Answer:
// program in C++ to check leap year.
// include header
#include<iostream>
using namespace std;
// main function
int main() {
// variable
int inp_year ;
// ask user to enter year
cout<<"Enter year:";
// read year
cin>>inp_year;
// check year is leap or not
if (((inp_year % 4 == 0) && (inp_year % 100 != 0)) || (inp_year % 400 == 0))
// if leap year , print leap year
cout<<inp_year<<" is a leap year.";
else
// print not leap year
cout<<inp_year<<" is not a leap year.";
return 0;
}
Explanation:
Read year from user.Then check if year is divisible by 4 and not divisible by 100 or year is divisible by 400 then year is leap year.otherwise year is not leap year.
Output:
Enter year:1712
1712 is a leap year.
Answer:
Correct code for the above question which is written in the place of loop in the above question code:
for a,b in contact_emails.items(): # for loop to print the above items one by one.
print(str(b)+" is "+str(a)) # print statement to print the item of the list.
Output:
- The above code is in python language which display the output as the above question demands.
Explanation:
- The above question code is in python language, so the for loop to prints the list is defined in the answer part.
- The for loop syntax defined in the question part is not correct. It never gives the output which the question demands.
- The above list defined in the question part is in the form of key-value pair which comes in the categories of the dictionary concept.
- So to print the above list, any user needs an item function that will display the output in the key-value pair.
- There is also needs two variables in the 'for' loop one is for key and the other is for value.
Answer 1 :
if Iris had approached Henry, it might had become a personal matter rather than professional. Following the proper protocol is the best way to report in any organization.
Answer 2 :
Yes, Gladys should call the legal authorities. Federal Trade Commission (FTC) is the best agency to file a complaint prevention of corruption within a company.
Answer 3 :
Yes, she should have followed her chain of command because that is one of the many questions that an investigator will ask is if she reported it to her supervisor and human resources. Somehow in companies they use that term when it is somewhat of a legal issue. Internally if she knew the IT director and the security office she could have gone to them along with human resources. Outside I would say start with her local police department and they may have directed her to the proper channel.
Answer 4 :
What Henry did was not ethical even in the slightest. He used the flash drive without permission from the company, he knew he shouldn’t have, but he did it anyway. It is acted in a complete ethical way. If Iris had left this in a coffee station and forgot about it, then it would have been unethical behavior because she knew about it but didn’t whistle blow. There are security laws that get violated in this issue which is why it is unethical and troublesome.
Answer:
Option E is correct.
Google Apps are an example of software as a service (SaaS).
Explanation:
I'll provide definitions to each of them.
Platform as a Service (PaaS): hardware and software tools available over the internet.
Software as a product (SaaP): product, software, which is made to be sold to users, and users pay for licence which allows them to use it. A good example of SaaP is the Microsoft Office package.
Platform as a product (PaaP): This creates a platform for product owners to put their products & for people to get their required products.
Infrastructure as a Service (IaaS): cloud-based services, pay-as-you-go for services such as storage, networking, and virtualization.
Software as a Service (SaaS): software that's available via a third-party over the internet.
From these definitions, it is clear that Google apps are examples of software as a Service because all the Google apps are software's that's available via a third-party over the internet.
Hope this Helps!!!
Answer:
Classless Inter-Domain Routing
Explanation:
Classless Inter-Domain Routing (CIDR), pronounced “cider” or “sidder,” gets its name from the notion that it ignores the traditional A, B, and C class designations for IPv4 addresses and sets the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.