Armstrong Numbers Programming challenge description: An Armstrong number is an n-digit number that is equal to the sum of the nth powers of its digits. Determine if the input numbers are Armstrong numbers. Input: Your program should read lines from standard input. Each line has a positive integer. Output: Print out True if the number is an Armstrong number, or False if not. Test 1 Test Input 351 Expected Output False

Answers

Answer 1

Answer:

Written in Python

number = int(input("Enter a number: "))

computesum = 0

lent = len(str(number))

for digit in str(number):

computesum += int(digit)**lent

if number == computesum:

print("true")

else:

print("false")

Explanation:

This line prompts user for Input input

number = int(input("Enter a number: "))

This line initialises the sum of the nth power of the digits to 0

computesum = 0

This line gets the length of input (i.e. number of digits)

lent = len(str(number))

The following iteration iterates through the digit to check for Armstrong numbers

for digit in str(number):

computesum += int(digit)**lent

This checks if the input number equals the computed sum

if number == computesum:

print("true") --- if yes, "true" is printed

else:

print("false") --- if otherwise, "false" is printed

See attachment for complete program in its right format

Armstrong Numbers Programming Challenge Description: An Armstrong Number Is An N-digit Number That Is

Related Questions

If a student passes off an author’s work as his or her own, the student has

Answers

Plagiarism is the answer

what is the purpose of the new window command

Answers

Answer:

.

Explanation:

Answer:

It opens one of the current worksheets into a new window.

Explanation:

got it correct

Partner Exercise: Implement a class Car with the following properties. A car has a certain fuel efficiency (measured in miles/gallon or liters/km – pick one) and a certain amount of fuel in the gas tank. The efficiency is specified in the constructor, and the initial fuel level is 0. Supply a method drive that simulates driving the car for a certain distance, reducing the amount of gasoline in the fuel tank. Also supply methods getGasInTank(), returning the current amount of gasoline in the fuel tank, and addGas(), to add gasoline to the fuel tank. Sample usage: Car myHybrid = new Car(50); // 50 miles per gallon myHybrid.addGas(20); // Tank 20 gallons myHybrid.drive(100); // Drive 100 miles double gasLeft = myHybrid.getGasInTank(); // Get gas remaining in tank You may assume that the drive method is never called with a distance that consumes more than the available gas. Supply a CarTester class that tests all methods.

Answers

50:20 I got it right

What is the extension of Qbasic ?​

Answers

Answer:

bas

Explanation:

how is the information technology Career Cluster different from the others clusters?

Answers

Answer:

All career clusters use information technology in carrying out their work.

Explanation:

How is the Information Technology career cluster different from most other clusters?

All career clusters use information technology in carrying out their work.

I saw this on quizlet, hope this helps!

PLS HELP IF U KNOW A LOT ABT SOCIAL MEDIA

Idk what’s going on with Pinterest but I can’t follow ppl, dm ppl or comment on stuff and it says an error (attached image) what can I do to fix this? Also I’ve tried logging in and out and I’ve tried deleting the app. Btw it’s on a business account

Answers

Answer:

Its probably your computer

Explanation:

Try restarting, shutting down and starting back up your computer/laptop. Or just move to a different device.

Are the blank space around the edges of the page

Answers

Answer:

The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.

meaning of leanness in organization​

Answers

Answer:It is an organizational structure that is designed to create more customer value using fewer resources than a traditional organisational structure

This elementary problem begins to explore propagation delay and transmis- sion delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. Host A is to send a packet of size L bits to Host B

a. Express the propagation delay, dprops in terms of m and s

b. Determine the transmission time of the packet, drans, in terms of L and R.

c. Ignoring processing and queuing delays, obtain an expression for the end-

d. Suppose Host A begins to transmit the packet at time t = 0. At time t = dtrans'

e. Suppose drop is greater than dran . At time t = d, ans, where is the first bit of

f. Suppose dprop is less than dtrans. At time t = dtrans, where is the first bit of

g. Suppose s = 2.5-108, L = 120 bits, and R = 56 kbps. Find the distance m so that dprop equals drans

Answers

Answer:

A. dprops = m /s seconds.

B. drans = L / R seconds.

C.  delay(end −to−end) =  (m /s + L / R) seconds.

D. The bit has just been sent to Host B or just left Host A.

E. The first bit is in the link and has not reached Host B.

F. The first bit has reached Host B.

G. m = 535.714 km.

Explanation:

The transmission time or delay of packets in a network medium is the packet size L, divided by the bit rate R (in seconds). The propagation time or delay is the ratio of the distance or length of the transmission cable, m, and the propagation speed of the cable, S (in seconds).

The end-to-end delay or the Packet delivery time is the total delay in transmission, which is the sum of the propagation delay and the transmission delay.

To get the distance where the propagation delay is equal to the transmission delay;

distance (m) = L /R  

= (120/56 ×10^3) 2.5 ×10^8   = 535.714 km

what are the principle elements of public key cryptosystem​

Answers

Answer: Components of a Cryptosystem

- Plaintext. It is the data to be protected during transmission.

- Encryption Algorithm. ...

- Ciphertext. ...

- Decryption Algorithm, is a mathematical process, that produces a unique plaintext for any given ciphertext and decryption key. ...

- Encryption Key. ...

- Decryption Key.

Explanation:

Write the function which takes an arbitrary real number p , and returns true if the numeber is equals to some power of 2, i.e. p=2n for some n . Your task is to implement a recursive function power_of_2 withount using loops and library functions.

Answers

def power_of_2(p):

   if p == 2:

       return True

   elif p < 2:

       return False

   return power_of_2(p/2)

print(power_of_2(32))

The function keeps dividing the number by 2 until it is equal to 2 or the number ends up being less than 2. If at some point the number is equal to 2, it is a power of 2 otherwise it's not a power of 2.

2. Write the output of:
a) CLS
A= 10
B = 20
C = 30
S=A+B+C
Av=S/3
Print "sum is:",s
Print "Average is:", Av
End​

Answers

sum is 60 (add a b and c together)
average is 20 (divide 60 by 3)

Which traits are common in all four career pathways of the Information Technology field? Check all that apply.

A)accuracy and attention to detail
B)problem-solving and critical-thinking skills
C)knowledge of programming language
D)ability to work independently
E)ability to protect confidential information
F)ability to learn quickly

Answers

I would say all of the above

Answer:

Abcd

Explanation:

Can someone help me to write a python code to save list form python to CSV file please?​

Answers

f = open("MyFileName.csv", "w")

lst = ["Hello", "Hi", "Bye"]

f.write(str(lst))

f.close()

I didn't necessarily know what you meant by list form. This program works for me in pycharm. I had to install the CSV plugin though. If you encounter any errors, I'll try my best to help you.

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3

Answers

Full question:

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque 2 elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3

Answer and Explanation:

If you instantiate a capacity of 10 for the queue, you have the queue a capacity of not more than 10 values.

To enqueue means to add an element to the array(if it's not full, n<10)

To dequeue means to delete an element from the array or queue(if n! =0)

From the question, for example:

We create a queue of capacity 10:

Queue q(10);

We add elements/enqueue 5 elements to the queue :

q.queueEnqueue(10);

q.queueEnqueue(5);

q.queueEnqueue(8);

q.queueEnqueue(9);

q.queueEnqueue(2);

If we print this out:

q. queueDisplay()

We would get:

10, 5, 8, 9, 2

We remove elements/dequeue 2 elements from the queue :

q. queuedequeue();

q. queuedequeue();

We print it out:

q. queueDisplay()

8 ,9, 2

We observe that deletion/dequeue starts from the front/first index.

We are left with indices 2, 3, 4 or 2 to 4

Note: the above methods/ functions and objects used are merely for example purposes. The queue uses a floating front design approach.

How goes design again ones attention?

Answers

Answer:

the only thing i could think of is creating a different way to get someone to pay attention to you like maybe instead of shouting or tapping on ones shoulder maybe try to ask the person closest to them to get their attention for you. or by doing something extremely impressive or distracting

Explanation:

Which of the following represent the use of formatting to create readable code?
Choose all that apply.

Line breaks are used to separate every ten lines of code.

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Answers

Answer:

The true statements are:

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Explanation:

Line breaks and indentation are used to increase the readability of a program. The coding formatting is done using the line breaks and indentation to separate segments of code so that the code is easier to read.

Hence,

The true statements are:

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Answer:

b and d

Explanation:

In the Allow list box in the Data Validation dialog box,the _____ option means that the cell will accept only times.A) ChronologyB) ClockC) TimeD) Calendar

Answers

Answer:

C) Time

Explanation:

Given that Data validation is a feature in Microsoft Excel in which a user used to specify or determines the type of value or characters that can be typed or entered into a cell.

For example, using data validation to ensure a value of a number is whole numbers, or to ensure character entry is less than 25 characters.

Hence, in this case, the correct answer is the TIME option, will only result in cell accepting only times.

Which kind of storage has a spinning platter?

magnetic hard disk

O server

O solid state hard disk

O cloud

Answers

Answer:

Magnetic hard disk

Explanation:

The type of storage that has a spinning platter is called MAGNETIC HARD DISK reason been that MAGNETIC HARD DISK are made up of one or more disks that are been covered with a magnetic coasting or magnetic material to help store information or data permanently on a desktop or a computer and lastly this type of disks help to read data and as well write and rewrite data.

Any suggestions on how to write the following Python code?


1. Write a Python code to save the following list in a CSV file

ls = [“Hello”, “Hi”, “bye”]

2.Write a Python to read the CSV file generated in the previous step (1) to a Python list.

Help would be much appreciated.

Answers

Answer:

Hi

Explanation:

do you think the governmentshould allocate moremoney to HIV/AIDS orphans​

Answers

Answer:

Abstract

Objective Through a descriptive study, we determined the factors that influence the decision-making process for allocating funds to HIV/AIDS prevention and treatment programmes, and the extent to which formal decision tools are used in the municipality of KwaDukuza, South Africa.

Methods We conducted 35 key informant interviews in KwaDukuza. The interview questions addressed specific resource allocation issues while allowing respondents to speak openly about the complexities of the HIV/AIDS resource allocation process.

wordList is a list of words that currently contains the values ["tree", "rock", "air"]
Which of the following lines will result in the list containing the values ["air", "rock", "air"]
A. wordList[0] = wordList[2]
B. wordList[2] = wordList[O]
C.insertitem(wordList, O, "air")
D. removeltem(wordList,0)

Answers

Answer:

A. wordList[0] = wordList[2]

Explanation:

Required

Which line would give ["air", "rock", "air"]

From the question, we have that:

wordList =  ["tree", "rock", "air"]

which means that:

wordList[0] = "tree"

wordList[1] = "rock"

wordList[2] = "air"

Analyzing the options.

A. wordList[0] = wordList[2]

This will assign the item in wordList[2] to wordList[0].

and the result would be

So:

wordList[0] = "tree"

would change to

wordList[0] = "air"

The new content of wordList would then be ["air", "rock", "air"]

Option (A) answers the question

The list variable wordList contains three string values, Hence, to obtain the list, ["air", "rock", "air"], the lines wordList[0] = wordList[2] would be used.

List values are indexed from 0 ; hence, tree = index 0 ; rock = index 1 ; air = index 2

To assign the the string "tree" to index 0, then wordList[2] is assigned to wordList[0].

wordList[0] is now "air"

Hence, the required line of code would be wordList[0] = wordList[2]

Learn more :https://brainly.com/question/19117781

Suppose that one of the following control signals in the single-cycle MIPS processor has a stuck-at-0 fault, meaning that the signal is always O, regardless of its intended value. What instructions would malfunction? Why? (a) RegWrite (b) ALUOp1 (c) MemWrite Repeat for all three signals (a) to (c) above, assuming that the signal has a stuck-at-1 fault.

Answers

Answer:

Explanation:

RegWrite:

• All R-type instructions, lw and addi:

• The result of the operation/load/addition would not be written back to the destination register

• ALUOP

• The following R-type instructions: add, sub, and, or, slt

• With ALUOp stuck at 0, the ALU decoder would interpret all those instructions as either add or subtract operations. The ALUOp gets decoded to add or subtract depending on ALUOp[0].

• MemWrite:

• Only sw is affected.

• The memory write won’t take place.

If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.

Answers

Question

If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.

A) passed by constant reference

B) passed by reference

C) passed by value

D) none of the above

Answer:

The correct answer is B)

Explanation:

The above question relates to computer programming.

Passing by reference is the same and can be used interchangeably with  passing by address.

A special ID used by a computer's procesing unit for recording or tracking data is referred to as a memory address.

When the memory address of a calling function is passed on to the function, the function is said to have been passed by address or reference.

This enables changes to be made to the function or argument directly from the parameter.

Cheers

____________________________ and _________________________ are 2 positive impacts of the internet on businesses.

A)Competition and Easy Marketing


B)Improved Communication and Worrying security


C)Improved Communication and Increased unnecessary competition


D)Improved Communication and Easy Advertisement

Answers

D improved comms and easy ads

Answer:

D)due to it we can have more profit with less time and wide area communication

Write in Java:
Given a long integer representing a 10-digit phone number, output the area code, prefix, and line number using the format (800) 555-1212.

Ex: If the input is:
8005551212

the output is:
(800) 555-1212

Hint: Use % to get the desired rightmost digits. Ex: The rightmost 2 digits of 572 is gotten by 572 % 100, which is 72.

Hint: Use / to shift right by the desired amount. Ex: Shifting 572 right by 2 digits is done by 572 / 100, which yields 5. (Recall integer division discards the fraction).

For simplicity, assume any part starts with a non-zero digit. So 0119998888 is not allowed.

LabProgram.java:

import java.util.Scanner;

public class LabProgram {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
long phoneNumber;
// Add more variables as needed

phoneNumber = scnr.nextLong();

/* Type your code here. */
}
}

Answers

import java.util.Scanner;

public class LabProgram {

public static void main(String[] args) {

   Scanner scnr = new Scanner(System.in);

   long phoneNumber;

   phoneNumber = scnr.nextLong();

   long areaCode =  phoneNumber/10000000;

   long prefix = (phoneNumber/10000)%1000;

   long lineNumber = phoneNumber%10000;

   System.out.println("("+areaCode+")"+prefix+"-"+lineNumber);

}

}

I hope this helps!

uestion
7. If you want to learn how to perform an action, which feature of the Excel window should you use?

A. Quick Access toolbar
B. Tell Me box
C. Status bar
D. File tab

Please help ASAP

Answers

Answer:

B- tell me box

Explanation:

It tells you how to do something you don’t know how to do

E-mails could possibly cause harm to computers due to which of the following?
A.Allow for misunderstandings
B.Carrying viruses
C.Updating system preferences
D.Allowing for global use

Answers

D or b
I’m pretty sure sorry if I’m wrong

E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.

As we know,

You receive emails every day with papers, pictures, or other electronic files attached. These files can occasionally include harmful viruses, Trojan horses, or malware that has been purposefully provided by someone looking to inflict harm or steal confidential personal data.

Thus, E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

Learn more about computers here:

brainly.com/question/21080395

#SPJ2

What are the ten main components of a report that would be delivered at the end of a data science project?

Answers

Answer:

The answer is below

Explanation:

The ten main components of a report that would be delivered at the end of a data science project are the following:

1. Cover page: the involves elements such as the title of the project, the name of the author, name of institution, date of publication

2. Table of Contents: this comprised information like chapters, topics, and subtopics

3. Abstract: a summary of the whole project

4. Introductory Section: a brief background study

5. Methodology section: this describes the methods used in gathering and analyzing the data

6. Data section: this shows the data gathered for the project. It is mostly represented in tables, histograms, pie charts, etc.

7. Analysis section: this describes what was analyzed

8. Result section: this described the outcome of the analysis

9. Conclusion section: this describes the whole outcome of the data project and what the author derived or concluded.

10. References: this describes the information about the works of other authors, the author used in building his background knowledge towards his data science project.

express cards functionalities​

Answers

Answer:

ExpressCard, initially called NEWCARD, is an interface to connect peripheral devices to a computer, usually a laptop computer. The ExpressCard technical standard specifies the design of slots built into the computer and of expansion cards to insert in the slots.

Other Questions
In the lecture, what landform is discussed which serves as both a geographic an cultural barrier for the people of sub-Saharan Africa?A.the Sahara DesertB.the Mediterranean SeaC.the Great Rift ValleyD.the Atlas Mountains how does the u.s. constitution best reflect the ideal of separation of powers? A. the constitution divides the federal government into three euqual branches. B. the constitution requires the national government to work with state governments. C. the constitution gives the president the right to veto laws made by congress. D. the constitution allows voters to elect members of the house of representatives Y'all please help me! Basically just match up the points with an equation.write an equation of the line that passes through the given points. 1. (-3, 2) (5, -2) 2.(-2, -4) (0,-8) 3.(8, -10) (0,2) 4.(-5, 4) (-3, -4) 5.(5, 0) (-2, 4) y=-4x-16 y=-3/2x+2 y=-2x-8 y=-1/2x+1/2 y=-4/7x+2 6/7 An optimal procedure for organizations to accept projects is to specify a return on investment (ROI) and fund only projects that meet this criterion. A. True B. False answers to DbQ on Zheng he Buddhism spread from India to China after O A. Buddhist messengers met traders from China O B. Ashoka the Great conquered parts of China O C. Hindu priests were forced to leave China, O D. Siddhartha Gautama traveled all over China. What was true about President Johnson upon inauguration after the 1964election?A. He had backed down from issues important to the Kennedyadministration.B. He had a large majority of Democrats in Congress.C. He was planning a withdrawal of troops from Vietnam.D. He had convinced Republicans that his policies had worked. please help me anyone its due today thank you ! Which sentence contains Coordinate Adjectives?A The dancer had amazing breathtaking moves.B I had a scary frightening experience on Halloween.C The jolly green giant laughs like Santa.D She wore a nice long pink dress. There are 25 students in Ms. Nguyens second grade class. In the class election, 4 students Voted for Benjamin, 12 voted for Sahil, and 9 voted for Maria. What percent of the class voted for Maria if an item sells for $44.28 per kilograms, how many cents per ounce does the item cost? Round the answer to the nearest ten-thousandth place Why is tobacco referred to as a major impetus for the enactment of slavery in Virginia? When the arrow is spun, there are four possible numbers the arrow can land on: 1, 2, 3, and 4. The spinners are each spun once. What is the probabilty of an even number on the first spinner and a 3 on the second spinner? Both mortgages and auto loans A> are riskier for lenders.B> are riskier for borrowers.C>require a down payment in general. D>require minimum payments. What was the impact of the industrialization in Europe?? Where on a map do you usually find the grid coordinate A1? What are the correct answers for these two? Erica makes $27 an hour how much does ahe make in 140 hours -3 x (10i+6)Your answer should be a complex number in the form a + bi where a and b are real numbers. Bella measured the heights of her corn stalks in centimeters. The heights are 81, 88, 69, 65. 87.What is the mean height of Bella's corn stalks?A 69 cmB. 75 cmC. 78 cmD. 80 cmE. 81 cm