Answer:
The solution in Python is as follows:
num = int(input("Number: "))
if num>50:
sum = 0
count = 0
for i in range(1,num):
count = count + 1
sum = sum + i**2
if sum > num:
sum = sum - i**2
count = count - 1
break;
print("Sum: "+str(sum))
print("Numbers: "+str(count))
else:
print("Number must be greater than 50")
Explanation:
The condition stated in the question do not conform with the example. The question says, the loop should stop when sum > x.
But:
When x = 100 and sum = 91, the program loop should not stop because 91 is not greater than 100.
However, I'll answer based on the example given in the question.
This prompts user for number
num = int(input("Number: "))
The following if condition is executed if number is greater than 50
if num>50:
This initializes sum to 0
sum = 0
This initializes count to 0
count = 0
The iterates through the inputted number (e.g. 100)
for i in range(1,num):
This increases the count
count = count + 1
This calculates the sum of square of the positive integer
sum = sum + i**2
The following removes excess number from the sum
if sum > num:
sum = sum - i**2
count = count - 1
break;
This prints the calculated sum
print("Sum: "+str(sum))
This prints the count of number used
print("Numbers: "+str(count))
The following is executed if user input is less than 50
else:
print("Number must be greater than 50")
A drop light that does not allow any electrical parts to come in contact with the outer casing of the device is called a:
Answer:
The right answer is "Double insulated light".
Explanation:
Double insulated led is mostly a sophisticated type of natural light that does not necessitate a terrestrial or planetary correlation. These illuminations could be based on these metals, are indicated in the electrical protection environmental standards that now the construction workers comply with, and therefore are readily accessible about every bedroom.All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____. Group of answer choices
Complete Question:
All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____.
Group of answer choices.
A. OLE DB
B. ODBC
C. SQL Server
D. Access
Answer:
D. Access
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.
This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.
Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.
Some examples of data providers included with .NET for accessing and manipulating data in databases are;
A. OLE DB: this is an acronym for Object Linking and Embedding Database. OLE DB was designed and developed by Microsoft corporation and it comprises of various application programming interfaces (APIs) used for data access.
B. ODBC: it is an acronym for Open Database Connectivity and it was designed and developed by Microsoft corporation used for data access through structured query language (SQL).
C. SQL Server: it is a domain-specific language server designed and developed for managing the various data saved in a relational or structured database.
The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as
Answer:
Security code review.
Explanation:
The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as security code review.
The main purpose of security code review is to ensure that all the necessary security measures or procedures are adopted (available), to confirm the level of accuracy of its operations, and verify that all loopholes for unauthorized access or use by attackers is prevented.
Hence, various software developers employ the security code review process in order to ensure that the integrity and safety of their software applications or programs are present.
Code review is the process for auditing the source codes and is a an application that is used for verification of the proper security control that are present and that they are intended to use.
The code review is to assure the quality of the software and verity the activity that checks the program mainly for viewing the parts of code.Learn more about the source code for an application to verify that the
brainly.com/question/24749514.