1)write a python program to check wheter the given number is even or odd
2) write a python program to add any 5 subjects makrs, find sum and average (average=sum/5)
3)write a python program to print numbers from 1 to 100 using loops

Answers

Answer 1

Answer:

n = 16

if n%2:

 print('{} is odd'.format(n))

else:

 print('{} is even'.format(n))

m1 = 5

m2 = 4

m3 = 6

m4 = 8

m5 = 9

sum = m1+m2+m3+m4+m5

average = sum/5

print("The sum is {}, the average is {}". format(sum, average))

for i in range(1, 101): print(i, end=",")

Explanation:

Above program does all three tasks.

Answer 2

Answer:

1) num1 = int(input("Enter the number to be checked: "))

if num1%2==0:

   print("Your number is an even number!")

else:

   print("Your number is not even!")

2) maths = int(input("Enter your maths mark: "))

english = int(input("Enter your english mark: "))

social = int(input("Enter your social mark: "))

science = int(input("Enter your science mark: "))

computer = int(input("Enter your computer mark: "))

Sum =  maths + english + social + science + computer

average = Sum / 5

print("Sum of your marks are:",Sum)

print("average of your marks are:",average)

3) num = 0

while num <= 99:

   num+=1

   print(num)

Explanation:

Welcome.


Related Questions

________ software can be copied, modified, and redistributed without paying a fee.

Answers

Open source software can be copied, modified, and redistributed without paying a fee.

The types of software license.

In Computer technology, there are four (4) main types of software programs based on usage rights and these include the following:

Shareware softwareFreeware softwarePurchased licenseOpen source software

What is an open source software?

In Computer technology, an open source software can be defined as a terminology which is used to describe a type of software that all end users can use or modify for free without paying any license fee (money).

Read more on software here: brainly.com/question/25703767

#SPJ1

What is it called when a partition is formatted with a file system and assigned a drive letter?

Answers

When a partition is formatted with a file system and assigned a drive letter, it is called a volume.

What is a hard-disk drive?

A hard-disk drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed.

What is a partition?

Partition can be defined as a terminology which is used to describe the division of a hard-disk drive into two or more fragments.

In Computer technology, a volume can be defined as a partition that is formatted with a file system and then, assigned a drive letter on a computer system.

Read more on hard-disk partition here: https://brainly.com/question/14987710

#SPJ1

What term did don norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?.

Answers

The word "story" was described by Don Norman as a conceptual model. Conceptual models are abstract, psychological representations of ideal task performance.

People use conceptual models subconsciously and intuitively to systematize processes. For instance, it's a common mental model to schedule appointments using calendars and diaries. Developers can create software that is matched to users' conceptual frameworks by understanding how prevalent and useful conceptual models are.

By creating interfaces and applications that reflect conceptual models, designers build on preexisting frameworks and knowledge to make it easier for users to learn how to use the new product.

Learn more about conceptual models https://brainly.com/question/20514959

#SPJ4

The arp protocol is used to determine what address of a node when what address is known?

Answers

The arp protocol is used to determine address of a node when what address is known ARP cache

Address resolution protocol is used to mapping the system address to the internet protocol address. The address resolution protocol is used to translate a system address into an IP address.

In a local area network, the Address Resolution Protocol (ARP) converts a dynamic IP address to a fixed physical machine address (LAN). A media access control (MAC) address is another name for the actual machine address.

The Domain Name System (DNS), an Internet directory service created to both allow local administrators to create and manage the records that resolve server names to IP addresses and to make those records accessible, is the method most frequently used in the TCP/IP protocol to resolve server names to network addresses.

Learn more about ARP:

https://brainly.com/question/12976506

#SPJ4

How is everyone doing this fine day?

100 POINTS!

What are the codebase of a website?

Answers

Answer: I'm doing great! how about you?

Explanation:What are the codebase of a website?:

A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.

Hope this helps!

Answer:

source control repository.

why did it get taken down??

Explanation:

write pseudocode for a program that asks the user for length and width of a rectangular room, and then displays the room’s area the program must multiply the width by the length in order to determine the area.

Answers

The pseudocode for a program that asks the user for length and width of a rectangular room, and then displays the room’s area

The Pseudocode

Set width to zero

Set length to zero

Set area to zero

Print “Enter the width: “

Read width

Print “Enter the length: “

Read length

area = width * length

Print area

The above pseudocode is a simple to follow and understand sequence of steps to create a program.

First it sets the width, length and area to zero and then requests an input from the user before it displays and calculates the area which is width * length.

Read more about pseudocodes here:

https://brainly.com/question/24953880

#SPJ1

With the subscription model of software licensing, companies pay for software solely during the time an employee is actively using it. true false

Answers

The statement "With the subscription model of software licensing, companies pay for software solely during the time an employee is actively using it." is false.

What is software licensing?

Software licensing is documentation or law that is made for the redistribution of that software. It is a legal document. This document is used for the use of the software.

With licensed software, there is limited use of that software, and only those who have permission will use this software. The statement is against the licensing, so it is false.

Therefore, the statement is false.

To learn more about software licensing, refer to the link:

https://brainly.com/question/24288054

#SPJ1

Which procedure specifies what resources users can access and the tasks they can perform on a network?

Answers

The authentication process defines which network resources users can access and what operations they can carry out.

Authentication is the process of ensuring that someone or something is, in fact, who or what it claims to be. Authentication technology restricts access to systems by comparing a user's credentials to those kept on a data authentication server or in a database of authorized users. System security, business process security, and corporate data security are all ensured via authentication.

There are various types of authentication. For identifying purposes, users are frequently given a user ID. Authentication occurs when the user submits credentials, like a password that precisely matches their user ID. In single-factor authentication, a user ID and password are required (SFA).

Learn more about authentication https://brainly.com/question/28398310?

#SPJ4

A(n) ____________________ is a program used to create and edit plain text files.

Answers

Answer:

A text editor

Explanation:

a hacker writes some programming code that will cause a computer to behave in an unexpected and undesirable manner, but disguises it as something else to make it difficult to detect. which attack vector has this attacker chosen to use?

Answers

Since the hacker writes some programming code that will cause a computer to behave in an unexpected and undesirable manner, the attack vector that this attacker has chosen to use is known to be virus.

What is a Computer virus?

A computer virus is known to be a kind or a type of computer program/software that if it is said to be executed, it tends to  replicates itself and by so during it alters aa well as modify other computer programs as well as also insert its own code.

Note that when the work of  replication is said to be done on that system, the affected aspect of the computer system are then said to be "infected" with what we call a computer virus and this is known to be a metaphor that was obtained from biological viruses.

Therefore, based on the above, one can say that since the hacker writes some programming code that will cause a computer to behave in an unexpected and undesirable manner, the attack vector that this attacker has chosen to use is known to be virus.

Learn more about computer virus from

https://brainly.com/question/26128220

#SPJ1

what term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

Answers

A terminology which describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization is an extranet.

What is an extranet?

An extranet can be defined as an external company or organizational network which is designed and developed to be used by individuals who work for a different organization. This ultimately implies that, an extranet is typically used for providing the employees of different organizations with easy access to data or information.

In Computer networking, the end users of an extranet have the ability to access a company's or organization's entire internet resource.

Read more on extranet here: https://brainly.com/question/15420829

#SPJ1

Complete Question:

What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

extranet

cloud

BYOD

quality of service

Which of the following best describes the function performed the command a MOD b in the CollegeBoard AP Computer Science Principles Pseudocode?
(A): It finds the remainder when a is divided by b.
(B): It finds the remainder when b is divided by a.
(C): It multiplies a and b.
(D): It divides a by b.

Answers

The function performed by the command a MOD b in the College Board AP Computer Science Principles Pseudocode is it divides a by b. The correct option is D.

What is pseudocode command?

Pseudocode is understood by all types of programmers. It allows the programmer to focus solely on the algorithm portion of the code development. It cannot be compiled into a working program.

a MOD b When an is divided by b, it evaluates to the remainder. Assumes a and b are both positive integers.

It is quite often abbreviated as mod or represented by the symbol % in writing. Where a represents the dividend, b represents the divisor (or modulus), and r represents the remainder.

Thus, the correct option is D.

For more details regarding pseudocode command, visit:

https://brainly.com/question/17442954

#SPJ1

What type of structure is used to provide instructions to infected bot computers?

Answers

The type of structure that is used to provide instructions to infected bot computers is command and control. The correct option is A.

What is a bot computer?

A bot, short for robot and also known as an internet bot, is a computer program that acts as an agent for another program or simulates human activity.

Bots are typically used to automate specific tasks, which means they can run without specific human instructions.

When malware containing the programming to take over the computer is installed on its target, a bot is created.

Command and control structures are used to provide instructions to infected bot computers.

Thus, the correct option is a.

For more details regarding bot computers, visit:

https://brainly.com/question/14039801

#SPJ1

Your question seems incomplete, the missing options are:

a. command & control

b. bot herder

c. client-server

d. hive 1 points

Which of the following is NOT a common form of malware? Select all that apply.
A. Adware
B. bloatware
C. Spyware
D. ransomware

Answers

Answer: B. Bloatware

Explanation:

Technically, bloatware is not classified as malware, although some people argue it should be.  Bloatware is not meant to be malicious software of any sort, but it could just be something that a system integrator (Dell, HP, Lenovo, etc.) includes in their hardware, or it could be extra software bundled with a main piece of software you want that has to be removed after installing the main application.  Also, Microsoft started downloading games such as CandyCrush to your computer without your say-so, and that is another example of bloatware.  Basically, bloatware is just a term for unwanted preinstalled software.

your colleague has 15 years of log files full of performance data. the data needs to be sorted, but the file sizes are so big that it's impossible to load them all into memory at once. your colleague decided to use a merge sort to divide the data into smaller chunks, sort them recursively, then merge results to produce the final sorted file with all data.

Answers

Using the knowledge of computational language in python we can write the code as data into smaller chunks, sort them recursively, then merge results to produce the final sorted file with all data.

Writting the code:

import java.util.*;

public class Main {

public static void merge(String data)

{

// the input is String data which holds to sorted array separated by semicolon

// split the data string based on the semicolon in the variable arr

// arr[0] represents first sorted array and arr[1] represents second one.

String arr[]=data.split(";");

if(arr[0]==null||arr[1]==null) {

System.out.println(data);

return ;

}

String sorted_result=""; // to store the sorted alhanumeric character separated by comma

String pair=""; // to store the comparision pair

int i=0,j=0;

while(i<arr[0].length()&&j<arr[1].length())

{

// we get the character denoted by first and second in a and b variable

char a=arr[0].charAt(i);

char b=arr[1].charAt(j);

if(a<b) // if the character of first array is smaller than second

{

// we are increamenting i by 2 because there is comma character available at i+1

// so for getting next character we increament by 2

// also add pair of comparision between (a,b)

sorted_result+=a+",";

pair+="("+a+","+b+") ";

i=i+2;

}

else

{

// we are increamenting i by 2 because there is comma character available at i+1

// so for getting next character we increament by 2

// also add pair of comparision between (a,b)

sorted_result+=b+",";

pair+="("+b+","+a+") ";

j=j+2;

}

}

// if there is remaining charcater in fiest array then simply copy it the sorted_result

while(i<arr[0].length())

{

char a=arr[0].charAt(i);

sorted_result+=a+",";

i+=2;

}

// if there is remaining charcater in fiest array then simply copy it the sorted_result

while(j<arr[0].length())

{

char b=arr[0].charAt(j);

sorted_result+=b+",";

j=j+2;

}

// remove the extra comma inserted at the end

sorted_result=sorted_result.substring(0, sorted_result.length()-1);

System.out.println(sorted_result);

System.out.println(pair);

}

public static void main(String[] args) {

String input1="1,4,7,8;2,3,5,6";

merge(input1);

System.out.println();

String input2="H,L,M,P,P,R,S,b,d,i,n,o,o,p,s;1,5,5,6,7,8,C,U,V,V,W,f,h,r,s";

merge(input2);

System.out.println();

String input3="B,E,E,F,J,N,O,P,U,W,D;G,J,L,N,R,S,V,X,Y";

merge(input3);

}

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

At the most basic level, computers work through three stages (input, processing, and output) known as the?

Answers

Answer:

The computing process.

Explanation:

Hover the mouse pointer over a button and _____ displays with information about the button.

Answers

Hover the mouse pointer over a button and task bar displays with information about the button.

What is taskbar on computer?

The taskbar on a computer screen is known to be a term that connote the slim strip of icons, that is said to be normally found at the bottom of the screen.

It is known to be one that shows a user the said  windows that they are are currently open and that allows a user to be able to control functions some functions..

Hence, Hover the mouse pointer over a button and task bar displays with information about the button.

Learn more about mouse from

https://brainly.com/question/1917667

#SPJ1

6. Which of the following is the common measurement of unit of computer memory? (a) IQ (b) Byte (c) Terabyte (d) Gigabyte ​

Answers

Answer:

(b) Byte

Explanation:

connecting which platform to analytics allows you to direct experiments toward specific audiences to test variants of your web pages?

Answers

Connecting "G0ogle Optimize" platform to Analytics allows you to direct experiments toward specific audiences to test variants of your web pages.

What is data analytics?

Data analytics can be defined as a field in Computer science that involves inspecting, transforming, analyzing, and modelling data with the sole aim of discovering useful information, providing insights, and creating informed conclusions, so as to support decision-making with regards to a resource or product.

In Computer technology, an example of the use of data analytics is when a search engine such as G0ogle continually adjusts its algorithms as more data are entered into its servers by end users.

Read more on data analytics here: brainly.com/question/27853454

#SPJ1

Complete Question:

Connecting which platform to Analytics allows you to direct experiments toward specific audiences to test variants of your web pages?

G0ogle Optimize

Modify event

Search Console

Firebase

Which mysql component retains data blocks from storage in main memory for possible reuse?

Answers

Buffer manager is MySQL component retains data blocks from storage in main memory for possible reuse. The buffer manager is the component in charge of allocating buffer space.

The buffer manager responds to all requests for database blocks. If the block is already in main memory, the requester is provided the address in main memory. In the absence of that, the buffer manager must read the block from disk, maybe displacing another block if the buffer is full, and then provide the requester with the address in main memory.

To deliver quality service, the buffer manager must employ certain advanced approaches.

Learn more about MySQL https://brainly.com/question/13267082

#SPJ4

Writing a story with proper sequence and organization is important because. it helps the reader understand the story.stories can be confusing.it helps the reader match the pictures to the text.stories can be in any order

Answers

Writing a story with proper sequence and organization is important because it helps the reader understand the story.

What is Storytelling?

This refers to the narration that is done to show the sequence of action in a scene.

Hence, we can see that Writing a story with proper sequence and organization is important because it helps the reader understand the story and this is known as outlining.

The use of outlines and plots when writing a story is important as the reader is able to follow the sequence of action and better understand them.

Read more about storytelling here:

https://brainly.com/question/24292088

#SPJ1

With segmented memory allocation, each job is divided into several ____ of different sizes, one for each module that contains pieces that perform related functions.

Answers

With segmented memory allocation, each job is divided into several Segments of different sizes, one for each module that contains pieces that perform related functions.

What is segmented memory allocation?

The term segmented memory allocation is known to be a kind of operation that is often done in an Operating Systems.

Note that  Segmentation is said to be a form of memory management method where the memory is said to be shared into the variable size parts.

Therefore, With segmented memory allocation, each job is divided into several Segments of different sizes, one for each module that contains pieces that perform related functions.

Learn more about memory management  from

https://brainly.com/question/27993984
#SPJ1

while working in a call center, you receive a call from latisha, who says she can no longer access the online reporting application for her weekly reports through her web browser. you ask your manager, and she tells you that the server team changed the application's url during an upgrade over the weekend. she asks you to make sure all the other technicians are aware of this change. what is the best way to share this information?

Answers

The best way to share this information is to update the knowledge base article that has the application's URL in the call tracking application.

Check more about Uniform Resource Locators  below.

What does Uniform Resource Locators  means?

This is known to be called the Uniform Resource Locators and this is one that is seen on the Internet.

Note that the addresses of the internet are said to be called URLs (Uniform Resource Locators).

A given webpage's URL is one that has a domain name  and it is one that is in a domain category as well as has a subdomain and path

Therefore, The best way to share this information is to update the knowledge base article that has the application's URL in the call tracking application.

Learn more about  application from

https://brainly.com/question/24264599
#SPJ1

five example of hybrid computer?

Answers

Answer:

gasoline stationelectrocardiogram machine ultrasound machine monitoring machine research and production industries

Explanation:

hope this is useful for u

patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. which of the following apps should she use for cloud storage?

Answers

The apps that Patricia need to be using based on the above is known to be Drop box.

Check more about the meaning of drop box below.

What is the Drop box?

There are different kinds of modern day technology. This  Drop box is known to be a kind of Software that is said to be a file service  which is known to be operated by the American company Drop box company and it is one that serves a special purpose.

It is one that has its  headquartered  in California, U.S. and note that this software is one that offers cloud storage as well as file synchronization, individual cloud, and also the function of client software.

Therefore, based on the above, The apps that Patricia need to be using based on the above is known to be Drop box because it is one that she can use with the cloud storage.

Learn more about Drop box from

https://brainly.com/question/27327971

#SPJ1

Lab 1-4: testing mode: identify parts inside a laptop and an all-in-one computer

Answers

The parts that can be found inside a laptop and an all-in-one computer include the following:

Random access memory (RAM).Read only memory (ROM).Central processing unit (CPU).Motherboard BIOS chip.CMOS battery.

The types of computer.

Generally, there are two (2) types of computer and these include the following:

Desktop computerLaptop computer

What is a laptop?

A laptop can be defined as a small, portable type of computer that is designed and developed by embedding both a mousepad, processor, and keyboard on it. Additionally, a laptop is usually light enough to be placed on an end user's lap while he or she is working, traveling, gaming, etc.

What is an all-in-one computer?

An all-in-one computer can be defined as a form of desktop computer that is designed and developed to have each of its internal hardware component within the same case as the monitor, except for peripheral components (external devices) such as a mouse and keyboard.

In Computer technology, the parts that can be found inside a laptop and an all-in-one computer include the following:

Random access memory (RAM).Read only memory (ROM).Central processing unit (CPU).Motherboard BIOS chip.CMOS battery.

Read more on all-in-one computers here: brainly.com/question/4581809

#SPJ1

Which device is typically used to allow communication among two or more networks?

Answers

A router is a device that is typically used to allow communication among two or more networks.

A router can be described as a hardware device that accepts instructions from a network and then passes on the network packets to other networks hence forming the basis for communication between a number of networks.

A router is composed of two units which are named as control plane and the forwarding plane. The control plane provides the direction of passage of the data packet while the forwarding plane receives the data packets and sends them to the directions instructed by the control plane.

Routers also have the ability to determine which packet should be taken care of first if the router is assigned to control multiple networks.

Routers also perform the function of protecting networks from any malicious activities or threats.

To learn more about routers, click here:

https://brainly.com/question/27960570

#SPJ4

A company has drafted an insider-threat policy that prohibits the use of
external storage devices. Which of the following would BEST protect the
company from data exfiltration via removable media?
O Implementing a group policy to block user access to system files
O Monitoring large data transfer transactions in the firewall logs
1 point
Blocking removable-media devices and write capabilities using a host-based security
tool
Developing mandatory training to educate employees about the removable media
policy

Answers

The option that is a form of protection that the company can do from data exfiltration via removable media is by Blocking removable-media devices and write capabilities using a host-based security tool.

What is data exfiltration?

A data exfiltration is known to be a term that connote  the theft or the unauthorized deletion or transfer of any kind of data from a device.

Note that Data exfiltration is one that is said to be involved when a cyber criminal is known to be stealing data from any kind of personal or corporate devices.

These data can be obtained from computers as well as mobile phones, through a lot of cyberattack methods.

Therefore, The option that is a form of protection that the company can do from data exfiltration via removable media is by Blocking removable-media devices and write capabilities using a host-based security tool.

Learn more about data exfiltration from

https://brainly.com/question/28412250

#SPJ1

without a wired or optical connection, fixed wireless and fixed optical companies deliver high-speed data (hsd) to the customer

Answers

Fixed wireless and fixed optical companies deliver high-speed data (hsd) to the customer through the use of a radio transmitter that is placed at the central office (CO).

There can be a connection to the internet with which a customer can be able to link up to an ISP ( Internet services provider)

What is a fixed wireless network?

Fixed wireless networking is known to be a term that connote the operation of wireless machine or tech in fixed locations.

It can be from the homes or  offices. Therefore, Fixed wireless and fixed optical companies deliver high-speed data (hsd) to the customer through the use of a radio transmitter that is placed at the central office (CO).

Learn more about wireless from

https://brainly.com/question/21286395

#SPJ1

Without a wired or optical connection, fixed wireless and fixed optical companies deliver high-speed data ( HSD) to the customer?

A network in which communication passes from one member to the next in a sequintial pattern is referred to as a?

Answers

A network in which communication passes from one member to the next in a sequential pattern is referred to as a chain network.

A network that facilitates conveyance and conversation among staff members or a team is known as the communication network. It serves as a means of communication within an organization. Different types of communication networks include wheel network, Y network, chain network, circle network, and all channel or star network.

The chain network includes a step-by-step process where the information flows vertically upwards or downwards. This type of network is usually used in organizations with several levels of authority and administration. As compared to other networks, the chain network is not so fast as the message has to pass gradually from the top authority level step by step to the lowest level.

To learn more about chain networks, click here:

https://brainly.com/question/16237495

#SPJ4

Other Questions
c. We _____English now I need to write a speech on, Why is Community important? it has to be a clear & creative one. PLEASE HELP PLS Write a 250 word essay explaining the relationship between nutrition quality of life and disease describe the roles that family members play in promoting a healthy lifestyle finally discuss how family roles can relate to healthy behaviors Why is it important to study the past essay Based on claude steele and eliot aronson's research on stereotype threat, we should be especially concerned about instructions for standardized tests if they? Place the following parts of the chemical reactions in the appropriate sequence to show synthesis of a polymer and the breakdown of a polymer. For the first series (steps 1-5), your task is to start with a monomer and end with a larger polymer made of four monomers, demonstrating the process of dehydration reactions. For the second series (steps 6-9), you are to start with a polymer made of four monomers and show how it can be broken down into individual monomers by the process of hydrolysis. a dependent, confused patient is being given a bedpan. how can the nurse best ensure the patients safety? Describe an example of a language game (or the conversation and the events that were occurring during this conversation) that you've recently engaged in. in your description, write down some of the words or phrases of what was said by the people who were playing this game. describe and name the form of life (or set of relationships, words, actions, and objects) that this language game was part of. what social utility, or purpose, did this language game serve for the people that were engaging in it that you mentioned in the beginning? what cultural values were being expressed by the words that were spoken in this language game? can someone help me really quick recent european society of breast imaging (eusobi) guidelines recommend that women 50-70 years old with extremely dense breasts be offered dce-mri every two to four2-4 years Most rivers carry silt, which is a mixture of small particles Write a paragraph on Electronic Waste and Environmental Pollution~ Studies examining the education level of inmates in correctional facilities found that many inmates had attained a(n) ________ _________ level of education or less. What are two examples of chemical weathering?(1 point)abrasion and carbonationabrasion and carbonationhydrolysis and oxidationhydrolysis and oxidationoxidation and frost wedgingoxidation and frost wedgingexfoliation and hydrolysis 1. The y-intercept of the graph of an equation will _____have a y-coordinate of 0.2. If a linear equation contains only one variable, its graph will ______ pass through the origin.3. True or false: The graph of Ax + By = 0 will always pass through the origin. You are backpacking through Europe. You have 30 days until your flight home, but you have spent allhave found a hotel that is willing to accept one link per night for payment of room and board. However,the managerthat they want one gold link in payment for every link they cut. How many links will you have whenyou call home? which of the following best explains the picture Fill in the table using this function rule.y=5x+3 Can someone help me Im confused When a sample accurately reflects the characteristics of the population, it is said to be _____.