1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
15

Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme

nts needed to find out how many prime numbers (starting with 2 and going in increasing order with successively higher primes [2,3,5,7,11,13,...]) can be added before exceeding n. Associate this number with the variable k.
Computers and Technology
1 answer:
vivado [14]3 years ago
6 0

Answer:

def main():

   n = int(input('Enter the value of the variable n:'))

   k=2;

   totalSum = 0

   print('The list of the prime numbers are as follows:')

   while k <= n:

       totalSum = totalSum+is_prime(k)

       k=k+1

   print('Total sum of the prime numbers:',totalSum)

def is_prime(k):

   primeNumber = 0      

   i=1

   while i<=int(k):

       if (k % i) == 0:

           primeNumber = primeNumber + 1

       i=i+1

   if(primeNumber==2):      

       print(k)

       return k;

   else:        

       return 0;

main()

Explanation:

  • Run the while loop until k is less than n.
  • Determine if the variable k is prime then add it to the totalSum variable.
  • Increment the value of k by 1.
  • Create a function isPrime to check whether the number is prime  or not by determining the factors of k which can be found using the modulus operator.
  • Call the main function at the end.

You might be interested in
you have an ipv4 network that has two IPv6-only hosts that need to be able to communicate with each other. You want to implement
Soloha48 [4]

Answer:

Teredo tunnelling

Explanation:

The tunnelling method that will fit best in the situation is teredo tunnelling. The reason are embedded in its characteristics, they include;

Teredo tunneling has the following characteristics: Its tunnel endpoints are configured on hosts. The hosts are dual stack hosts and perform tunneling of ipv6 to send on the ipv4 network works through NAT the only solution that allows ipv4-only hosts to communicate with ipv6-only hosts is NAT-PT.

7 0
3 years ago
Ive tried everything how can i get my images back ?
anzhelika [568]
What do you mean did you refresh the page
3 0
3 years ago
Read 2 more answers
When should students practice netiquette in an online course? Check all that apply.
ser-zykov [4K]

Answer:

The answer to this question is given below in the explanation section. However, the correct answer is: student should practice netiquette in an online course when they are participating in online discussion board.

Explanation:

It is important for you as a student to recognize that the online classroom is in fact a classroom, and certain behaviors are expected when you communicate with both your peers and your instructors. These guidelines for online behavior and interaction are known as “netiquette”.

So, the correct option of this question is: students should practice netiquette in an online course when they are participating in an online discussion board. Because the discussion board is opened by the instructor/tutor, he constantly looking for student behavior throughout the discussion. so, students should use netiquette practice during the discussion in the online class.

However, other options are not correct because, in these options, there is not the presence of teacher/instructor. And, also noted that netiquette is practiced in online class by the student.  

8 0
3 years ago
Read 2 more answers
Suppose you are among those who believe that the NLRA should be transformed. What arguments support the claim that a complete ov
miss Akunina [59]

Answer:

See explanation below.

Explanation:

Note: This question is not complete. The complete question is therefore provided before answering the question follows:

Suppose you are among those who believe that the NLRA should be transformed. What arguments support the claim that a complete overhaul is necessary? What alternative models might be considered as a replacement for the NLRA model of exclusive representation?

The explanation of the answers is now provided as follows:

a. What arguments support the claim that a complete overhaul is necessary?

The adversarial nature of labor relations in the United States, which many claim is produced by the National Labor Relations Act's (NLRA)'s very existence, is the fundamental reason for its transformation. In a global economy, supporters of transformation say that adversarialism is undesirable for employees and employers because it makes representation and profit maximization more difficult. The principles of exclusive representation and majority support are specific aspects of the NLRA that promote adversarialism.

The fact that it is compulsory for a union to win the support of a majority of workers, the process of representation results into a tone of a "u versus. them". As a result, both sides try to make the other look bad in the eyes of the employees who will vote.

Based on the above, a  complete overhaul is necessary.

b. What alternative models might be considered as a replacement for the NLRA model of exclusive representation?

Giving nonmajority unions legal protection by requiring employers to negotiate with them is one alternative to replace the NLRA model of exclusive representation. Under this, the contracts would not cover all employees; only those who are union members would be covered.

Another alternative is that work councils could also be used to supplement or replace the certification process. Employee free speech rights, wrongful dismissal procedures, employee participation on business boards of directors, and the right to workplace information are all potential transformation factors that might be taken into consideration.

3 0
3 years ago
What are some other possible causes of an overheating laptop
ella [17]
Too much use, air vents are being covered, dust/dirt/other particles clogging the fan making it struggle too cool the laptop down, the internal battery may be low and struggling to function, etc.


I hope this helps you!
8 0
3 years ago
Other questions:
  • Presentation software allows business professionals to _____.
    14·2 answers
  • Which entity might hire a computer systems analyst to help catch criminals?
    14·2 answers
  • If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
    13·1 answer
  • Explain with a few sentences and using the terms sequencing, selections and loops how they
    9·1 answer
  • What wireless channel should I use?
    10·2 answers
  • A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
    15·1 answer
  • Algorithms for solving perimeter of a rectangle
    12·1 answer
  • Chapter
    15·1 answer
  • How does social media help?<br><br>i will give you the brainliest​
    13·2 answers
  • Consider the following code segment. How many unique new (do not count the starting process) processes are created? (you may wan
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!