Answer:
#here is code in Python.
#read the value n from user
n=int(input("enter the value of n:"))
#variable to store the total sum
sum_n=0
for i in range(1,n+1):
# find the sum of series
sum_n=sum_n+1/i
#print the sum
print("sum of the series is: ",sum_n)
Explanation:
Read the value of n from user. Create and initialize a variable sum_n with 0. Run a for loop to calculate sum.Initially sum_n is 0, then for value of i=1 1/i will be added to the sum_n.Then in next iteration for i=1, 1/2 added to sum_n. Similarly loop will run util i equals to n.Then sum_n will store the sum of the
series.
Output:
enter the value of n:5
sum of the series is: 2.283333333333333
I believe the answer is:
1. Prepare the data
2. Select all data
3. Use the copy command
4. Open new file
5. Use the paste command
I really hope this helps! Good luck!
There are two main types of encryption - <span>symmetric and asymmetric.
Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the
key, they can read the message.
What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two
smaller keys. One of the keys is public and one is kept private.
A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them
Answer:
The answer is "Public Cloud computing".
Explanation:
It is a type of technology that focusing on domain-specific resources rather than using dedicated servers or intelligent machines. All services are provided as well as used throughout the Network and per user are paid, and certain options were wrong which can be described as follows:
- In option 1, it is used to describe the details, it doesn't store data.
- In option 2, It is used in the organization.
- In option 3, It is used for courts or legal documentations.
True, it is located on the border of Nepal and Tibet.