Accepting February 29 for input only in a leap year is a check that should be caught by a __________ check.

a. date
b. time
c. day
d. reasonableness


a. date

Computer Science & Information Technology

You might also like to view...

Read the following scenario. Provide the command(s) in context of the environment established in the scenario. Write your answers on the line under each question.

Your home directory is /usr/students/project You have just logged in, and system informs you that you have mail. You have a file called myfile in your home directory 1. Send myfile to the user ID number DU007 2. Compose the following mail and send it to the user ID number DU007 3. Start composing the message Hi, what a day! 4. Read the current date and time and place it in your message 5. Save your composed message in mymail file 6. End your message 7. Mail myfile to yourself 8. Read your mail 9. Display message number 3 10. Replay to the current message 11. Delete message numbers 3 and 4 12. Undelete all the deleted messages 13. Save the message number 6 in mymail file 14. Exit without removing the mail from your system mailbox 15. Display the message headers only 16. Read message number 1<%0> 17. Replay to the message number 1 18. Delete message numbers 1 to 4 19. Exit mailx and remove mail from your system mailbox 20. Read your mail from another file, let's say mbox

Computer Science & Information Technology

Give some simple recommendation for when a destructor should be declared virtual.

What will be an ideal response?

Computer Science & Information Technology

A custom graph design is simply a picture of something.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Locality of __________ has a profound influence on both the organization of memory and on operating system memory management software.

A. instruction B. reference C. hierarchy D. access

Computer Science & Information Technology