The required code is :
function multiples(number) {
let sum = 0;
for (let i = 0; i <= number; i++) {
if (i % 3 === 0 || i % 5 === 0) {
sum += i;
}
}
return sum;
}
console.log( multiples(10) );
console.log( multiples(5) );
console.log( multiples(6) );
What the steps to write this function ?1) Write a function named limit that takes an integer parameter.
2) Within the function:
3) Declare a variable called sum and set its value to zero.
4) Begin a loop at 0 and work your way up to the limit.
5) Within the loop:
6) Add the loop variable to sum if it is a multiple of three.
7) If it's not a multiple of 5, add it to sum.
8) Return the sum at the end of the loop.
What is a function ?A function is a piece of code that performs a certain task. It is callable and reusable several times. You can supply data to a function, and it can return data to you. Many programming languages include built-in functions that may be found in their libraries, but you can also write your own.
Can learn more about the Return sum function from https://brainly.in/question/51044604
#SPJ4
Python and using function
Takes two integer parameters. Returns the integer that is closest to 10
Answer:
def closest_to_10(num1, num2):
if num1-10 < num2-10:
return num2
else:
return num1
Explanation:
Word processing software is used primarily by schools rather than businesses.
True or false
Answer:
False.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.
Generally, the Microsoft Word software is used by various businesses for processing and formatting text-based documents.
In Microsoft Word, formatting refers to the appearance of texts in a document.
Formatting a text involves performing tasks such as, bold, underline, italics, font-size, font-types, color etc. The commands to perform the above tasks are mainly found in the format menu of the Home tab.
Formatting a document is important and necessary because it makes the word document clear and easy to read.
Hence, Word processing software such as Microsoft Word, Notepad, etc., is used primarily by businesses rather than schools because most businesses deal with the creation and transfer of documents from one department to another or to other businesses.
This ultimately implies that, business firms or organizations are more inclined to use Word processing software to create paper documents for the day-to-day business activities they conduct unlike a school who rarely does.
what aspect should you consider before adding pictures to documents
Answer:
make sure you have the correct picture
Explanation:
it might vary to what document your working on
get part name(s) for each of the parts supplied by more than 2 suppliers.
To get the part name(s) for each of the parts supplied by more than two suppliers, we need to perform the following steps:
1. Identify the parts supplied by each supplier:
- Create a table or dataset that lists the suppliers and the parts they supply.
2. Count the number of suppliers for each part:
- For each part in the dataset, calculate the count of unique suppliers that supply that part.
3. Filter the parts supplied by more than two suppliers:
- Select the parts that have a supplier count greater than two.
4. Retrieve the part name(s) for the filtered parts:
- Get the corresponding part name(s) for the parts identified in the previous step.
5. Present the results:
- Display the part name(s) that are supplied by more than two suppliers.
By analyzing the supplier-part dataset, we can identify the parts supplied by more than two suppliers and retrieve their corresponding names. This information is valuable for various purposes, such as supplier management, redundancy planning, and optimizing supply chain operations. By ensuring that critical parts have multiple suppliers, businesses can reduce the risk of disruptions caused by supplier issues and maintain a smooth workflow. Additionally, having multiple suppliers for certain parts can provide cost benefits and increase negotiation power. The provided steps outline a systematic approach to extract the part name(s) for the parts supplied by more than two suppliers, aiding in efficient decision-making and supply chain management.
To know more about suppliers, visit
https://brainly.com/question/14885967
#SPJ11
how might b2b and b2c companies approach meeting customer needs differently
Businesses that cater to both B2B (business-to-business) and B2C (business-to-consumer) consumers frequently take a different approach to satisfying their demands because these customers have distinct needs.
What distinguishes B2B customers from B2C clients?What distinguishes B2B e-commerce from B2C e-commerce? Business to business is known as B2B, whereas business to consumer is known as B2C. B2B ecommerce makes use of online channels to market to other businesses. B2C e-commerce focuses on individual customers.
How do the purchasing processes for B2B and B2C differ?B2B: When purchasing a good or service involves business-related goals, the transaction requires a careful study, more thought, and continued support from the seller. Several business divisions are impacted by the choice. B2C: Typically, the sale is less logical
To know more about consumers visit:-
https://brainly.com/question/28671114
#SPJ1
which layer of the osi model manages connecting applications to applications?
The application layer is found at Layer 7, the top layer of the Open Systems Interconnection (OSI) communications paradigm. It ensures that software running on multiple networks and computer systems may effectively communicate with one another.
Under what OSI layer are the communicating applications identified?Users communicate with computers at the OSI model's Application layer. The application layer is in charge of locating and verifying the availability of the intended communication partner and figuring out whether there are enough resources available for the planned conversation.
What layer establishes a link between two applications?Two apps that are operating on various hosts can connect end-to-end via the transport layer. Obviously, the transport layer offers this logical link whether the hosts are connected to the same network or not.
To know more about application layer visit:-
https://brainly.com/question/29671395
#SPJ4
8 grades, help please!!!!
Answer: can you take a clearer picture its really blurry then I can help Thx! :)
Explanation:
Question 7 (1 mark) In a computer information system control procedures that provide reasonable assurance that the recording, processing and reporting of data are properly performed for specific appli
Control procedures in a computer information system ensure proper recording, processing, and reporting of data for specific applications.
In a computer information system, control procedures play a vital role in maintaining the integrity, accuracy, and reliability of data. These procedures are designed to provide reasonable assurance that the recording, processing, and reporting of data are performed correctly and in accordance with predefined standards and objectives.
Control procedures encompass a range of measures implemented to minimize the risks associated with data manipulation and ensure the system operates effectively. They can include both preventive and detective controls. Preventive controls aim to prevent errors or irregularities from occurring in the first place, while detective controls focus on identifying and correcting errors or discrepancies that may have occurred.
Examples of control procedures include access controls, segregation of duties, data validation and verification, data backup and recovery mechanisms, error handling procedures, and audit trails. These procedures are typically documented and enforced through policies, protocols, and system configurations.
By implementing control procedures, organizations can reduce the risk of data inaccuracies, unauthorized access, and fraudulent activities. They provide a level of assurance that data is processed in a controlled and secure manner, ensuring the reliability of the information produced by the computer information system.
Learn more about control procedures
brainly.com/question/30623695
#SPJ11
Question Number 1) The term _____ refers to various appliances and devices for creating, storing, exchanging, and using information in diverse modes.
The term "information and communication technology (ICT)" refers to various appliances and devices for creating, storing, exchanging, and using information in diverse modes. ICT encompasses a wide range of technologies, including computers, smartphones, tablets, software, networks, and communication systems, such as the internet and social media platforms. These tools enable individuals and organizations to access, process, and share information effectively and efficiently.
ICT has significantly transformed the way we live, work, and communicate, making it an essential component of modern society. It has led to increased productivity, globalization, and improved access to education and healthcare. Moreover, ICT has fostered new forms of collaboration and innovation, enabling businesses and individuals to adapt to rapidly changing environments and develop novel solutions to complex challenges. However, the widespread adoption of ICT has also raised concerns about privacy, security, and the digital divide between those with access to these technologies and those without. As a result, governments, businesses, and individuals must continuously adapt and invest in the development and implementation of policies and strategies to ensure the responsible and equitable use of ICT for the benefit of all members of society.
To learn more about globalization, here
https://brainly.com/question/15283031
#SPJ11
(Python 3.5, short and simple codes please)Two non-negative integers x and y are equal if either:Both are 0, orx-1 and y-1 are equalWrite a function named equals that recursivelydetermines whether two parameters (both containing integer values)are equal and returns True or False.
The programs that illustrate the non-negative integers x and y is given below:
def equals(x, y):
if x == 0:
return y == 0
elif y == 0:
return x == 0
else:
return equals(x - 1, y - 1)
What is a program?A computer program is a set of instructions written in a programming language that a computer can execute. The software includes computer programs as well as documentation and other intangible components.
The ways to do the program will be:
Define the program's purpose. Consider the program that is currently running on the computer. Create a program model using design tools. Examine the model for logical flaws. Create the source code for the program. Build the source code. Correct any compilation errors that were discovered.Learn more about programs on:
https://brainly.com/question/26642771
#SPJ1
In 3-5 sentences, describe how you would insert a graph in your word-processing document.
Answer:
Click the “Insert” tab, then click the “Chart” button on the Illustrations section to open the “Insert Chart” pop-up window.
Select the type of graph to add to the document, such as a pie chart or bar graph. ...
Click “OK” and Word adds a chart with generic data points to the document.
Explanation:
The DELETE statement is used to delete existing records in a table. True/False?
A DML (Data Manipulation Language) instruction is DELETE. With this command, records from a table are deleted. It is not used to remove a table from the database; rather, it is only used to delete data from a table.
Does the Remove command delete tables?The Data Manipulation Language, a subset of SQL that enables the alteration of data in databases, includes the Delete command. Existing records in a table can be deleted with this command. You can use this to either delete all the records from a table or selected records based on a criterion.
To eliminate every row from a table, which statement should be used?Always use TRUNCATE TABLE to remove every record from a table. It is quicker to use TRUNCATE TABLE than.
To know more about DML visit:-
https://brainly.com/question/13441193
#SPJ4
Barriers to communication _____. Select 3 options.
1. are just an issue on cross-cultural teams
2. are inevitable, and there is nothing you can really do to remove them
3. apply to all communications, not just cross-cultural
4. can be anything that prevents someone from receiving and understanding a message that is communicated
5. may include language and communication style
Answer:
3. apply to all communications, not just cross-cultural.
4. can be anything that prevents someone from receiving and understanding a message that is communicated.
5. may include language and communication style.
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
An effective communication can be defined as an act that typically involves conveying or disseminating information efficiently and effectively from an individual (sender) to another (recipient) without any redundancy. Thus, effective communication ensures that messages or information are transmitted properly, guarantees a feedback, lacks the use of harsh tones, ensures both parties are well understood, gives room for clarity etc.
Barriers to communication refers to anything that prevents the successful transmission, receipt and understanding of a message and they;
I. Apply to all communications, not just cross-cultural.
II. Can be anything that prevents someone from receiving and understanding a message that is communicated.
III. May include language and communication style.
The formula for calculating your BMI is below.
weight in pounds
BMI = 703
(height in inches)
Which line of code will correctly calculate the BMI? Select 3 options.
obmi = (703 * weight) /height ** 2
✓ bmi = 703 * weight/ height" height
bmi = 703 * weight/ (height* height)
bmi = 703 * weight/height2
O bmi = 703 * weight/ height** 2
Answer:
The Answers are A, C, D
Explanation:
This is Correct on Edge
Recommend a minimum of 3 relevant tips for people using computers at home, work or school or on their SmartPhone. (or manufacturing related tools)
The three relevant tips for individuals using computers at home, work, school, or on their smartphones are ensure regular data backup, practice strong cybersecurity habits, and maintain good ergonomics.
1)Ensure Regular Data Backup: It is crucial to regularly back up important data to prevent loss in case of hardware failure, accidental deletion, or malware attacks.
Utilize external hard drives, cloud storage solutions, or backup software to create redundant copies of essential files.
Automated backup systems can simplify this process and provide peace of mind.
2)Practice Strong Cybersecurity Habits: Protecting personal information and devices from cyber threats is essential.
Use strong, unique passwords for each online account, enable two-factor authentication when available, and regularly update software and operating systems to patch security vulnerabilities.
Be cautious while clicking on email attachments, downloading files, or visiting suspicious websites.
Utilize reputable antivirus and anti-malware software to protect against potential threats.
3)Maintain Good Ergonomics: Spending extended periods in front of a computer or smartphone can strain the body.
Practice good ergonomics by ensuring proper posture, positioning the monitor at eye level, using an ergonomic keyboard and mouse, and taking regular breaks to stretch and rest your eyes.
Adjust chair height, desk setup, and screen brightness to reduce the risk of musculoskeletal problems and eye strain.
For more questions on computers
https://brainly.com/question/24540334
#SPJ8
a company set up controls to allow only a specific set of software and tools to install on workstations. a user navigates to a software library to make a selection. what type of method prevents installation of software that is not a part of a library
Allow list is type of method prevents installation of software that is not a part of a library.
What is Allow list?
A list of domains or email addresses that you want to receive emails from is referred to as a whitelist or an allow list. You can instruct the email system not to filter email from a certain address or domain by adding it to your list of allowed addresses or domains.What does whitelist being enabled mean?
An email address, IP address, domain name, or application can be approved while all others are rejected using a cybersecurity technique known as a whitelist (allowlist).
What is Allowlist in phone?
From a security perspective, allowlisting is a useful tool for preventing PHAs from devices because the allowlist of programs ultimately gets quite small.
Learn more about allow list.
brainly.com/question/13850709
#SPJ4
Please help, this question is from plato.
What is the purpose of the domain name?
The domain name: (.net , .com , org , .gov)
is an example of a service provider. The domain name .gov.nz is an example of a (New york , New Zealand, news, commercial)
government website.
Answer:
New Zealand government
Explanation:
Answer:
.net is for service providers and .gov.nz is for new Zealand governement
Explanation:
a) pencil b) ink bottle c) polygon d) eye 3. Under which of the following can an operating system be classified? b) software c) storage devices d) a) hardware
Answer:
Software
Explanation:
An operating system is a type of software that manages the computer hardware and allocates resources to programs running on the machine.
A customer uses an app to order pizza for delivery. Which component includes
aspects of the customer's interaction with an enterprise platform?
O Data
O Experience
O Core Processing
O Customer Interface
The data component covers components of the customer's contact with an enterprise platform.
What is an example of an enterprise platform experience component?A system used to accept client payments is an example of an Experience component inside an enterprise platform. This is a method in which a consumer places his order using a mobile app and then pays for it.
The customer interface is a business model component that relates to how a company communicates with its customers. The sort of client engagement is determined by how a company decides to compete. To properly comprehend customer experience, we must first comprehend the four components necessary to construct one. Archetypes, activities, relationships, and principles are all present. Consider the many components of a relationship to help you recall them.
Learn more about mobile app from here;
https://brainly.com/question/24101998
#SPJ1
platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as
Platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as
social networking sites.
What is a social networking site?A social networking site is sometimes referred to as social network and it can be defined as a collection of Internet software applications and websites (platforms) which are designed and developed in order to avail end users with similar interests, an ability to connect, add, share, and discuss different information, as well as enhance remote connection, collaboration and debates (discussions) between community members over the Internet.
Additionally, some examples of a social networking site include the following:
Twi-tterFace-bookTi-kT-okInst-agr-amHangoutYou-tubeIn this context, we can reasonably infer and logically deduce that social networking sites can help connect users such as employees to other employees with similar professional interests.
Read more on social networks here: brainly.com/question/28072110
#SPJ1
Complete Question:
Platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as
____________ _____________ sites.
array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.
user_in = str ( input ("Please enter a phrase: " ))
def reverse_str (string):
e = 0
for e in range (len (string)):
x = -1
print string[x]
x += (len (string))
What is the error if I want to assign a value to that same index? i.e. var_str[5] = “r”
PLEASE QUICK
The program would not generate an error if the var_str list have up to 5 elements
How to determine the error?
The operation is given as:
Assign a value to that same index
This is represented as:
var_str[5] = "r"
The representations from the above code segment are
List = var_strIndex = 5Value = "r"When a value is assigned to an index, the value at the index is updated to the new value, provided that the index exists in the list.
This means that the program would not generate an error if the var_str list have up to 5 elements
Read more about list at:
https://brainly.com/question/27094056
#SPJ1
Please answer these questions! Will mark Brainliest!!
Answer:
1) bob behnken and doug hurley
2)yes
3) august
Apply the defined names Q1_Sales, Q2_Sales, Q3_Sales, and Q4_Sales to the formulas in the range B10:E10 in the Consolidated Sales worksheet.
To apply the defined names Q1_Sales, Q2_Sales, Q3_Sales, and Q4_Sales to the formulas in the range B10:E10 in the Consolidated Sales worksheet, follow these steps:
1. Select the range B10:E10 in the Consolidated Sales worksheet.
2. Go to the "Formulas" tab on the ribbon.
3. Click on the "Define Name" button in the "Defined Names" group.
4. In the "New Name" dialog box, enter the name Q1_Sales in the "Name" box.
5. Click on the "OK" button to apply the name to the selected range.
6. Repeat steps 4 and 5 for the names Q2_Sales, Q3_Sales, and Q4_Sales.
Once you have applied the defined names to the selected range, you can use them in formulas to refer to the corresponding cells. For example, you can use the formula =Q1_Sales+Q2_Sales+Q3_Sales+Q4_Sales to calculate the total sales for the year.
Learn more about Consolidated Sales worksheet:
https://brainly.com/question/30167580
#SPJ11
The first idea for a communications network was called:
the galactic network.
the Internet.
the network.
the web.
Answer:
the galactic network.
have a nice day <3
Explanation:
increase power in the telephone industry. investigate technologies for the military in the US. he first idea for a communications network was called: the galactic network.
Answer:
A
Explanation:
Businesses with very large sets of data that need easy access use sets of cartridges with robot arms to pull out the right one on command.This is known as______.
a.
removable hard drives
b.
smart cards
c.
mass storage
d.
USB drives
Answer:
C. Mass Storage
if incorrect then:
A. Removable Hard Drives
How can I make Zoom work on a chromebook?
Answer:
Many schools rely on Chromebooks as part of regular classroom instruction but especially more so now to continue remote learning. Zoom makes it easy for students to use our video solution on a Chromebook. Open Chrome on the Chromebook and either go to the Chrome Web Store and search for Zoom or go directly to the Zoom entry in the Chrome Web Store.From the Zoom entry, click Add To Chrome and then, when prompted, click Add Extension.
Explanation:
Write a Python program in codehs, using post-test while loop, to print the powers of 2 less than one million, starting from 2 to the power of 0.
Hint: Recall from Python Basics Math Operators Unit that ** is the exponentiation operator.
Usage: To find 10 to the power of 5, do 10 ** 5 in Python.
Paste your program in the space provided below, after you test its functionality in codehs.
This loop will print out the powers of 2 (2^0, 2^1, 2^2, etc.) until it reaches 2^power which is greater than 1 million. The power variable is incremented by 1 each time the loop runs which allows us to keep track of which power of 2 we are at.
What is the variable ?A variable is a named memory location used to store a value that can be changed during the execution of a program. Variables are essential to programming, as they allow programmers to store and manipulate data during the execution of a program. Variables are typically declared with a specific data type, such as an integer or string, and they are assigned a unique name so they can be accessed and manipulated within the program.
#Start
power = 0
while 2**power < 1000000:
print(2**power)
power += 1
#End
To learn more about variable
https://brainly.com/question/29360094
#SPJ1
How fast or slow a video sequence is
A. Time aperature
B. Length
C. Frame rate
D. Continuous
E. None of these
Answer:
C. Frame rate
Explanation:
hope this helps
virtual conections with science and technology. Explain , what are being revealed and what are being concealed
Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.
What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.
To learn more about technology
https://brainly.com/question/25110079
#SPJ13