1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ValentinkaMS [17]
3 years ago
15

I need it in code please (python)

Computers and Technology
2 answers:
Marianna [84]3 years ago
8 0
Python coded) pythooonn
fiasKO [112]3 years ago
8 0

Answer:

def main():

 n = int(input("Enter a number to find its sum! "))

 sum = int((n*(n+1)) / 2)

 print(str(sum))

main()

Explanation:

Here is some code I quickly came up with, you can rehash it for your liking.

I basically took this formula and translated it into python code on line 3. Make sure you use paratheses correctly when translating forumlas or any equation, Order of Operations is everything.

Lmk if this helped!

You might be interested in
What does it mean when a computer can't break the rules
damaskus [11]

Answer:

Maybe the type of computer you have has  rules added with them.

Explanation:

Hope this helps

-A Helping Friend

5 0
3 years ago
Read 2 more answers
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
When setting quotas for disk space, what are the two tools for enabling and configuring quotas? and which of the two are the mor
lora16 [44]
NTFS quotas
File server resource manager.

A system admin has rights to set NTFS quotas if he or she is concerned with some users monopolizing a small amount of disk space. Activating NTFS quotas helps set a storage limit for users using a particular volume. Out of the two, file server resource manager is the most effective and flexible. It is best recommended to use file server resource manager if you need quotas. It comes with file-type filtering and includes folder-level quotas.
8 0
3 years ago
Variable X is a *
xxTIMURxx [149]

Answer:

Variable X is a local variable.

Explanation:

X exists only inside the sub.

6 0
3 years ago
Below you will find the requirements to identify the Account Diversity Grade of a user. Read the requirements carefully and iden
igomit [66]

The technique I used to test the requirement is equivalence partitioning.

<h3>Equivalence Partitioning-</h3>

Generic test data is considered where all the test data satisfies the conditions provided in the problem. Such that,

- ADGrade A --> TA=25 LC=5

- ADGrade B --> TA=20, LC=3

- ADGrade C --> TA=8 LC=2

- ADGrade D --> TA=2, LC=1

- ADGrade null (n/a)—> TA=0, LC=0

Where:

  • TA represents totalAccounts,
  • LC represents loanTypeCount,
  • ADGrade represents accountDiversityGrade

If we are to combine the test data collected above, we would obtain the entire set of test data.

With this in mind, the minimum number of users that are required for testing the requirement is 5.

Read more about requirement testing here:

brainly.com/question/16147055

#SPJ1

8 0
1 year ago
Other questions:
  • Ill give Brainliest!!!!! I REALLYYY NEED HELP
    14·2 answers
  • Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front
    5·1 answer
  • If an employee who needs eye protection wears prescription lenses he or she should
    14·1 answer
  • Which statement is true
    12·1 answer
  • Which topology connects all the computers in a circular pattern
    13·2 answers
  • The field on which records are sorted is called the composite primary key.A. TrueB. False
    12·1 answer
  • what are the Technologies in regarding of communication technology? Please help me I'll rate you as brainliest!​
    13·1 answer
  • Your computer has been showing signs of a malware infection, and today it started up in Safe Mode. Because your computer is not
    6·1 answer
  • (25 POINTS) Some applications work on all devices while others work on some devices. True or False?
    13·1 answer
  • Write common ICT tools​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!