3. A year contains 365 days normally, so on
what number day does Christmas fall on?

Answers

Answer 1

Answer:

359 is December 25 in a 365 day year.

Explanation:

Answer 2

Answer:

For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.


Related Questions

Anna is creating a digital portfolio, including her professional work showcasing the designs she created. What should she add to each work?

A. brief description of the work and project details
B. only title of the work
C. only date and title of the work
D. only project details of the work

Answers

A. Brief description of the work and project details.

A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What must occur in order for the students to perform this investigation?

Answers

Answer:

the temperature of the sample must change

Explanation:

short description about your penfriend​

Answers

Answer:

USEFUL WORDS:

Starting the first Letter. Hi! ...

Starting the second Letter. Hi! ...

Starting the second letter with an apology. I am sorry I did not reply earlier. ...

Saying Goodbye. Bye for now and write back soon! ...

Do not write everything in the first letter. The following are some ideas:

Introduce Yourself. ...

Introduce your family.

Explanation:

A suggestion for improving the user experience for the app navigation, has the following severity:

What sum will amounts to Rs 1227 in 9 months at 6%
e emple Interest 2.​

Answers

Answer:

given us,

principal (p)= Rs 1227

Time(t)= 9

Rate(r)= 6./.

Here,

simple interest= P×T×R/100

= 1227×9×6/100

= 66258/100

= 662.58

Explanation:

by using simple interest formula

The principal investment required to get a total amount, principal plus interest, of Rs 227.00 from simple interest at a rate of 6% per year for 0.75 years (9 months) is $1,174.16

Given Data

Final Amount A = Rs 1227

Time = 9 months

Rate = 6%

Principal = ?

Equation:

P = A / (1 + rt)

Calculation:

First, converting R percent to r a decimal

r = R/100 = 6%/100 = 0.06 per year.

Putting time into years for simplicity,

9 months / 12 months/year = 0.75 years

Solving our equation:

P = 1227 / ( 1 + (0.06 × 0.75)) = 1174.1626794258

P = $1,174.16

Learn more about simple interest here:

https://brainly.com/question/2294792

A certain instructor assigns a 50-point problem and calculates an integer score 0-50 and assigns a letter grade according to the scale 40 - 50 is an A, 30 - 39 is a B, 20 - 29 is a C, 10 - 19 is a D and 0 - 9 is an F. Write a Python function called letter_grade which takes one argument, an integer, and RETURNS the appropriate letter grade.

Answers

Answer:

Following are the code to this question:

def letter_grade(x): #defining a method letter_grade that accepts one parameter

   if x>=50 and x<=40:#defining if block that check value of x greater than 50 and less than 40

       print("A")#print value

   if x>=30 and x<=39:#defining if block that check value of x greater than 30 and less than 39

       print("B")#print value

   if x>=20 and x<=29:#defining if block that check value of x greater than 20 and less than 29

       print("C")#print value

   if x>=10 and x<=19:#defining if block that check value of x greater than 10 and less than 19

       print("D")#print value

   if x>=0 and x<=9:#defining if block that check value of x greater than 0 and less than 9

       print("F")#print value

letter_grade(30) #calling the method letter_grade

Output:

B

Explanation:

In the above Python code, a method "letter_grade" is declared, that accepts an integer variable in its parameter, and defined the multiple if block to check the given value, which can be defined as follows:

In the first, if block, it checks the value of x greater than 50 and less than 40 , if the condition is true it will print the value "A".In the second, if block, it checks the value of x greater than 30 and less than 39,  if the condition is true it will print the value "B".In the third, if block, it checks the value of x greater than 20 and less than 29,  if the condition is true it will print the value "C".  In the fourth, if block, it checks the value of x greater than 10 and less than 19,  if the condition is true it will print the value "D".In the fifth, if block, it checks the value of x greater than 0 and less than 9,  if the condition is true it will print the value "F".

And at the last it call the method.

_______________ are distinguished from microcontrollers by their complexity and increased on-chip resources.A. Systems on a chip B. Systems on a driveC. Chip on a chip D. Device on a chip

Answers

Answer:

the correct option is (A)

Explanation:

According to the given scenario, the system on a chip is a chip that is different from the microcontrollers in terms of complexity and rise on the chip resources

The system on a chip is a circuit i.e. integrated most the computer things

hence, the correct option is (A).

Therefore the rest of the options are wrong

Answer:

a

Explanation:

Ship, CruiseShip, and CargoShip ClassesDesign a Ship class that has the following members:a. a member variable for the name of the ship (a string)b. a member variable for the year that the ship was built (a string)c. A constructor and appropriate accessors and mutatorsd. A virtual print function that displays the ship's name and the year it was built.

Answers

Answer:

def shipvari(ship);

Cruiseship="" #defining a string

YearBuilt= ""

for i in range(ship);

if Cruiseship="";

print(CruiseShip)

Give the rest a try!

match the databse function to it's purpose

Answers

Answer:

Explanation:

Which database functions?

As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors

Answers

Answer:

Printing devices

Video, Audio devices

Communication machines

Explanation:

Printing devices - Sysadmin needs this type of devices for print important data and information.

Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.

Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.

Suppose a webpage contains a single text field. We want to make the page such that a user can immediately start typing in the text field without clicking on it. What is correct way using?
1. .
2. .
3. .
4. Can't be done with only HTML5, need help of Javascript or something else.

Answers

Answer:

The answer is "Option 2".

Explanation:

In HTML5, text inputs use an autofocus attribute, which, when the page is loaded, uses a template to concentrate primarily on text fields. This attribute is a Boolean property that represents the HTML autofocus attribute, showing if the related <select> element will receive an output focus whenever the page loads if it is overruled by the user. An only form-associated entity can have this property specified in a text.

Your organization uses a federated identity provider to login to your Oracle Cloud Infrastructure (OCI) environment. As a developer, you are writing a script to automate some operation and want to use OCI CLI to do that. Your security team doesn't allow storing private keys on local machines. How can you authenticate with OCI CLI?

Answers

Answer:

Run OCI session authenticate and provide your credentials

Explanation:

The OCI CLI when in combination with a shell script can be fastly used in the creation of shareable scripts. It uses API keys, private and public scheme as it's default authentication. The command to use is the oci set up keys, to create these keys. Since you cannot store private keys, you run OCI authentication and then you give your credentials

Which of the following options allow you to access a computer remotely?

a. NTP
b. SSH
c. Server
d. VPN

Answers

Answer:

b. SSH

Explanation:

Secure Shell (SSH) is a protocol that allows you to access a computer remotely by providing safe network communications via an unsecured network.

Secure Shell (SSH) protocol can be used to perform essential functions such as protected file transfers, remote access to private network systems, devices, and applications.

Thus, option "B" is the right answer.

What is the last usable host IP address on the 192.168.32.9/30 network?

Answers

Answer:

192.168.32.10

Explanation:

HOPE THIS HELPS:)

The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for termination.

Answers

Answer:

"Cross-training " seems to be the right response.

Explanation:

Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization. This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.

A company has four departments: A, B, C, and D. The number of IP addresses required by each department is 100, 60, 20, and 26 respectively. The company's application network is 172.168.1.0/24. Please list the address range and subnet mask that can be assigned by each department.

Answers

Answer:

deeppppuhjjuuiiijjjjk

The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to be addressed. Which of the following should be implanted?A. Build an online intermediate CA.B. Implement a key escrow.C. Implement stapling.D. Install a CRL.

Answers

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

A Flash Translation Layer translates user data to a format that can be written on the NVM. tracks which physical block contains the most number of consecutive invalid pages. tracks which physical block contains only valid pages. tracks which physical block contains only invalid pages.

Answers

Answer:

tracks which physical block contains only valid pages.

Explanation:

Flash translation layer or FTL is a system made up of software and hardware that manages solid-state drive or SSD operations. It implements data concurrency techniques like striping, interleaving, and pipelining to generate a high throughput. It also performs logical to physical addressing amongst other functionalities.

The FTL also tracks which physical block in the memory that contains only valid pages by performing a bad block management process, isolating and discarding the blocks with no valid pages

which data representation system is based on the digits 0-9 and is mostly easily interpreted In real wrold situations​

Answers

Answer:

Hexadecimal  data representation system is based on the digits 0-9 and is mostly easily interpreted In real word situations​ .

Explanation:

Hexadecimal manages sixteen different figures: most often the numbers 0–9 to describe values zero to nine, and (A–F) to describe values ten to fifteen. The modern hexadecimal system was first launched into the domain of computing by IBM in 1963. An older description, with 0-9 and u-z, was practiced in 1956 by the Bendix G-15 computer.

Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.

Answers

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

Application software helps run the computer and coordinates instructions with the hardware.
A. True
B. False

Answers

Answer:

A. True

Explanation:

Other Questions
derive an expression for torque experiend by an electric dipole placed in a uniform electric field Will give brainliest! :) Allen finds himself addicted to an illegal drug. Though he considers his crime harmless, his offense is considered a crime against ____________.A.himselfB.societyC.drugsD.family On Study Island, What do I do when the numbers don't show up? What two words describe the result set of a FULL OUTER JOIN minus the INNER JOIN result set in set theory parlance What are the roots of the polynomial equation: 4k - 144 = 0 Show all of your work! Ik it's weird but i just wanna know your guy's aim. Coz i am not sure abt mine.. What do plants produce when they make their own food? Solve: 3(x- 2)= 18. X= Whom do aquatic veterinarians treat?OA.marine animalsmammalsO c.birdsOD.catsO E. dogs There are 55 apples in each row. There are 5000 rows. How many apples in all? What was your train of thought as you navigated the picture of the candle? Which of the points below does not belong?(0, -3)(0, 0)(4, -3)(4,0) what is 9 (13) and how do you solve our brains physically change when we learn something new by bridging the gaps along the neural pathways in our brain. these gaps are called ? find the value of angle x pls answer A court may grant _____ which makes a discovery request a court order for which a party who does not comply can be sanctioned. 1. If you have a parallel circuit with a battery (2 ohms), a light bulb (1 ohm), and a fan (3 ohms) what is your total resistance? For the following types of electromagnetic radiation, how do the wavelength, frequency, and photon energy change as one goes from the top of the list to the bottom?a. radio wavesb. infared radiationc. visible lightd. ultraviolet radiatione. gamma radiation Type the correct answer in each box. Use numerals instead of words.Micah is keeping track of how much he spends this month on gas. In the first week, he bought x gallons of gas at $2.39 per gallon. Inthe second week, he bought 3 fewer gallons of gas than the first week at $2.49 per gallon. So far this month, he has spent a total$46.21 on gas.In the first week, Micah boughtgallons of gasin the second week, Micah boughtgallons of gas Which sentence would be most effective to add to the end of this trailer? Even if Andrew did not discover any secrets at all, he decided to investigate because last summer was really boring. In fact, only one thing was certain: This would either be the best summer of his life . . . or the worst. Before he set out on his search, he decided to see if his best friend Oscar wanted to accompany him. Luckily, in his search for answers, Andrew did not encounter any danger or come to any harm