Leap Year Validation

'***************************************************************** '* Function Name : bIsLeapYear * '* Created By : Thomas A. Cassano * '* date : 00/00/97 * '* Purpose : * '* Arguments : * '* Returns : Boolean * '* Comments : None * '***************************************************************** Function bIsLeapYear(dDate as date) as Boolean bIsLeapYear = ((Year(dDate) Mod 4 = 0) _ And (Year(dDate) Mod 100 <> 0)) _ Or (Year(dDate) Mod 400 = 0) End Function


Comments

  • Another way to check for Leap Year

    Posted by Legacy on 12/10/1999 12:00am

    Originally posted by: Rick Rothstein

    First of all, you should only have to pass the year in quesiton into the function, not a specific date. If you only have a date, pass Year(TheDate) into this:

    Function bIsLeapYear(TheYear As Integer) As Boolean
    bIsLeapYear = (DateSerial(TheYear, 2, 29) <> _
    DateSerial(TheYear, 3, 1))
    End Function

    Reply
  • for Current Month Last Day...

    Posted by Legacy on 09/22/1999 12:00am

    Originally posted by: Yon-Jin, KYUNG

    ' Return Last Day of Current Year and Month
    Function fnc_Month_LastDay(intYearValue As Integer, intMonthValue As Integer)

    Select Case intMonthValue

    Case Is = 1, 3, 5, 7, 8, 10, 12
    fnc_Month_LastDay = 31

    Case Is = 4, 6, 9, 11
    fnc_Month_LastDay = 30

    Case Is = 2
    fnc_Month_LastDay = IIf(IsDate(CStr(intYearValue) & "/2/29"), 29, 28)

    End Select

    End Function

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 11, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT New computing platforms, expanding information environments, recurrent security breaches and evolving regulatory frameworks are factors that security executives must contend with and address when developing their security strategy. In response to these dynamics, security executives are seeking stronger, more nimble and more pervasive security technologies to help protect business-critical information from unauthorized disclosure, loss or …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date