Write a python program to calculate the sum of numbers from 1 to 20 which is divisible by 3.

Answers

Answer 1

Answer:

Input : N = 5

Output : 7

sum = 3 + 4

Input : N = 12

Output : 42

sum = 3 + 4 + 6 + 8 + 9 + 12

Answer 2

Answer:Input : n = 2, number = 7

Output : 728

There are nine n digit numbers that

are divisible by 7. Numbers are 14+  

21 + 28 + 35 + 42 + 49 + .... + 97.

Input : n = 3, number = 7

Output : 70336

Input : n = 3, number = 4

Output : 124200

Explanation:


Related Questions

a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a

Answers

Answer:

where are the step number. I can't find any

define data and user with example​

Answers

Answer:

Any data the user creates or owns. The term user data may be used to emphasize that the data were created and owned by the user. For example, when deleting an application, an uninstall program may ask if user data is also to be deleted.

Explanation:

Hope this helps you. Have a nice day^_^

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Answers

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

What is computer system ?​

Answers

Answer:

a system that is a computer

Answer:

Invertebrates are animals that neither possess nor develop a vertebral column, derived from the notochord. This includes all animals apart from the subphylum Vertebrata. Familiar examples of invertebrates include arthropods, mollusks, annelid, and cnidarians

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
A. Boot the computer from the Windows installation disc and run Startup Repair.
B.Boot the computer from the Windows installation disc and perform a clean installation of Windows.
C.Boot the computer from the Windows installation disc and run Reset this PC.
D.Boot the computer from the Windows installation disc and run System Restore.

Answers

Answer:

C.Boot the computer from the Windows installation disc and run Reset this PC

Hold down the shift key continuously until the Advanced Recovery Options menu appears. To troubleshoot, click. Click Reset this PC after that. Choose whether to perform a clean install and remove everything, or to keep your files. Thus, option C is correct.

What Windows installation disc and run Reset this PC?

From the menu, choose Settings > Update & Security > Recovery. The title of the page should say “Reset this PC.” Next, click Get Started. Choose between removing everything or keeping my files.

In Windows 10, launch the Settings window by clicking the Start menu, then selecting the gear icon in the lower left corner. Another choice from the list of apps is the Settings app. Click Update & Security > Recovery in Settings, then decide Get started under reboot this PC.

Therefore, Boot the computer from the Windows installation disc and run Reset this PC.

Learn more about Windows installation here:

https://brainly.com/question/24282472

#SPJ5

what is known as Ip address

Answers

Answer:

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

Select the best answer for the ques
12. A business has a goal of communicating frequently with its customers to offer specials and increase sales. What element should it consider adding to its website
O A. Database
O B. Payment system
O C. Calendar
O D. Mailing list opt-in

Answers

The element that should consider adding to its website is Mailing list opt-in. Option D is the correct answer.

Adding a mailing list opt-in to the website would allow the business to collect email addresses from customers who are interested in receiving updates, specials, and promotions.

By building a mailing list, the business can communicate frequently and directly with its customers, informing them about new products, exclusive offers, and other relevant information.

Having a mailing list opt-in provides several advantages. Firstly, it gives the business a direct channel of communication with customers, allowing them to reach a targeted audience interested in their products or services.

Secondly, it helps to increase sales by sending promotional emails and offers to the subscribers, which can encourage them to make purchases. Lastly, it enhances customer engagement and loyalty as customers feel connected to the business and stay informed about its latest offerings. Option D is the correct answer.

For such more question on element:

https://brainly.com/question/4966688

#SPJ8

What is AI? Differentiate between 1G and 2G computer.​

Answers

The simulation of human intelligence in machine that are programmed to think like humans and feel the emotions and mimic is called AI

It stands for Artificial Intelligence

1G use analog signal for communication

2G use digital signal for communication

I hope it helps and if you want to have good answers follow me ,believe me I will help you in every question ♥️♥️

Answer:

Artificial intelligence (AI) is intelligence demonstrated by machines, as opposed to the natural intelligence displayed by humans or animals.

It's difference is given below:

1. 1G stands for first generation. While 2G stands for second generation.

2. 1G uses circuit switching. While 2G circuit switching as well as packet switching.

3. In 1G, internet is not provided. While in 2G, internet is provided.

4. The voice signal of 1G is analog signal. While the voice signal of 2G is digital signal.

5. The data services in 1G are not provided. While in 2G, data services are provided except complex data(videos).

6. The channelization protocol in 1G is FDMA. While the channelization protocol in 2G are TDMA and CDMA.

7. 1G was launched in the year 1980. 2G was launched in the year 1993.

Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario

Answers

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

How to execute python code in command prompt *window*?

Iam using sublime text 3 and want to execute my python code in command prompt.
This is my current build system:

{
"cmd": ["python", "$file"],
"selector": "source.python",
"file_regex": "^\\s*File \"(...*?)\", line ([0-9]*)"
}

But I want my program to open in command prompt window and show the result there. I dont want to see the result in sublime text. Please help.

Answers

Answer:

Open Command Prompt and type “python” and hit enter. You will see a python version and now you can run your program there


What is the difference between hacking and cracking

Answers

Explanation:

The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.

0.3. Fill in the blanks,7marks
a. A smart____uses IoT to save electricity.
b._____are devices that can sense , store and analyse signals from the body and display the information on the gadget and an app.
c. The full form of CSS is_____.
d. The syntax of CSS is made of_____
and_____.
e._____CSS is used to beautify one particular tag.
f. Internet of Things makes use of connected devices, smartphones and_________.
g._____track the number of steps a person has walked in a day.​

Answers

Answer:

a) phone

b)

c) cascading style

i need a computer science help.....and I rlly want it right now...this the question
calculate all multiples of 5 that are less than a randomly generated number between 12 and 45. for example the random number is 16. the output is then 5,10,15 python

so basically if type a number between 12 and 45 it shud give me all the multiples of 5 less than the number i typed......pls help;-;

Answers

Define, en tus propias palabras, lo que son los sistemas de información.

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet.

Answers

Answer:

The answer would be Spoofing

A device is a program that must be installed in order for the peripheral device to be able to
work with the computer or laptop.
O prompter
O connector
O driver
O assister

Answers

Hii ! Soooo I think the suitable option for this one would probably be connector and also I had to look up a connector and I really think it could be the answer! If not I am sooo sorry for wrong one aha

In most cases; for a peripheral to work properly, a software must be installed on the computer, the peripheral is to be connected to.

The software is called (c) device driver

Some peripherals (such as mouse, keyboards, external Bluetooth, joysticks etc.) require that the user of the computer installs device driver on the host system.

Without the device driver installed, the following are the possible effects

The peripheral will not work at allThe peripheral will not function properlyThe peripheral causes the computer not to function optimally

Hence, (c) driver is correct

Read more about device drivers at:

https://brainly.com/question/14308161

what is the result obtained after data processing called?​

Answers

Answer:

the result after data processing is called output

Answer:

The meaningful result obtained after processing is known as information. The collection of computer programs and related data that provide the instructions telling a computer what to do is called software

When a statement within a try block causes an exception, the remaining statements in the try block Select one: a. are executed after the statements in the catch block b. are executed before the statements in the catch block c. aren't executed

Answers

In C++, 'Try block' comprises of a group of statements in which there is a probability of an exception to take place.

C). The statements that would be left in the try block in case a particular statement leads to an exception 'can't be executed.'

In case an exception takes place, the left statements in the try block fail to function. This is the primary reason for which a catch block immediately succeeds a try block in order to deal with the exception and help close that code to allow the statements to work. Thus, option C is the correct answer.

Learn more about 'Try block' here:

brainly.com/question/14186450

If anyone knows how to use Access, how would I create a table like this one? (Add the fields in Table 2-29 Into the table and set field properties.)

Answers

Answer:

Explanation:

To create tables in Access using “Design View,” click the “Create” tab in the Ribbon. Then click the “Table Design” button in the “Tables” group. A new table then appears in the tabbed documents area. Type the name of a field into the “Field Name” column.

How many bits would be needed to count all of the students in class today? There are 40 students.

Answers

Answer:

You would need 8 bits.

Explanation:

pls mark brainliest

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

which are the four different methods of formatting text in libreoffice writer​

Answers

Answer:

The Text Formatting Bar that is displayed when the cursor is in a text object, such as a text frame or a drawing object, contains formatting and alignment commands.

if my answer helps you than mark me as brainliest.

Kolom terakhir pada lembar kerja Excel 2019 adalah​

Answers

Answer:

Tahan CTRL dan tekan tombol panah kanan (tombol kursor) pada keyboard. Anda dibawa ke kolom paling kanan. Dalam versi Excel modern, ini adalah kolom XFD, yaitu 16.384 kolom. Di versi Excel yang lebih lama (2003 dan sebelumnya) kolom terakhir adalah IV yaitu 256 kolom.

in english

Hold down CTRL and press the right arrow key (cursor key) on the keyboard. You are taken to the right-most column. In the modern versions of Excel this is column XFD, which is 16,384 columns. In older versions of Excel (2003 and prior) the last column was IV which is 256 columns.

whats the recommended amount of dedodated wam
i can have in a server

Answers

Hi! The recommended amount of RAM that you should have is 6gb and above.

An ordinary office environment needs computers that have multiple user account settings where each user is allocated private data storage. What type of workstations would you build for this environment

Answers

Answer:build a thick client

Explanation:

¿Cuál es la ventaja principal de una tabla dinámica?

Answers

Explanation:

Ventajas de las tablas dinámicas de Excel:

Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.

If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
O water
O silicon
O dust
O energy

Answers

Answer:

Dust!

Explanation:

its the one that makes the most sense to me :)

Select the correct answer for each question.
Which of the following ports offers a fast
connection that could be used to download and
watch your favorite TV shows?
O Etherne
O modem
O FireWire
O USB
DONE

Answers

Answer:

USB

Explanation:

it is a standard cable connection for consumers electronics devices.

how do i put pinned app to thr main screen​

Answers

Answer:

Go to the screen you want to pin.

Swipe up to the middle of your screen. ...

At the top of the image, tap the app's icon.

Tap the Pin .

4) Programming a) WAp to find the greatest number among any three numbers.​

Answers

def comp_num (num1, num2, num3):

try:

if num1 > num2 and num1 > num3:

print ( "{0} is the biggest".format(num1) )

elif num2 > num1 and num2 > num3:

print ( "{0} is the biggest".format(num2))

elif num3 > num2 and num3 > num1:

print ( "{0} is the biggest".format(num3))

except ValueError:

return "Invalid input"

num_1 = int (input (" Please enter a number: "))

num_2 = int (input (" Please enter a second number: "))

num_3 = int (input (" Please enter a third number: "))

print (comp_num (num_1, num_2, num_3))

Answer:

this is in qbasic programming

write a program to check whether the number is odd or even using 'if' statement in python

Answers

Answer:

Python Program to Check if a Number is Odd or Even :

num = int(input("Enter a number: "))

if (num % 2) == 0:

print("{0} is Even number". format(num))

else:

print("{0} is Odd number". format(num))

Other Questions
Your little sister, who is 14 years old, has been extremely emotional lately. She's moody and generally unhappy. From your developmental psychology class, you know that as she develops into late adolescence, her emotional states will __________. What is the slope of the line thatcontains the points (13,-2) and (3.-2) Explain how in glycolysis that the splitting of one glucose molecule results in 4 ATP but there Is only a net gain of 2 ATP. i dont quite get the concept yet and i really dont wanna bother the teacher again :/ please help If g(x) = (x + 2)/3, find g(-8). Soil moisture (wethess) isimportant for...?A. it is a determination of how much water the soil canhold and how easily water moves through,B. it is evidence of how easily the process of runoff inwhich the soil is filtered can occur.C. Both & BD. None of the above What is the answer when you evaluate n + m -2(m-m) when m = 3 and n = 2? Im sorry I suck at math i have a learning disability a processing disorder and sever adhd PLS HELP ME ON THIS QUESTION I WILL MARK YOU AS BRAINLIEST IF YOU KNOW THE ANSWER!!Which of the following statements is true?A. A data set will always have exactly one modeB. A data set can have multiple modesC. A data set will always have at least one modeD. A data set will never have a mode please help as soon as possible!!Explain the biblical basis for the themes of civilization: justice, power, citizenship, and environment. Which conditions in China during the 1920's and 1930's contributed to the support for communism? PLS HELP UNSCRAMBLE THE WORDS IN SPANISH Fatima purchased a new mattress when it was on sale. The sale price was 27% less than the regular price. If the sale price was $409, what was the original price? (Round your answer to the nearest dollar). this shop is much nicer tell me an adjective and noun Find the missing value.Hint: Use the number line to find the missing value.+5 = -2-1550-51015-10Stuck? Review related articles/videos or use a hint. Read the itinerary for a short trip to Louisiana and answer the questions in English.VENEZ EN LOUISIANE!SUGGESTIONS POUR UN COURT SJOURJOUR 1: Voyage en avion; arrive La Nouvelle-Orlans.JOUR 2: Faites un tour du Vieux Carr pied. Visitez le muse, le Presbytre, pour dcouvrir lhistoire de la ville. Dgustez des spcialits croles chez Antoine, le restaurant le plus vieux de la ville.JOUR 3: Partez tt en car pour la route des plantations. Dcouvrez des styles darchitecture diffrents: le style classique du sud amricain Oak Alley et le style crole Laura, par exemple. Passez la nuit la plantation Nottoway.JOUR 4: Allez Lafayette. En route, faites une balade en bateau sur le bassin Atchafalaya. Passez la nuit chez un habitant cadien. Dnez chez Prjean pour dcouvrir le jambalaya, le gombo et ltouffe. Allez danser au son de la musique cadienne chez Randols.JOUR 5: Allez au muse du parc national Jean Lafitte pour voir le film sur le Grand Drangement. Visitez le muse Vermillionville. Retournez La Nouvelle-Orlans.JOUR 6: Retour en France.1. What are the four different types of transportation mentioned?Enter Text2. What are two of the three cultures tourists will learn about?Enter Text3. What can one discover at the Presbytre?Enter Text4. What is one type of architecture seen in the plantations?Enter Text5. What are two Cajun specialties?Enter Text write the meaning of words in English 1. enticements 2. scoundrel Which type of religion was first practiced in the ancient river valley civilizations of Mesopotamia,Egypt, Indus Valley, and China?O polytheismO aetheismO monotheismO Catholicism There are nickles and quarters worth $2.20 in total. If there are 28 coins, how many nickels are there? Revise the following thesis statement to make it more debatable.Teachers worry about student privacy when using online tools. *Write a linear equation that goes through the points (-2,6) and (1,1).