find the summation of even number between (2,n)​

Answers

Answer 1

Answer:

The program in python is as follows:

n = int(input("n: "))

sum = 0

for i in range(2,n+1):

   if i%2 == 0:

       sum+=i

print(sum)

Explanation:

This gets input n

n = int(input("n: "))

This initializes sum to 0

sum = 0

This iterates through n

for i in range(2,n+1):

This checks if current digit is even

   if i%2 == 0:

If yes, take the sum of the digit

       sum+=i

Print the calculated even sum

print(sum)


Related Questions

outline 3 computer system problem that could harm people and propose the way avoid the problem​

Answers

Answer:

outline 3 computer system problem that could harm people and propose the way avoid the problem are :_

Computer Won't Start. A computer that suddenly shuts off or has difficulty starting up could have a failing power supply. Abnormally Functioning Operating System or Software. Slow Internet.

Consider the following class definitions.
public class Apple

{
public void printColor()
{
System.out.print("Red");
}
}
public class GrannySmith extends Apple
{
public void printColor()
{
System.out.print("Green");
}
}
public class Jonagold extends Apple
{
// no methods defined
}

The following statement appears in a method in another class.
someApple.printColor();
Under which of the following conditions will the statement print "Red" ?
I. When someApple is an object of type Apple
II. When someApple is an object of type GrannySmith
III. When someApple is an object of type Jonagold


a. I only
b. II only
c. I and III only
d. II and III only
e. I, II, and III

Answers

i pretty sure it’s d tell me if I’m wrong

Please Help Me!!!!!!!!!!!!!


A commercial photographer would most likely be employed by which of the following?

A business
A magazine
A travel agency
All the above

Answers

Explanation:

a magazine cause it helps put out commercial

Suppose that in a 00-11 knapsack problem, the order of the items when sorted by increasing weight is the same as their order when sorted by decreasing value. Give an efficient algorithm to find an optimal solution to this variant of the knapsack problem, and argue that your algorithm is correct.

Answers

Answer:

Following are the response to the given question:

Explanation:

The glamorous objective is to examine the items (as being the most valuable and "cheapest" items are chosen) while no item is selectable - in other words, the loading can be reached.

Assume that such a strategy also isn't optimum, this is that there is the set of items not including one of the selfish strategy items (say, i-th item), but instead a heavy, less valuable item j, with j > i and is optimal.

As [tex]W_i < w_j[/tex], the i-th item may be substituted by the j-th item, as well as the overall load is still sustainable. Moreover, because [tex]v_i>v_j[/tex] and this strategy is better, our total profit has dropped. Contradiction.

Which answer below is NOT a function of a Data Scientist? O Data Exploitation O Data Strategies O Data Modeling O Data Preperation

Answers

Answer:

uh

Explanation:

yesyesyesyesyesyeysyeys

system. Construct an ER diagram for keeping records for exam section of a college.​

Answers

Yes okay i dont know how to do that

please help me I mark you brilliant thanks​

Answers

Answer:

B attaches to C, and C goes into A. (Sequence: A, then insert C into A, then insert B into C.)

Explanation:

You can quite literally get the answer from treating it like a puzzle. There is only 1 solution you can have, and they are marked with shapes. This is also the correct solution to clear the text box with button2 on click.

When an item is gray that means...
A. The item only works with another application
B. The item has been selected
C. The item is unavailable
D. The item has been deleted
A,B,C,orD, can anyone please help?

Answers

Answer:

B. The item has been selected

Answer:

C

Explanation:

When an item is unavailable, usually referring to the Technology field, it is gray. Gray items are things that are not created anymore, sold out or not enough supply. The color gray is usually used to symbol something bad, and not having a product is considered bad. Using our background knowledge, we can concude that the answer is option C.

In a non-price rationing system, consumers receive goods and services first-come, first served. Give me an example of a time when a consumer may experience this.

Answers

When someone may be giving away something for free.

It has been a hectic day for the cyber security team. The team is struggling to decide to which incident to devote the most resources. You are estimating the amount of time taken to recover from each incident Which scope factor are you considering?

Answers

Answer:

This definitely is a project management question. The scope factors to be considered are:

Varying Resource Levels Time FactorCompliance with Regulatory Factors Requirements of Stakeholders Quality of Management RisksLegal Factors

Explanation:

Any element or factor that can advantageously advance a project or negatively impact it is usually referred to as Project Scope Factor.

It is considered a desirable or nice-to-have ability to be able to spot these factors to the end that the positive ones are enhanced whilst negative ones are mitigated.

Failure, for instance, to timeously and properly identify factors that can negatively impact a project is most likely to result in a negative outcome.

Cheers

management is as old as human civilization. justify this statement​

Answers

Answer:

Indeed, management is as old as the human species, as human nature is itself dependent on the natural resources that it needs for its subsistence, therefore needing to exercise a correct administration of said resources in such a way as to guarantee that those resources can satisfy the greatest number of individuals. That is, the human, through the correct management of resources, seeks to avoid the scarcity of them.

Any action that causes harm to your computer is called a
1.Security harm
2.Security damage
3.Security risk
4.Security crime​

Answers

Answer:

Security risk.

Explanation:

It is making your computer vulnerable to attacks and less secure.

Any action that causes harm to your computer is called a security risk. That is option 3.

What is security risk in computer?

A computer is an electronic device that can be used to prepare, process and store data.

Security risk in computer is any action undertaken by a computer user that can lead to the loss of data or damage to hardware or software of the computer.

Some of the security risks that predisposes a computer to damage include the following:

unpatched software,

misconfigured software or hardware, and

bad habits such as keeping fluid close to the computer.

Therefore, any action that causes harm to your computer is called a security risk.

Learn more about security risks here:

https://brainly.com/question/25720881

You would like to upgrade the processor in your system to a 64-bit processor. Which of the components will you most likely need to upgrade as well to take full advantage of the new processor

Answers

Answer: Operating system

Explanation:

The components that will be required to upgrade as well to take full advantage of the new processor is the Operating system.

The operating system manages the software resources and the computer hardware, through the provision of common services for the computer programs. It simply supports the basic function of the computer like task scheduling

You're expecting visitors who will be demanding Mamet access Before they arrive, you can activate a Guest network that has its own ________ and a different password from the one used with the network where you store all your files.

Answers

functions

is the correct answer of your question ^_^

Which of the following ribbon tools would be most efficient for applying multiple
changes to text formatting?
a. Font Dialog Box
b. Paragraph Styles
c. Styles Dialog Box
d. Find and Replace

Answers

Answer:

Option A, Font Dialog Box

Explanation:

In order to make changes in the text formatting, the font setting in the dialog box can be used on the Ribbon's Home tab.

From the font settings in Word 2016, one can change the following change font color, size, style etc.

Hence, option A is correct

Smartphones are more likely to be used than laptop computers for everyday ICT use.
Describe three advantages of using a smartphone rather than a laptop computer.

Answers

Answer:

it's small amd you can carry it everywhere

easy to use

long lasting battery

Explanation:

hope the answers are right:)

For each compound below, identify any polar covalent bonds and indicate the direction of the dipole moment using the symbols δ +and δ-.
(a) HBr
(b) HCI
(c) H2O
(d) CH40

Answers

Answer:

H-Br bond is polar, hydrogen is partly positive and bromine is partly negative

H-Cl bond is polar, hydrogen is partly positive and bromine is partly negative

O-H bond in water is polar, hydrogen is partly positive and oxygen is partly negative

C-O bond in CH40 is polar, carbon is partly positive and oxygen is partly negative

Explanation:

A molecule possess a dipole moment when there is a large difference in electro negativity between two bonding atoms in the molecule.

The presence of dipole moments introduces polarity to the molecule. In all the molecules listed in the answer, the shared electron pair of the bond is closer to the more electronegative atom causing it to be partially negative while the less electronegative atom in the bond is partially positive.

for macroscale distillations, or for microscale distillations using glassware with elastomeric connectors, compare the plot from your simple distillation with that from your fractional distillation. in which case do the changes in temperature occur more gradually

Answers

Answer:

Fractional Distillation

Explanation:

Fractional Distillation is more effective as compared to simple distillation. In simple distillation, the temperature changes more gradually as compared to the fractional distillation

2. A data catalog identifies all of the following, except: a. Attribute data type b. Attribute range of values c. Attribute constraints d. Attribute value for Instructor ID

Answers

Answer:

c. Attribute constraints

Explanation:

A data catalog identifies all of the following, except: "Attribute constraints"

The above statement is TRUE because a Data Catalog, a metadata management service, operates by searching for key data, understand and manage data for usefulness.

Data Catalog checks on the BigQuery datasets, tables, and views and checks both technical and business metadata by identifying the following attributes:

1. Data type

2. Range of values

3. Value for Instructor ID

what is function of spacebar​

Answers

Answer:

The function of a spacebar is to enter a space between words/characters when you're typing

To input a space in between characters to create legible sentences

Write a program that will allow a grocery store to keep track of the total number of bottles collected for a seven-day period. The program should allow the user to enter the number of bottles returned for each day of the seven-day period. The program will accumulate the total number of bottles returned for the 7-day period. Then calculate the amount paid out (the total bottles returned times .10 cents). The output (display) of the program should include the total number of bottles returned and the total paid out. Allow the user to enter multiple transactions

Answers

Answer:

Print the values days of bottles.Display total number of bottles collecting.Display the payout for this transaction.

Explanation:

Program:-

DEPOSIT_PER_BOTTLE = 0.10

another = "Y"

while another=="Y":

   print("Input Values 7 days of bottles:")

   total = 0

   for I in range(7):

       collected_bottles = int(input())

       total += collected_bottles

   payout = total*DEPOSIT_PER_BOTTLE

   print("Total number of bottles collected: {:,}".format(total))

   print("Payout for this transaction $%.2f"%payout)

   another = input("Do you want to complete another transaction? ").upper()

Write a C++ program that reads a number and determines whether the number is positive, negative or zero using Switch operator method

Answers

Answer:

#include <iostream>

using namespace std;

template <typename T> int sgn(T val) {

   return (T(0) < val) - (val < T(0));

}

int main()

{

   cout << "Enter a number: ";

   int number;

   cin >> number;

   switch (sgn(number)) {

   case -1: cout << "The number is negative";

       break;

   case 0: cout << "The number is zero";

       break;

   case 1: cout << "The number is positive";

       break;

   }

}

Explanation:

You need the special sgn() function because a switch() statement can only choose from a list of discrete values (cases).

Assume that a, b, and c have been declared and initialized with int values. The expression

!(a > b || b <= c)
is equivalent to which of the following?

a. a > b && b <= c
b. a <= b || b > c
c. a <= b && b > c
d. a < b || b >= c
e. a < b && b >= c

Answers

Answer:

Option c (a <= b && b > c) and Option e (a < b && b >= c) is the correct answer.

Explanation:

According to the question, the given expression is:

⇒ !(a > b || b <= c)

There will be some changes occur between the values such as:

! = It becomes normal> = It becomes <|| = It becomes &&

So that the expression will be:

⇒ a <= b && b > c

and

⇒ a < b && b >= c

Other choices are not connected to the expression or the rules. So the above two alternatives are the correct ones.

Can you write a global keyword in a program with capital letters instead
small in php

Answers

Answer:

Variable names in PHP are case sensitive (including the global variables!), although function names are not.

HEALTH AND SAFETY IN USING ICT TOOLS

Answers

Answer:

Health and Safety using ICT Tools.

...

Some of the long-term health effects are:

Headaches and tiredness. Using the mobile phone for hours can be very stressful and may lead to mild or severe headaches.

Creates joint pain. ...

Mobile phone battery explosion. ...

Induced ringing!

Answer:

ICT tools for health and safety. Find common health issues related to computer usage and other ICT tools.

Explanation:

Use of ICT instruments

ICT tools are computer-based equipment used for processing and communicating information and technology. There are certain ICT tools;

- TV.

- System of Public Address

- Radio

- Mobile Phone

- Computer

What are the adverse consequences of long-term television exposure?

You don't have eyes for hours to stare at the TV.

Taking hours on the TV can be dangerous and dangerous for the eye.

If you starve continuously, your eye will get overworked and this will cause an irritation of the eye, such as dry eye, red, itchy, and watery eyes, fatigue, eyelid weight or forehead, as well as eye concentration.

Certain long-term effects on health are:

1. Tiredness and headaches.

2. Make pain joint.

3. Battery explosion mobile phone.

4. Ringing induced! In ears.

A pointer can be used as a function argument, giving the function access to the original argument.
A. True
B. False

Answers

Answer:

True

Explanation:

A pointer can be used as a function argument, giving the function access to the original argument.

Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a color, and a Boolean value to indicate whether the triangle is filled.

Answers

Answer:

   Scanner in = new Scanner(System.in);

       System.out.print("Please enter 3 sides of a triangle, color and " +

                       "whether it is filled or not (true false): ");

       double s1 = in.nextDouble();

       double s2 = in.nextDouble();

       double s3 = in.nextDouble();

       String color = in.next();

       boolean filled = in.nextBoolean();

       

       Triangle t1 = null;

       

       try {

           t1 = new Triangle(s1, s2, s3, color, filled);

       }

       catch (IllegalTriangleException ite) {

           System.out.println(ite.toString());

       }

       

       System.out.println(t1.toString());

       System.out.printf("Triangle color: %s, Triangle filled: %s%n" +  

                       "Area: %.2f%n" +  

                       "Perimeter: %.2f%n%n",

                   t1.getColor(),  

                   t1.isFilled(),

                   t1.getArea(),

                   t1.getPerimeter());

           

Explanation:

   Scanner in = new Scanner(System.in);

       System.out.print("Please enter 3 sides of a triangle, color and " +

                       "whether it is filled or not (true false): ");

       double s1 = in.nextDouble();

       double s2 = in.nextDouble();

       double s3 = in.nextDouble();

       String color = in.next();

       boolean filled = in.nextBoolean();

       

       Triangle t1 = null;

       

       try {

           t1 = new Triangle(s1, s2, s3, color, filled);

       }

       catch (IllegalTriangleException ite) {

           System.out.println(ite.toString());

       }

       

       System.out.println(t1.toString());

       System.out.printf("Triangle color: %s, Triangle filled: %s%n" +  

                       "Area: %.2f%n" +  

                       "Perimeter: %.2f%n%n",

                   t1.getColor(),  

                   t1.isFilled(),

                   t1.getArea(),

                   t1.getPerimeter());

           

Discuss at least 1 Microsoft Windows security features that could protect data?

Answers

Answer:

Virus & threat protection.

Explanation:

Monitor threats to your device, run scans, and get updates to help detect the latest threats.

One Microsoft Windows security feature that can help protect data is BitLocker Drive Encryption.

BitLocker is a full-disk encryption feature available in certain editions of Microsoft Windows, such as Windows 10 Pro and Enterprise. It provides protection for data stored on the system's hard drives or other storage devices.

By encrypting the entire drive, BitLocker helps safeguard the data against unauthorized access or theft, even if the physical drive is removed from the device. It uses strong encryption algorithms to convert the data into an unreadable format, ensuring that only authorized users with the appropriate encryption key or password can access and decrypt the data.

BitLocker also provides additional security features, such as pre-boot authentication, which requires users to enter a password or use a USB key to unlock the drive before the operating system loads. This prevents unauthorized users from accessing the encrypted data, even if they have physical access to the device.

Overall, BitLocker Drive Encryption is a powerful security feature in Microsoft Windows that can effectively protect data by encrypting entire drives and adding layers of authentication and protection against unauthorized access.

Learn more about Security here:

https://brainly.com/question/13105042

#SPJ6

In cell B13, create a formula without a function using absolute references that subtracts the values of cells B5 and
B7 from cell B6 and then multiples the result by cell B8. please help with excel!! I'm so lost

Answers

Answer:

The formula in Excel is:

=($B$6 - $B$5 - $B$7)* $B$8

Explanation:

Required

Use of absolute reference

To reference a cell using absolute reference, we have to include that $ sign. i.e. cell B5 will be written as: $B$5; B6 as $B$6; B7 as $B$7; and B8 as $B$8;

Having explained that, the formula in cell B13 is:

=($B$6 - $B$5 - $B$7)* $B$8

A group of computer scientists wants to create a fixed-length compression algorithm. The simplest way to achieve compression is to use a fixed-length code generator. The idea behind this type of code generator is to assign a fixed-length bit sequence to each symbol of the alphabet. As part of this group of computer scientists, your goal is to write a program to determine the alphabet used by the message to be compressed (set of different characters in the input message), and the frequency of each symbol in the alphabet, using conditionals, loops, and arrays.

Answers

Answer:

Here the code is given as follows,

Explanation:

OUTPUT:  

Message: AAAABBBCCDDDDDDDE  

Number of symbols in the alphabet = 5  

Characters in the alphabet = A,B,C,D,E  

Number of bits per symbol = 3  

Histogram showing the frequency of the symbols in the alphabet  

A | ****  

B | ***  

C | **  

D | *******  

E | *

Other Questions
At the fourth and final resource, one operator handles the product. No quality problems exist at this step and the processing time is 12 minutes per unit. For every unit of demand, how many units have to flow through the second step in the process 1. A sign that indicates that the child isn't using big body play and has moved towards fighting isA. playingB. sleepingC. tears (Correct)D. laughter2. To help a child reluctant to leave his mom, you can make all of these statements, except:A. "Would you like to look at your picture book to help you not miss your mom?"B. "Stop crying and go play." (Correct)C. "It makes you sad when your mom has to go to work, doesn't it?"D. "Would you like to go play with your friends at the dramatic play center?"3. Using _______ helps the child develop self-disciplineA. time-outB. verbal aggressionC. role modelingD. reasoning (Correct)4. A visual schedule can be used for all of the following exceptA. helping the child understand the expected behaviors on a field tripB. reducing misbehavior in the childC. replacing the teacher's reminders (Correct)D. reducing anxieties in a transition5. Physical aggression is one of the _______ misbehaviors because it can lead to physical harm.A. most dangerous (Correct)B. most acceptableC. least dangerousD. least complex6. Luke is riding a bike. Gene wants the bike and tries to push Luke off. Gene is showing which of the following types of aggression?A. VerbalB. AccidentalC. Physical (Correct)D. Interference7. Assigning children responsibilities like putting away their toys, handing out milk cartons, or helping a new child teaches themA. protective skillsB. prosocial behavior (Correct)C. how to countD. how to play8. Which of the following is not a goal of the caregiver when the child uses verbal aggression?A. Protect the self-esteem of the child who's on the receiving end of the verbal aggressionB. Teach children kinder words to express themselvesC. Teach the aggressive child that he or she doesn't have the right to hurt othersD. Play with both children until they learn to get along (Correct)9. When physical aggression occurs, you mustA. wait for the children to stop fighting and then write a stern note to the parents informing them of the misbehavior.B. sit all of the children down and give them a lecture.C. send both of the children to time out.D. stop the behavior and have the child who acted out sit by you while calming down (Correct)10. To help a child who's unhappy because she wants a toy, you can make all of these statements, exceptA. "When the timer goes off, you'll have a turn."B. "Would you like to play with another toy while you wait for your turn?"C. "We don't have time right now, but tomorrow I'll put your name down to go first. Would you like that?"D. "Too bad, there's no time for you to play with that toy right now." (Correct)11. To support a child's self-esteem, you can make all of these statements, except"You're never going to get that shoe tied and we have to hurry." (Correct)12. One way to manage a child who interferes with others is toHelp the child find a companion (Correct)13. To build a child's skills in self-regulation, you should make reasoning statements. Which of the following is not a good reasoning statement?You must put your sweater on because I said so (Correct)14. Children with visual impairments tend to be more _______ in social environments.Passive (Correct)15. Brian comes to the block area and knocks down a building that Tim and Jody are constructing. The most probable reason for Brian's misbehavior is that heIs seeking attention (Correct)16. A common cause of misbehavior in children isFrustration (Correct)17. All the following are basic needs of young children exceptEducation (Correct)18 Which of the following statements is correct?Children need adults to be responsible leaders (Correct)19. Which of the following is a characteristic of early intervention services?Early intervention is essential for children with visual or hearing impairments (Correct)20. Using _______ helps the child to develop self-discipline.Reasoning (Correct)21. Sometimes, misbehavior arises from a lack of attention from a loved one. One strategy that can help alleviate the behavior isHaving the loved one spend time with the child (Correct)22. Which of the following is true about children with autism spectrum disorder?They can find transitioning difficult (Correct)23. Which of the following is a true statement about toxic stress? It can be caused by abuse (Correct)24. Kicking, name-calling, and interrupting other children's play are all examples ofAggression (Correct)25. A visual poster can be used to help the child Learn to do a task independently (Correct)26. All of the following are goals of guidance, exceptCoercion (Correct)27. Calming techniques include all of the following exceptHitting a stuffed animal (Correct)I took the PF test twice first I got 90% I studied, then got 100% on the second test. All of these answers are 1000% correct, trust me I spent a lot of time on this. Hope this helps! C: Drag the correct word and the appropriate value to the box with each given interval Sunland Company reported a net profit of $8.15 per share and a dividend of $3.50 per share. If you buy shares of the stock at $94.85 per share, what is your dividend yield 2. Energy cycles through ecosystems because it returns to the sun. True or false Please help I will give 50 points What is the average snowfall in Tokyo? What causes the reaction rate to decrease as the reaction progresses? Write a paragraph on your favorite summertime activity. Identify the subject and predicate of each sentence. Include at least one compound subject and one compound predicate in your paragraph. what is 200x149 who can answer that for me i need help on this my teacher said i cant use couculater How many silicons atoms are there in 0.0356 moles of silicon factors that favour mining in South Africa 6.) You are standing 50 meters from a hot air balloon that ispreparing to take off. The angle of elevation to the top of theballoon is 28'. Find the height of the balloon. After completing my test, I wanted to all my answers spam and i report Maurice wants to create a variable to store the name of the second-best taco place. Maurice writes the line of code as 2ndtaco = "Tio Dan's" but gets an error message. What is the problem with Maurices code?A. There cant be an apostrophe ' in a variable name.B. The equals sign should be a dash.C. The type of variable wasnt specified.D. A variable name cant begin with a number. Which is the best sentence? Each of the candidates choose a subject area; mechanical, electrical, or HVAC. Each of the candidates chooses a subject area; mechanical, electrical, or HVAC. Each of the candidates choose a subject area: mechanical, electrical, or HVAC. Each of the candidates chooses a subject area: mechanical, electrical, or HVAC. What are the necessary components required to start the transcription of a gene? What needs to be added in order to create a protein?How does the length of the transcribed region impact the length of the gene (DNA)?You accidentally produce a gene (strand of DNA) after you have filled up all five of your protein shapes? How would you eliminate this DNA?Where does the negative transcription factor work?Why are there more than one positive transcription factors on each of the three genes? Compound X has the formula C8H14.X reacts with one molar equivalent of hydrogen in the presence of a palladium catalyst to form a mixture of cis- and trans-1,2-dimethylcyclohexane. Treatment of X with ozone follwed by zinc in aqueous acid gives a ketone plus formaldehyde (CH2=O). What is the structure of X? If the change in velocity increases, what happens to the acceleration during the same time period?Acceleration decreases.Acceleration increases.Acceleration becomes negative.Acceleration becomes steady. Select all of the sentences that include a double negative, according to the rules of Standard American English.Jim shouldnt have never gone without you.Im tired of being captain because nobody never does anything.I can hardly understand him.Carey wont scarcely have time to catch the bus.We have been to no ball games in over a month. How many rotations does each wheel make while Shawn is coasting down the ramp?