Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.

Answers

Answer 1

Answer:

Lets us take k, m = 10, 40

q = 0

i = k

while i <= m:

   if int(i*0.5)*2 == i:

       q += 1

   i += 1


Related Questions

(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));​

Answers

Answer:

Computer Applications

true

Answer:

Computer Applications

Explanation:

true

It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Answers

Answer:

Communication.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Generally, the linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

How should you behave in an online academic environment?

Answers

Answer:

as u want lol

I think it's funny

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

don't underestimate anyone each person have their own unique skills

Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch​

Answers

Answer:

The program in Python is as follows:

TotalCost = int(input("Total cost: "))

if TotalCost <= 2000:

   print("Wall Clock")

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

else:

   print("Wrist Watch")

Explanation:

This gets input for total cost

TotalCost = int(input("Total cost: "))

If the total cost is up to 2000, print wall clock as the assured gift

if TotalCost <= 2000:

   print("Wall Clock")

If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

If the total cost is more than 10000, print wrist watch as the assured gift

else:

   print("Wrist Watch")

List 10 different products made from timber

Answers

Answer:

Bath towels.

Toothpaste.

Nail polish.

Makeup.

Disinfecting wipes.

Medications.

Paints.

LCD screens.

Houses

Buildings

Explanation:

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.

Which of the following is the MOST likely reason the mouse isn't working?

A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.

Answers

Answer:the usb mouse receiver is not plugged into the computer

Explanation:

In the case above, one can say that the USB mouse receiver is not plugged into the computer.

What is a USB mouse?

A USB mouse is known to be a tool that is often attaches to a computers USB port.

In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.

Learn more about USB mouse from

https://brainly.com/question/10847782

#SPJ9

PLEASE ANSWER ASAP

Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].

Answers

Answer:

ENQUIRE database.

Explanation:

I am not sure but I guess this is the answer.

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

Similarities between in line css and internal css

Answers

Answer:

inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.

Explanation:

queens

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Answers

Answer:

Implement BitLocker with a TPM

Explanation:

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.

Basically, there are two (2) main types of memory;

A. Read only memory (ROM).

B. Random access memory (RAM).

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.

What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?

Answers

Answer:

The file changes its location within your hard drive while the file itself remains unchanged

Explanation:

The file's location will change from C:\Users\username\Documents to

C:\Users\username\Pictures

What defines interactive media? The user must play a role in writing the content of the media. The user must do something that determines what happens next. The user must help design the overall look and feel of the presentation. The user must provide feedback after using the media.

Answers

Answer:

What Is Interactive Media?

Interactive media is a method of communication in which the program's outputs depend on the user's inputs, and the user's inputs, in turn, affect the program's outputs. Simply put, it refers to the different ways in which people process and share information, or how they communicate with one another. Interactive media allows people to connect with others—whether that's people or organizations—making them active participants in the media they consume

Answer:

The user must do something that determines what happens next.

It is B.

How computer is important in our life​

Answers

Answer:

Computers are important in our lifes to keep us safe if theres a hurricane tornado or even a blizzard.

Another reason there important is so we can stay in contact with are family

and friends incase of an emergency.

Lastly there important because they can help us get to a place or destination

by using a gps.

Hope it helps✌✌

Answer:

computer is important because we can use it for playing games. watching videos listen music etcetera

Which vendor owns the software platform Fusion?
A.
Microsoft
B.
Apple
C.
SAP
D.
Oracle

Answers

Answer: D

Explanation:

D. Oracle owns the software platform Fusion

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variable names, and lowercase for constants and functions c. lowercase for variable names and constants, and uppercase for functions d. uppercase for variable names and constants, and lowercase for functions

Answers

Answer:

b) uppercase for variable names, and lowercase for constants and functions  

Explanation:

Given

Programming language: prolog

Required

The case type for variables, constants and functions

In prolog,

Variable names begin with uppercase

e.g. Name, NAME

While constants and functions begin with lowercase

e.g. name, addnumbers()

Hence, (b) is correct

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

Answers

Answer:

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

  3.1 Create bottle

  3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

See attachment for flowchart

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

  3.1 Create bottle

This increments the number of bottles by 1

  3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?

Answers

Answer:

Platform as a Service (PaaS).

Explanation:

Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Basically, cloud computing comprises three (3) service models and these include;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

In this scenario, the type of service Don's company signed up for is called Platform as a Service (PaaS).

You notice a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
A. The smartnet
B. Internet of smart devices
C. *Internet of things*
D. Dynamic environment

Answers

Answer:

*Internet of things*

Explanation:

A network with multiple physical smart devices are known as things on the network

Câu 1: Đất trồng là môi trường?

A. Cung cấp chất dinh dưỡng, ôxy

B. Giúp cây đứng vững

C. Cung cấp chất dinh dưỡng, ôxy, nước

D. Câu B và C

Answers

Answer:

D

Explanation:

You install Windows 10 on a new computer. You update the video card driver and restart the computer. When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result. You need to configure the video card driver. What should you do first

Answers

First, you need to cut off power to the PSUHit the switch on the back of the PC to turn off supply to the PSU. Extract the side panel (usually held on by two screws on the rear)If you do not already have a GPU installed, skip to Step 7.

3. Remove the screws holding the GPU in on the rear bracket. ...

4. Unlock the PCI-e slot clip.

5. Remove the GPU by lightly pulling on the card.

6. Hover the GPU over PCI-e slot.

7. Push down on the GPU to slide the connector into the slot.

8. Ensure the secure lock clicks into place.

9. Screw the rear bracket down to secure the card to the chassis.

10. Connect any required PSU cables.

11. Reattach the side panel,

Now, all you need to do is to plug in the display connectors on the rear of the case, whether they're DisplayPort, HDMI, DVI, or VGA. After that, hit the PSU power switch and boot up Windows. If the PC does not turn on or no signals get sent to the monitor, we'll need to double-check that all cables are connected correctly (both inside and on the rear of the PC), and the GPU is seated properly in the PCIe slot.

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.

Answers

Answer

Wash your hands thoroughly before using the computer.

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

The place on the computer where information is stored temporarily so the processor can access it quickly is called what? Memory Kernel Mode Driver

Answers

Answer:

The answer is Memory

list out the memory components used by different generation of computer​

Answers

Answer:

here's your answer mate!

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

1956 – 1963: Second Generation – Transistors. ...

1964 – 1971: Third Generation – Integrated Circuits. ...

1972 – 2010: Fourth Generation – Microprocessors.

Explanation:

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

1956 – 1963: Second Generation – Transistors. ...

1964 – 1971: Third Generation – Integrated Circuits. ...

1972 – 2010: Fourth Generation – Microprocessors.

What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations

Answers

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591

True or false we can used virus not use pirated software and programs ​

Answers

Answer:

False i guess

what is computer virus?​

Answers

Answer:

A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.

Answer:

A computer virus is a software program that can generate multiple copies of itself. Computer viruses are categorized by their infection targets.They are of the following types :-

boot sector virusesfile viruses
Other Questions
Can you define why nepal is known as peace country.. PLEASE HELP IM TAKING AN ASSESSMENT what situation allowed authoritarian governments to flourish in the 1920s? Use the distributive property to remove the parentheses.-5(6u - 4w-2) Sort each phrase to the country it best describes? geography what is the meaning of evaluate[tex] {( - 7)}^{ \frac{5}{3} } \times {( \frac{1}{56} )}^{ \frac{5}{3} } [/tex]please explain Manuel bought a set of tracks for $35 and 8 individual train cars,which were priced the same. If the total cost was $155, what was theprice for each train car?Please help In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:What is your name? AmandaHow old are you? 15Hello Amanda! You were born in 2005. 1Select the correct answer.Simplify the following expression.O A.OB. 12Oc. 1OD.64ResetNext I need two examples of Solve a proportion with a mixed number in one of its numerators. SHOW ALL WORK!!!!!!!!!!!! 3. Where can you find out more information about a piece of art?O Social mediaO Museum brochuresACO Museum audio toursAll of the above What is the slope of the line shown below?. - 17(5, 1)XO B. -4-55(-3,-1)O c. 4-5O D.14 Segment addition and midpoints. what does psychodynamic psychotherapy mean? The funniest thing my mother does is? Daniel paid interest of 1,020 in 5years at12%per annum on a loan. Hw much did he borrow 1.If a number is chosen at random from the integers 5 to 25 inclusive , find the probability that the number is a multiple of 5 or 3.2.Good Limes =10Good Apples = 8Bad Limes = 6Bad Apples 6The information above shows the number of limes and apples of the same size in a bag . If two of the fruits are picked at random , one at a time without replacement .Find the probability that :I. Both are good limesII.Both are good fruitsIII. One is a good apple and the other a bad lime An empty parallel plate capacitor is connected between the terminals of a 18.8-V battery and charges up. The capacitor is then disconnected from the battery, and the spacing between the capacitor plates is doubled. As a result of this change, what is the new voltage between the plates of the capacitor If your body lacks enzymes that break down carbohydrates, it would be unable to get __A__ for energy production. If you lacked the enzyme to digest proteins, you may not absorb enough __B__. Please answer srep by step if can!!