Answer:
// program in Python.
#read year
i_year=int(input("Please Enter a year:"))
#check leap year
if((i_year % 4 == 0 and i_year % 100 != 0) or (i_year % 400 == 0)):
print("{} is a leap year.".format(i_year))
else:
print("{} is not a leap year.".format(i_year))
Explanation:
Read year from user and assign it to variable "year".If year is completely divisible by 4 and not divisible by 100 or year is completely divisible by 400 then year is leap year otherwise year is not a leap year.
Output:
Please Enter a year:2003
2003 is not a leap year.
Answer: Primary Research (Focus Group).
Explanation:
Exploratory Research is an inquiry that seeks to understand the basic causal factors of a problem. This effort can serve as the basis of more intensive research later on.
There are basically two methodologies used, which are the; Primary and Secondary methods. While the Primary method's source of information is the concerned group, the Secondary Methods obtain their information from already existing information (Primary sources), such as Interviews, Journals, etc.
In the case of the company in the question, seeking to gain insight into the changes in a product, it would be best for them to consider what some selected costumers (focus group), think about the existing products and their views on subsequent changes. This method of getting information directly from the focus group employs the primary method.
Answer:
Motivation? The search problem.
Sorting algorithms: insertion sort, shellsort, heapsort, mergesort, quicksort, bubblesort
At the very least, "general purpose" sorting algorithms require O(n log n) comparisons
Explanation:
Sending potentially sensitive information by email
Potentially sensitive information can be sent via Email only if the Email is encrypted
Explanation:
No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.
Answer:
Search for something that fits her needs
Explanation:
There are several approaches to problem solving, the approach that will be employed depends on our definition of the problem. Not all processes can be modeled by mathematical equations, some processes are simply theoretical and can be explained by simple logic.
If Allison does not find the needed equations among the available default equations, she can come up with an equation that addresses the process at hand. If she cannot come up with any, she can use other approaches that fit her needs to explain the required concept to the team.