answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
2 years ago
14

Days of the week are represented as three-letter strings ("Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun"). Write a javaScript f

unction solution that, given a string S representing the day of the week and an integer K (between 0 and 500), returns the day of the week that is K days later. For example, given S = "Wed" and K = 2, the function should return "Fri". Given S = "Sat" and K = 23, the function should return "Mon".
Computers and Technology
1 answer:
dmitriy555 [2]2 years ago
3 0

Answer:

function getDay(s, k){

var weekDays = ["Mon","Tue","Wed","Thu","Fri","Sat","Sun"];

var index=weekDays.findIndex(function(weekDay){return weekDay==s;});

return weekDays[(index+k)%7];

}

Explanation:

//this functions receive the next parameters:

//s which is the day of the week

//k the number of days after s week day

function getDay(s, k){

var weekDays = ["Mon","Tue","Wed","Thu","Fri","Sat","Sun"];

//variable index is the index in list weekDays of s

var index=weekDays.findIndex(function(weekDay){return weekDay==s;});

//use module operator % to get the remainder of the division (index+k)/7

//return the string value of the day

return weekDays[(index+k)%7];

}

You might be interested in
Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
wariber [46]

Answer:

c. honeypot

Explanation:

A honeypot is a computer or a network used to mimic the actual target of a cyberattack. It is also used to detect attacks on the network and divert them from the real network. This is used to gain insight into how cyberattacks are carried out. With such knowledge, robust security systems can be put in place.

4 0
2 years ago
Juan, a network user, sends an email to you, the IT admin of the network, stating that his account is locked because he has lost
slamgirl [31]

Answer:

The correct answer to the following question is Option D.

Explanation:

Already when we authorize an individual to set up a new credential or provide a provisional code or password, we must make ensure that the person is checked. We could allow a verification code after confirming the consumer.

  • Verification remains crucial because an imposter may try to compromise to provide a temporary credential or switch his password by posing as a further person.
  • So, Juan fixes his problem by making sure whether resetting the password has always been allowed by checking that Juan is the one that he claims he is.

8 0
2 years ago
It is an array containing information such as headers, paths and script locations wherein it is created by the web server itself
Naddik [55]

Answer:

c. $_SERVER

Explanation:

$_SERVER is an array in PHP containing information about headers, paths, and script locations.

Example usage:

echo $_SERVER['HTTP_HOST'];

This will print information about HTTP_HOST header.

echo $_SERVER['DOCUMENT_ROOT'];

This provides information about document root path.

echo $_SERVER['SCRIPT_FILENAME'];

This provides information about the currently executing script.

4 0
2 years ago
George and Miguel are considering opening up a shoe store but first need to do market research. Which one of these is NOT part o
Morgarella [4.7K]
The correct answer is D, Draw conclusions and make decisions for their business based on the research results.
7 0
2 years ago
Read 2 more answers
Emulated drivers provide enhanced drivers for the guest OS and improve performance and functionality for IDE and SCSI storage de
Vikki [24]

Answer:

The answer is "Option 2".

Explanation:

  • All the other drivers replicate even existing technical embedded devices. These systems have optimistic, and they are commonly accessible to inbox operators as most web browsers. It is an Imitated device, that performance problems because of all the emulator is the workload.
  • Integration Services  is a program package, which is created on a guest OS of a VM, that provides enhanced guest OS drivers and improves accuracy, functionality for IDE and SCSI storage systems, networking interfaces, and monitor and multimedia devices, that's why it is incorrect.

8 0
2 years ago
Other questions:
  • A telephone-repair technician uses a meter to measure voltage on a phone line. This meter is an example of _____. hardware softw
    10·2 answers
  • A router is involved in ____________ layers of the tcp/ip protocol suite.
    12·1 answer
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • The main problem with radio transmission is which of the following? Select one: a. Radio waves cannot travel through walls. b. W
    9·2 answers
  • Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to
    13·1 answer
  • 2 Name the package that contains scanner class?​
    10·1 answer
  • Sarah works in a coffee house where she is responsible for keying in customer orders. A customer orders snacks and coffee, but l
    13·2 answers
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • 4. Word Separator:Write a program that accepts as input a sentence in which all of thewords are run together but the first chara
    10·1 answer
  • A Security team is working with a client to evaluate the security of data and IT functions that are most critical to the operati
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!