1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stira [4]
3 years ago
9

Compute the sum of all integers that are multiples of 9, from 1 to 250. Enter your result of your computation in the text box be

low
Computers and Technology
2 answers:
shepuryov [24]3 years ago
8 0

The pseudocode to find the sum of all integers that are multiples of 9, from 1 to 250.

totalSum = 0

for i from 1 to 250{

     if i is divided by 9 and remainder is 0{

           totalSum  = totalSum + i;

     }

}

print(totalSum)


in python language the code will be

totalSum = 0

for i in range(1,250):

    if i%9==0:

       totalSum += i



If you will run the program , the answer would be 3402.

Ne4ueva [31]3 years ago
4 0

Answer:

To find the sum of all integers that are multiples of 9 from 1 to 250, first initialize the total sum with zero (0). After this, define for loop from 1 to 250 so that all the integers from 1 to 250 will be checked. Now, define the condition if the number is divisible by 9 or not. If number is divisible by 9 then add the integer with total sum. This process continues till the number 250. Thus, the total sum is the sum of the multiples of 9 from 1 to 250.

Further Explanation:

Following is the python program to calculate sum of the multiples of 9 from 1 to 250.

Code:

<em>sum = 0 </em>

<em>for i in range(1,250): </em>

<em>if i%9==0: </em>

<em>sum = sum+ i </em>

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

Answer details:

  • Grade: Middle School
  • Subject: Computers and Technology
  • Chapter: Python Programming

Keywords:

Python, JAVA, C++, C, compute, sum, all integers, multiples of 9, from 1 to 250, result, text box, below, sum, range

You might be interested in
BI is an umbrella term that combines architectures, tools, databases, analytical tools, applications, and methodologies. b. BI i
torisob [31]

Answer:

architectures, tools, databases, analytical tools, applications, and methodologies

Explanation:

There are several features of business intelligence. It is a content-free expression, which means that it means different things to different people, and not same thing as suggested by Option B. While its major objective is to enable or allow easy access to data, it is not limited to data and IT only as suggested by Option C. Instead it provides managers of businesses with the ability of analysis of data. And finally it helps in the transformation of data to information and to action, which is contrary to the suggestions of Option D. Hence the first option is the only correct option.

3 0
3 years ago
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Explain why a special strategy, such as SQRW or KWL, should be used to take notes from a text.
Morgarella [4.7K]

You have an upcoming exam and you are confident that you have read all your books and believe you know your stuff down cold. Somehow, after sitting for your exam, you fail. To avoid this from happening again, you can use methods like SQRW or KWL to make sure that you get a better grade. Each of these techniques are initials that stand for “Survey”, “Question”, “Read”, and “Write” (SQRW) and “Know,” “Want to Know,” and “Learned” (KWL) respectively. People who make the most out of these two strategies will understand what they read and prepare notes of what they learned. These notes will come in handy when sitting for an exam. KWL, specifically, help student become better versions of themselves and improve in reading expository text.

4 0
3 years ago
I Need Help with 6.1.3 circles in squares in codehs
ycow [4]

The program below is able to calculate the area of a circle inscribed in a Square.

<h3>What is a program?</h3>

A program is a set of instructions given to the computer with specific end results in mind.

<u>Sample program in Java

</u>// Java Program to find the area of

// an inscribed circle in a square.

import java.io.*;

class GFG {

   

   static double PI = 3.14;

   

   // Function to find area of an

   // inscribed circle in a square.

   static double areaOfInscribedCircle(float a)

   {

       return ( PI / 4 ) * a * a;

   }

   // Driver code

   public static void main (String[] args)

   {

       float a = 8;

   

       System.out.println("Area of an inscribed"

       + " circle: " + areaOfInscribedCircle(a));

   }

}

Learn more about programs at :
brainly.com/question/1538272
#SPJ1

5 0
2 years ago
Which type of data is presented on the y-axis?
den301095 [7]
For example, if I was foong a bar graph about the amounts of what was in different jars, the x-axis would have the items in the jars, and the y-axis woukd have the amount of items in the jars
6 0
3 years ago
Read 2 more answers
Other questions:
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • The principle of time preference requries a larger payment in the future than the present. Which situation best illustrates this
    12·1 answer
  • Why are coders using encoder software? What are their advantages and disadvantages? And when might a coder need to use the codin
    12·1 answer
  • A user complains that her computer is performing slowly. She tells you the problem started about a week ago when new database so
    12·1 answer
  • Match the job description to the level of degree it requires.
    15·1 answer
  • I need help under standing an assignment, I've contacted my teacher but I want to finish this class already. Here's the directio
    11·1 answer
  • Looking for friends, anyone up for it?
    12·2 answers
  • Which of the following is NOT a factor of identifying graphic design?
    10·2 answers
  • Which file contains full and incremental back-up information for use with the dump/restore utility?
    10·1 answer
  • If you have created users with administrator privileges on your windows 7 or linux systems, why bother creating other user accou
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!