it can impact on his or her ability for appropriate search system implementation which is response based

Therefore, the correct option is B) False

Question 3. Glare sensation is exacerbated by the presence of increased heat, an obstructs the view

Therefore, the correct option is A) True

Question 4. Effective space management is implemented by a driver through;

a) Looking ahead of the vehicles n front

b) Maintaining constant lookout for hazards

c) Ensure that the big picture is in focus

d) Ensure that the vehicle he or she is driving can be seen

e) Ensure that an escape route is always available

Argue whether we can infer anything about a candidate's ability to work in a professional environment based on his or her resume's formatting. Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

Answer:

Candidates resume shows his way of presenting and organizing.

Explanation:

Resume formatting is an important part of a candidate's ability to work. In any professional environment, it's necessary to have a properly formatted resume.  The resume formatting should be up to date with the latest information and data. The formatting involves the borders, headings, grammar, and spelling or typo errors, etc.  But these mistakes can be easily avoided such as proofreading and removing unnecessary details and sloppy fronts.

how to convert binary number into decimal number​

Answers

Answer:

Multiplying by 2

Explanation:

The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .

Hope it is helpful to you

Answer:

HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.

The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):

decimal = d0×20 + d1×21 + d2×22 + ...

Example #1.SEE,

Find the decimal value of 1110012:

binary number: 1 1 1 0 0 1

power of 2: 25 24 23 22 21 20

1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710

Explanation:

YOU WILL LEARN MORE IN HIGHER CLASSES.

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?
a. Identify clusters
b. Identify sequences
c. Classify data
d. Identify associations

Answers

Answer: Identifying sequences

Explanation:

Since the user wants to know if there are any particular activities that the customers engage in, or the types of purchases made in the month before or after purchasing select items from your store, therefore, the data mining software can be used in identifying sequences.

In this case, the data mining software can't be used in classifying data whether into structured or unstructured data. Furthermore, the identification of clusters and associations aren't the correct answers.

Therefore, the best option is B.

list out the application of the computer and explain it?(and as the answer for this question as image) ​

Answers

Answer:

There are several applications of the computer; some of these applications are:

Word processorsGraphics applicationsWeb browsersGamingMedia playersAlarms and tasks schedulersEtc...

Explanation:

The computer system can be applied in various fields (such as medicine, gaming, governments, education, etc.) for various purposes.

Each of these fields require computer software products and/or applications to carry out their activities. I've listed some applications, but there are several other applications.

My explanation could not be submitted; so, I added it as an attachment.

A college student borrowed his roommate's notebook computer without permission because he needed to write a term paper that was due the next day. While the computer was sitting open on the student's desk overnight, a water pipe in the ceiling began leaking and water dripped down on the computer, rendering it inoperable. A computer repair service estimated that it would cost $500 to repair all the damaged components. At the time it was damaged, the computer was worth $700. If the roommate sues the student for the damage caused to the computer, what will be the extent of his recovery

Answers

Answer: $700

Explanation:

Based on the information given in the question, if the roommate sues the student for the damage caused to the computer, the extent of his recovery will be $700.

In this scenario, the student has committed a conversion as the right of possession of the roommate's computer was interfered with by the student as he took it without the roommate's permission, which later sustained damage that was more than 70% of the computer's value. In such case, the extent of the recovery will be the fair market value which is $700.

A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his first month with the company. He needs an easy way to disconnect and reconnect all his peripheral devices to his old laptop. Devices include two external monitors (one HDMI, one DVI), a USB wireless mouse, USB wireless keyboard, Ethernet network, USB printer, headphones, and microphone. He has a budget of $100. What kind of device would best suit his needs

Answers

Answer:

usb-c hub

Explanation:

In this specific scenario, his best option would be a usb-c hub. This is a fairly cheap device which he can get one of many variations for less than $100. This device connects through a single USB-C port on the computer and has multiple USB ports on the hub. This allows you to connect all of your devices to the hub and connect/disconnect all of them instantly from the single USB-C cable connected to the laptop. Thanks to the new USB-C technology these hubs now usually include both HDMI and DVI inputs.

explain the working system of a computer with an example​

Answers

[tex]{\underline{\fcolorbox{White}{pink}{ANSWER♥︎}}}[/tex]

The computer is the combination of hardware and software. Hardware is the physical component of a computer like motherboard, memory devices, monitor, keyboard etc., while software is the set of programs or instructions. Both hardware and software together make the computer system function.

Examples :-

Mainframe ComputerMainframe Computer. 20 in Kickin Technology Series: MainFrame Computers. MORE POWEeeer! Movie 1. ... Desktop Computer. Movie: 2. Desktop Computers. ... Laptop or Notebook Computer. Movie: 3. Laptop Computers. ... Palmtop Computer or Personal Digital Assistant (PDA)

write difference between dvd r and dvd ram( Any 3 points or any a little big paraph for test)

Answers

Answer:

Following are the differences two the given questions:

Explanation:

DVD-R:

DVD-R is a common DVD recordable media that seems like a conventional DVD, and it can only be used once for writing data or analyzing information many times.It is identical to a regular DVD, however, it can be used to record data like a CD-R. Once a DVD-R is "burned," it cannot be read to anymore.There is a 650 nm range recording, nicknamed "Authoring DVD-R." "DVD-R for general" is another format with protection against duplicating, which records at 635 nm. Whilst DVD-R(a) and DVD-R(g) may read forms of one another, they cannot write formats of each other.

DVD-RAM:

This is a technology for optical DVD storage where the information may be read, deleted & written constantly.It offers outstanding integrity of data, preservation, and avoidance of damages that can be used for basic storing data, data preservation, or data backup.Those disc drives can indeed be frequently recorded and deleted, and only compatible with DVD-RAM format devices produced by corporations.

can someone please tell me the name of some of the best driving simulator games?​

Answers

Answer:

Editor's Pick: Assetto Corsa. Assetto Corsa is a highly regarded racing game with a realistic force feedback feel.

Project Cars 2.

Gran Turismo Sport.

F1 2019.

Dirt Rally.

Explanation:

If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​

Answers

Explanation:

you write the name of your primary school teacher

A security question is a form of the shared secret used as an authenticator. The answer to questions asked by the system is personalized and can be answered by you only.

What are security questions?

A security question is a form of the shared secret used as an authenticator. It is commonly used by banks, cable companies, and wireless providers as an extra security layer.

When you forget your privacy password, the system tries to help you to get your password back or reset it. But for this, it needs to make sure that it's you. Therefore, whenever you set a privacy password for the first time the system also asks you a few questions these questions are known as security questions and are present in the system for such situations. Therefore, the answer to questions asked by the system is personalized and can be answered by you only.

Learn more about the Security Questions:

https://brainly.com/question/15008697

#SPJ2

four example of computer software?​

Answers

answer= safari, ms-word, moviemaker, ms-paint, firefox,etc...

Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and right are gone. So "ab*cd" yields "ad" and "ab**cd" also yields "ad". starOut("ab*cd") → "ad" starOut("ab**cd") → "ad" starOut("sm*eilly") → "silly"

Answers

Answer:

Explanation:

The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println(starOut("sm*eilly"));

       System.out.println(starOut("ab**cd"));

   }

   public static String starOut(String str) {

       String output = "";

       for (int i = 0; i < str.length(); i++) {

           if ((i != 0) && (i != str.length()-1)) {

               if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {

                   output += str.charAt(i);

               }

           } else {

               if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {

                   output += str.charAt(i);

               } else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {

                   output += str.charAt(i);

               }

           }

       }

       return output;

   }

}

Other Questions
the paint 3D program is used for drawing picture true or false which of the following is true for a eukaryote? A. it is one of the first life forms to appear on earth. B. it doesn't have a nucleus and organelles. C. it must be a multicellular organism. D it evolved from prokaryotes (5.5 X10^6 + 6.3 X10^6)2 What is the solution to 4x + 2 = 6(-2x - 5) ?O2O 160-2O -16Please need help on this Is -626 an integer ? If yes, why. Joshua annual salary is 32,824 what percent monthly salary is used for monthly apartment rent of 684 Plz help I will give brainliest muslims???help plzzzzz Mark all the relative minimum points in the graph.Please help I don't understand what to do. We discussed several techniques of repetition in class. Find another example of repetition (words, phrases, conjunctioclauses, punctuation, etc.) from "Sinners" and explain the effect on the audience. Someone pls answer this be serious illl BRAINLIST Select the correct answer.Which system has a central government and local units that implement the central governments decisions?A. federal systemB. parliamentary systemC. monarchical systemD. unitary system A company distributes candies in bags labeled 23.6 ounces. The local bureau of weights and Measures randomly selects 60 bags of candies and obtain a sample mean of 24 ounces . Assuming that the standard deviation is 3.2. At 0.05 level of significance , test the claim that the bags contain more than 23.6 ounces . what is your conclusion about the claim. A box contains a yellow ball, an orange ball, a green ball, and a blue ball. Billy randomly selects 4 balls from the box (with replacement). What is the expected value for the number of distinct colored balls Billy will select? WHAT IS THE THEME03.02 Planning Your NarrativeYou will read a story and a prompt. Then, you will organize your own story ideas in the Narrative Organization Chart.View the grading rubric as you complete your work. This is your guide to a super submission.Read the narrative "Grounded."In the Narrative Organization Chart, plan your own story based on this writing prompt. both dual enrollment and AP courses offer the following possibilities except that Four aspects of empowered performance are understanding variation, deciding what to measure, working correctly with data, and using the resulting information appropriately.a. Trueb. False USE THE PRESENT VALUE FORMULA TO CALCULATE THE AMOUNT OF MONEY THAT MUST BE INVESTED NOW AT 9% ANNUALLY COMPOUNDED QUARTERLY TO OBTAIN 1,000 IN 4 YEARS. What is the initial value of the sequence?1238 List the words in the paragraph that give a clue that the sentence is showing contrast. root (b) A sugarcane is monocotyledon; therefore it has _______________________ root