Write code using the range function to add up the series 3, 6, 9, 12, 15, ..... 66 and print the resulting sum. Expected Output 759

Answers

Answer 1

Answer:

The program is as follows:

total = 0

for i in range(3,67,3):

   total += i    

print(total)

Explanation:

This initializes the sum of the series to 0

total = 0

This iterates through the series with an increment of 3

for i in range(3,67,3):

Add up all elements of the series

   total += i

Print the calculated sum    

print(total)


Related Questions

Program design tools. __________ uses English-like statements to outline the logic of a computer program. __________ graphically shows the step-by-step actions a computer program will take.

Answers

Answer:

Pseudocode; flowchart.

Explanation:

Pseudocode uses English-like statements to outline the logic of a computer program. A pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

Write a program, which will take 20, inputs from the user and find how many
odd and even numbers are there.

Pseudocode & Python

Answers

Answer:

user_input = [int(input()) for i in range(20)]

even = []

odd = []

for i in user_input:

if i%2:

even.append(i)

else:

odd.append(i)

print("odd : ", len(odd), "even : ", len(even))

Explanation:

The above code is written in python :

Using a list comprehension we obtain a list of 20 values from the user and store in the variable user_input.

Two empty list are defined, even and odd which is created to store even and odd values.

A for loop is used to evaluate through the numbers in user_input. Even values leave no remainder when Divided by 2 and are appended to the even list while those those leave a raunder are automatically odd values. The elements each list are counted using the len function and are displayed using the print statement.

¿Si tengo un disco de 1Tb, y en el tengo almacenado lo siguiente:
a) 300 videos de 126GB en total
b) 1376 archivos de office que cada uno pesa 117kb.
c) 3000 mp3 de 3.8mb cada uno.
d) 4Gb ocupados en el sistema operativo.
¿Cuánto espacio me sobre en el disco duro?

Answers

Answer:

Espacio a la izquierda = 858,8439008 Gb

Explanation:

Dados los siguientes datos;

Tamaño del disco duro = 1 Tb

Vídeos = 126 Gb

Archivos de Office = 1376 * 117 Kb = 160992 Kb

Mp3 = 3000 * 3.8 mb = 11400 Mb

Sistema operativo (OS) = 4 Gb

Conversión:

En primer lugar, convertiríamos el tamaño del archivo en kilobytes a megabytes.

1000 Kb = 1 Mb

160992 Kb = 160992/1000 = 160.992 Mb

Memoria total (Mb) = 11400 + 160,992

Memoria total (Mb) = 11560.992 Mb

A continuación, convertiríamos el tamaño del archivo en megabytes a gigabytes;

1000 Mb = 1 Gb

11560.992 Mb = 11560.992/1000 = 11.560992 Gb

Por último, sumaríamos todos los tamaños de archivo en gigabytes;

Espacio total (memoria) utilizado = 126 + 11.560992 + 4

Espacio total (memoria) utilizado = 141,560992 Gb

Conversión:

1000 Gb = 1 Tb

Espacio restante = tamaño del disco duro - memoria total utilizada

Espacio a la izquierda = 1000 - 141.560992

Espacio a la izquierda = 858,8439008 Gb

Nota:

Kb significa kilobyte. Mb significa megabyte. Gb significa gigabyte. Tb significa terabyte.

The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing

Answers

Answer:

a. spear-phishing has more specific targets than phishing

Explanation:

The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.

Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.

disadvantages of computer. ​

Answers

Answer:You cant carry it around like a phone

Explanation:

The logical structure in which one instruction occurs after another with no branching is a ____________.

Answers

Answer:

sequence

Explanation:

The logical structure in which one instruction occurs after another with no branching is a sequence.

MyProgramming Lab

It needs to be as simple as possible. Each question is slightly different.

1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].

Associate the list with the variable arith_prog.

2.

An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers if the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the integers m and n, create a list consisting of the arithmetic progression between (and including) m and n with a distance of distance (if m > n, the list should be empty.) For example, if distance is 2, m is 5, and n is 12, the list would be [5, 7, 9, 11].

Associate the list with the variable arith_prog.

3.

A geometric progression is a sequence of numbers in which each value (after the first) is obtained by multiplying the previous value in the sequence by a fixed value called the common ratio. For example the sequence 3, 12, 48, 192, ... is a geometric progression in which the common ratio is 4.

Given the positive integer ratio greater than 1, and the non-negative integer n, create a list consisting of the geometric progression of numbers between (and including) 1 and n with a common ratio of ratio. For example, if ratio is 2 and n is 8, the list would be [1, 2, 4, 8].

Associate the list with the variable geom_prog.

Answers

Answer:

The program in Python is as follows:

#1

d = int(input("distance: "))

n = int(input("n: "))

arith_prog = []

for i in range(1,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#2

d = int(input("distance: "))

m = int(input("m: "))

n = int(input("n: "))

arith_prog = []

for i in range(m,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#3

r = int(input("ratio: "))

n = int(input("n: "))

geom_prog = []

m = 1

count = 0

while(m<n):

   m = r**count

   geom_prog.append(m)

   count+=1

print(geom_prog)

Explanation:

#Program 1 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from 1 to n (inclusive) with an increment of d

for i in range(1,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 2 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for m

m = int(input("m: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from m to n (inclusive) with an increment of d

for i in range(m,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 3 begins here

This gets input for ratio

r = int(input("ratio: "))

This gets input for n

n = int(input("n: "))

This initializes the list, geom_prog

geom_prog = []

This initializes the element of the progression to 1

m = 1

Initialize count to 0

count = 0

This is repeated until the progression element is n

while(m<n):

Generate progression element

   m = r**count

Append element to list

   geom_prog.append(m)

Increase count by 1

   count+=1

This prints the list

print(geom_prog)

What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data

Answers

Answer: Lossless Compression

Explanation:

The type of compression that uses an algorithm which allows viewing the graphics file without losing any portion of the data is referred to as the lossless compression.

Lossless compression refers to a form of data compression algorithms which enables the reconstruction of the original data from the compressed data.

what is the term used to describe the situation when a derieved class provides a function already provided in the bae class

Answers

Answer:

The right approach is "Overriding".

Explanation:

The overriding function seems to be a programming application that enables a classroom as well as children to successfully implement some technique that's been given by another one of their parents or super classes.The overriding method must be named, signed, and parameter-like inside your parent process throughout the child one.

Thus the above is the correct answer.

Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas

Answers

Answer:

name1+","+name2+","+name3

Explanation:

Given

name1, name2 and name3

Required

Concatenate, separated by comma (,)

To concatenate, we simply use the + operator.

So, the expression is:

name1+","+name2+","+name3

The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement

Answers

Answer:

to package a repeated task as a function even though the task does not yield a value.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

Some of the notable characteristics of a function includes;

I. The name and arguments of the function must be specified by a function.

II. The implementation of a function is usually designed to be hidden from the caller.

IIII. A function define specific tasks that reusable at many points in a program.

A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.

The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.

plz help me to do 4 number

Answers

Answer:

A is an abbaccus.  B is Blaze Pascal.  C is The Jacquard Loom.  D is Charles Babbage.  E is The Manchester Baby.

Explanation:

what is the software component of multimedia

Answers

The various components of multimedia are Text, Audio, Graphics, Video and Animation. All these components work together to represent information in an effective and easy manner.

What will the following code display?


A) 6

B) 0

C) 3

D) 0

1

2

Answers

Answer:

Answer is C) 3

Explanation:

Select all that apply: Our primary objectives in functional programming are: Group of answer choices Functions should be as pure as possible following a pattern of Input->Processing->Output To model algorithms in a state-machine like format Removing state from programming Modeling data into a fact-base to be queried Raising our abstraction towards math Code free of side effects Modeling data into classes/objects that intercommunicate to solve software issues

Answers

Answer:

Functions should be as pure as possible following a pattern of Input->Processing->Output

To model algorithms in a state-machine like format

Code free of side effects

Explanation:

Functional programming is a popular concept in most popular programming languages such as Lisp that makes use of functions in separating code that aims to define and solve a particular problem which is part of a bigger problem. Functional programming focuses on what to solve, ie what is the problem rather than how do we solve it. It divides up code in meaningful blocks that makes it a lot more understandable, allowing big problems to be solved in tiny bits and not an overwhelming whole. Functional programming adopts the state-machine like format as it makes use of input and alters state as necessary(not hard coded). It also removes side effects issues that may be experienced when a function affects or mutates variables(global variables) that may be outside its block.

Which part of the packet contains the sequencing information that's used by TCP to reassemble packets

Answers

Answer:

During the TCP startup and teardown sequence, a "phantom byte" causes the sequence number and acknowledgment number fields to increment by 1 even though no data is exchanged. This phantom byte can be confusing when you have just learned that the sequence number field increments only when data is sent.

Explanation:

to which category of software does Microsoft Works belong
a) custom-written
b) customized
c) integrated
d) special purpose ​

Answers

Answer:

c) Integrated

Explanation:

Integrated software are packages that has the functional capacity to perform the several tasks commonly performed by more than one productivity software application, such that those functions and capabilities are integrated into a single application, thereby making it possible for users to carry out required computer tasks, at a lower cost

Examples of integrated software include Microsoft Works, which includes a Word processing, spreadsheet, and database capabilities combined into one application

La historia de los productos tecnologicos
porfa

Answers

Answer:

La tecnología es el conocimiento y el uso de herramientas, oficios, sistemas o métodos organizativos. La palabra tecnología también se usa como un término para el conocimiento técnico que existe en una sociedad.

La demarcación entre tecnología y ciencia no es del todo fácil de hacer. Muchos programas de ingeniería tienen un gran elemento de ciencias y matemáticas, y muchas universidades técnicas realizan investigaciones exhaustivas en materias puramente científicas. La mayor parte de la ciencia aplicada generalmente se puede incluir en la tecnología. Sin embargo, una diferencia fundamental importante es que la tecnología tiene como objetivo "ser útil" en lugar de, como la ciencia en su forma ideal, comprender el mundo que nos rodea por sí mismo. El hecho de que comprender la realidad que nos rodea (sobre todo en forma de leyes y principios universales) sea muy útil para fines técnicos, explica por qué la ciencia y la tecnología tienen grandes similitudes. Al mismo tiempo, existen áreas de conocimiento e investigación en tecnología e ingeniería donde las propias ciencias naturales puras han hecho contribuciones muy limitadas, como la tecnología de producción, la tecnología de la construcción, la ingeniería de sistemas y la informática. En estas y otras áreas de la tecnología, por otro lado, puede haber depósitos de matemáticas, economía, organización y diseño.

#include

int main()
{
char ch;
printf("Enter any letter");
ch=getch
();
printf("\nYou Pressed %c",ch);

return 0;
}
whats the error not giving the correct output

Answers

Answer:

#include<studio.h>

#include<conio.h>

void main()

{

char ch;

printf("Enter any letter");

scanf("%c",&ch);


Write a short note on Computer
impact on
our society?​

Answers

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

Answer:

Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.

Explanation:

Positive Impact of Computer:-

The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.

Negative Impact of Computer:-

Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.


SOMEONE PLEASE HELP ME DUE IS IN 30 MINUTES!!!⚠️⚠️⚠️⚠️

~WAP to accept a number and display the square of the number using SUB END SUB​

Answers

Answer:

Display square root of an input number

REM PROGRAM TO DISPLAY SQUARE ROOT OF AN INPUT NUMBER. INPUT “ENTER ANY NUMBER”; N. S = N ^ (1 / 2) ...

DECLARE SUB SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...

SUB SQROOT (N) S = N ^ (1 / 2) ...

DECLARE FUNCTION SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...

FUNCTION SQROOT (N) SQ= N ^ (1 / 2)

Explanation:

hope this helps u

which advanced boot option starts windows, but loads only the drivers necessary for basic functionality

Answers

Answer:

The correct answer is: The Safe Mode

Explanation:

Safe Mode is an advanced boot option available in Windows. It is of two categories:

Safe Mode  and Safe Mode with Networking (this option allows inter and intra network conectivity)

It is useful for troubleshooting a windows operating system to find out why it is dysfunctional.

It can be activated by pressing the F8 key as the Windows Operting system boots up, but not after.

Cheers!

What is the output of this code?
num-7
if num > 3:
print("3")
if num < 5:
print("5")
if num --7:
print("7")

Answers

Answer:

The output is:

3

7

Explanation:

Given

The code segment

Required

The output

The given code segment has 3 independent if statements; meaning that, each of the if conditions will be tested and executed accordingly

This line initializes num to 7

num=7

This checks if  num is greater tha 3; If yes, "3" is printed

if num > 3:

   print("3")

The above condition is true; so, "3" will be printed

This checks if  num is less than 5; If yes, "5" is printed

if num < 5:

   print("5")

The above condition is false; so, "5" will not be printed

This checks if  num equals 5; If yes, "7" is printed

if num ==7:

   print("7")

The above condition is true; so, "7" will be printed

So, the output is:

3

7

We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key differences between routing and forwarding

Answers

Answer: forwarding: move packets from router's input to appropriate router output

routing: determine route taken by packets from source to destination

Explanation:

The network layer refers to where connections take place in the internet communication process by sending packets of data between different networks.

The distinction between the forwarding function and the routing function performed in the network layer is that the forwarding function move packets from the input of the router to the appropriate router output while the routing function:m helps in knowing the routee taken by packets from the source to destination.

In Python, to assign a value to a variable, an equal sign must follow the variable name.

True

False

Answers

ITSSSSSSSSSSSSSSSSSSS true

Communication media that use an antenna for transmitting data through air or water are called _____.

Answers

Answer:

Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.

Explanation:

douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html

copy and paste that it might help!

If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.

Answers

Answer:

Normal

Explanation:

If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.

What is presentation?

Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.

Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.

It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.

Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.

To learn more about the presentation, refer to the below link:

https://brainly.com/question/17087249

#SPJ2

what is microsoft speadsheet

Answers

Answer:

Exel if I spelled it right

Explanation: It is very good

Answer:

It's called Excel and it's in Office 365

Explanation:

It's very useful in my opinion to organize any graphs or information you would like to store online.

Change the case of letter by​

Answers

Answer:

writing it as a capital or lower case.

Explanation:

T - upper case

t - lower case

not sure if that is what you meant or not

Answer:

Find the "Bloq Mayus" key at the left side of your keyboard and then type

Explanation:

Thats the only purpose of that key

write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit

Answers

Answer:

total = 0

for i = 1 to 7

input temp

temp = temp * 1.8 + 32

total + = temp

average = total/7

print average

Explanation:

[Initialize total to 0]

total = 0

[Iterate from 1 to 7]

for i = 1 to 7

[Get input for temperature]

input temp

[Convert to degree Fahrenheit]

temp = temp * 1.8 + 32

[Calculate total]

total + = temp

[Calculate average]

average = total/7

[Print average]

print average

Other Questions
ggjfhghfhtdhdhdttjtjfj During the purchase decision process, an individual at the __________ stage will perceive differences between his or her ideal and actual situations big enough to trigger a decision. what did the jews experience during the holocaust Francis was recording plant heights for an experiment. Each time that she took a measurement, she wrote it down. Then,she measured the plant again and compared the new measurement to the one that she had recorded in her notebook.What was she most likely trying to do?revise her hypothesischeck her memoryO make the data more validO form a conclusion Royal Lawncare Company produces and sells two packaged productsWeedban and Greengrow. Revenue and cost information relating to the products follow: Product Weedban Greengrow Selling price per unit $ 11.00 $ 35.00 Variable expenses per unit $ 2.20 $ 11.00 Traceable fixed expenses per year $ 132,000 $ 49,000 Last year the company produced and sold 41,500 units of Weedban and 24,000 units of Greengrow. Its annual common fixed expenses are $113,000. Required: Prepare a contribution format income statement segmented by product lines. A 1200 kg car traveling east at 4.5 m/s crashes into the side of a 2100 kg truck that is not moving. During the collision, the vehicles get stuck together. What is their velocity after the collision? A. 2.9 m/s east B. 1.6 m/s east m C. 2.6 m/s east D. 1.8 m/s east Given: f(x) = x- 7 and h(x) = 2x + 3Write the rule for f(h(xc)). How do correlation and causation differ? I NEED HELP OR I WILL BE PUNISH (GOD RELATED) What scroll (book) did Jesus read in the synagogueAND QUESTION 2 IS did the people want to throw Jesus off the cliff? I NEED AN EASY EXPLANATIONPLEASE HELP Find the value of "x" Wrong answer will be reported and explain please solve the equation 4x-|-2|=18 Naomi Osaka, a Japanese-African-American tennis player is the 2021 Australian Open Champion, and the first Asian tennis player in Women's Tennis Association (WTA) history to be ranked first in Singles. To celebrate her win, Naomi Osaka hits a ball into the stands at 40. m/s and at an angle 30. above the horizontal. On its way down, the ball is caught by a spectator 12 m above the point where the ball was hit.a) Calculate the time it takes the tennis ball to reach the spectator. b) Calculate the ball's horizontal range (horizontal distance travelled). : Find absolute minimum and maximum values of (, ) = 22 + 4 + 4 On the close triangular region R bounded by the lines = 2, = 0, = 2 how to make personal history what is a good way to address with the hiring personality in cover letter plz plz help me asapi need summary of this text plz helpi will give u brainliest Most people with bulimia _____.suffer extreme weight gainsuffer extreme weight lossmaintain a weight below the normal rangemaintain a weight within the normal range help on part 3? not sure what im supposed to do Camille has 3/4 of a cup of powdered sugar. She sprinkles 1/5 of the sugar onto a plate of brownies and sprinkles the rest onto a plate of lemon cookies. how much sugar does Camille sprinkle on the brownies. MC Qu. 120 Dallas Company uses a job order... Dallas Company uses a job order costing system. The company's executives estimated that direct labor would be $4,160,000 (260,000 hours at $16/hour) and that factory overhead would be $1,560,000 for the current period. At the end of the period, the records show that there had been 240,000 hours of direct labor and $1,260,000 of actual overhead costs. Using direct labor hours as a base, what was the predetermined overhead rate