write a python program to accept a number and check whether it is divisible by 4 or not​

Answers

Answer 1

Answer:

number = int(input("Enter number: "))

if (number % 4):

 print("{} is not divisible by 4".format(number))

else:

 print("{} is divisible by 4".format(number))

Explanation:

If the %4 operation returns a non-zero number, there is a remainder and thus the number is not divisable by 4.


Related Questions

Are chairs and tables considered technology?
A) true
B) false

Answers

Answer:true

Explanation:

By definition technology is the skills methods and processes used to achieve goals

Chairs and tables are considered technology. The given statement is True.

A comfortable ergonomic office chair lessens the chronic back, hip, and leg pain brought on by prolonged sitting. Employees are able to operate more effectively and productively as a result. Another advantage is a decrease in medical costs associated with poor posture brought on by uncomfortable workplace chairs.

How does technology make your life comfortable?

They can perform their tasks more easily and independently thanks to technology. They feel more empowered, certain, and positive as a result. Many people can benefit greatly from technology. It goes beyond simply being "cool." The most recent technologies can also simplify life.

Among other major technologies, 3D modeling, virtual reality, augmented reality, and touch commerce has an impact on the design and production of furniture. Before actual furniture is built on the ground, it is possible to virtually create it using 3D or three-dimensional modeling.

Thus, Technology includes things like chairs and tables. The assertion is accurate.

Learn more about technology here:

https://brainly.com/question/9171028

#SPJ2

Which results are expected in a personality test but not a skills assessment?

Answers

Answer:

openness, conscientiousness, extraversion

Explanation:

A personality test is defined as a test that is used to assess the human personality. It is designed as the techniques to measure characteristics patterns of the traits that various people shows at different situations or environments.

A skill assessment test is used to test the abilities and the skill sets of people to perform a particular tasks given to them. It is measuring the knowledge and skills of a person.

The personality test are carried out to test how human behave and what traits they show in certain conditions. Thus openness, extra version and conscientiousness are some of the traits that people usually shows in a personality test. Thus they are the results that are expected by an individual of a personality test.

Choose the type of collection created with each assignment statement. collectionA = {5:2} collectionB = (5,2) collectionC = [5, 2]

Answers

Answer:

CollectionA is Dictionary

CollectionB is List

CollectionC is Tuple

Explanation:

List is recognized by the square brackets

Tuple by the parentheses

Dictionary by the curly brackets

Answer:

Dictionary collectionA

Tuple collectionB

List collectionC

Explanation:

A dictionary uses curly brackets. A tuple uses parentheses. A list uses square brackets.

Identify the correct characteristics of Python lists. Check all that apply. Python lists are enclosed in curly braces { }. Python lists contain items separated by commas. Python lists are versatile Python data types. Python lists may use single quotes, double quotes, or no quotes.

Answers

Answer:

Python lists contain items separated by commas.

Python lists are versatile Python data types.

Python lists may uses single quotes, double quotes, or no quotes.

Explanation:

Python Lists are enclosed in regular brackets [ ], not curly brackets { }, so this is not a correct characteristic.

Answer:

a c d

Explanation:

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?

a. Asset management
b. Baselines
c. Network maps
d. Change management

Answers

Answer:

d. Change management

Explanation:

Change management can be defined as a strategic process which typically involves implementing changes (modifications) to an existing process or elements on a computer system.

In this scenario, an administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Thus, what best describes these actions is change management.

As a network administrator, you would be required to perform changes to your network and network devices in order to get an optimum level of performance.

Write the command and explain about each formula in MS Excel


1. SUM

2. AVERAGE

3. MAx

4. MIN

5. COUNT

Answers

Answer:

Copy the same formula to other cells instead of re-typing it

Simply copy the formula to adjacent cells by dragging the fill handle (a small square at the lower right-hand corner of the cell). To copy the formula to the whole column, position the mouse pointer to the fill handle and double-click the plus sign.

Explanation:

hope its help

CSc 2720 - Data Structures: Assignment 1 [100 points] How to Submit: Turn the .java file in Folder Assignment 1 in iCollege no later than 11:00 p.m. ET on 01/27/2021 Notes: 1. Do not use any library for matrix multiplication. 2. Always use comments to explain your program. 3. No copying allowed. If it is found that students copy from each other, all of these programs will get 0. 4. You must use matrix.java as the program name; otherwise, you will lose 10%. Requirements: You are to write a program name matrix.java that makes the dot products of 2 arrays. 1. Your program should prompt the user for the dimensions of the two squares matrices, making sure that the user input is equal to 50. 2. If the above is not met, prompt the user for a new value. 3. Now generate random integer numbers (ranging from 0 to 50) to fill both matrices. 4. Display these two matrices on the screen. 5. Multiply the two matrices and display the result on the screen. 6. Insert a clock to see how long it would take to multiply these two matrices and display the time (with a message to this effect). 7. Prompt the user asking if they want to repeat the program. A simple example of program output (here matrix dimension is 4, your should be 50):

Answers

Hehehwkwjhdhebfhshshwjbrbr

Differentiate between Calling and Called program?

Answers

Answer:

The program name in CALL statement called as CALLED program/Sub program. A program can contain as many CALLs required and no restriction on it. In other words, CALLING program can CALL as many subprograms required. CALLED may not have the CALL statement to call another program.

Explanation:

Conside following prototype of a function
int minArray(int [], int );
Which of the option is correct way of function CALL assuming following arraydeclaration
int x[5] = {7,4,6,2,3};*
a) minArray(x,5);
b) minArray(x[],10);
c) minArray(x[5],5);
d) minArray(5,x);

Answers

Answer:

The answer is "Option a"

Explanation:

Following are the code to this question:

#include <stdio.h>//header file

int minArray(int x[], int n)//defining method minArray that accepts two parameters

{

   for(int i=0;i<n;i++)//defining loop for print value

   {

    printf("%d\n",x[i]);//printf array value

   }

}

int main()//defining main method

{

int x[] ={7,4,6,2,3};//defining array that hold values

int n=5;//defining integer variable

minArray(x,5);//calling method minArray

return 0;

}

In this code, a method "minArray" is defined, that accepts two parameters array and an integer variable in its parameter, and in the next step, the for loop is declared, that uses the print method to prints its value.

In the next step, the main method is declared, which declared an array and holds its values and defines an integer variables, and calls the method "minArray".

Completing an algorithm means stating the ____ of an algorithm.



(Fill in the blank pls)

WARNING! pls don't do it if you don't want to do it, Don't put an answer that doesn't have anything to do with the question If you do I'll report you full stop!

The reward for answering and correctly :

I will give you the brainiest answer, Mark 5 star, send thanks, put a nice comment and don't forget the points as well!!! ( remember only if it's right!)

THANKS SO MUCH TO ALL!!!​

Answers

Answer:

procedures for calculation

Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to print two random integers between (and including) 0 and 9. End with a newline. Ex:
5.
7.
Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, after calling srand() once, do not call srand() again. (Notes)
1 #include
2 #include //
3 Enables use of rand ()
4 int main(void) ( int seedval;
6.
7. scanf ("%d", &seedval);
8.
9.
10 srand(int seedval);
11 printf("%d\n", srand());
12 printf("%d\n", srand());
13
14 return e;
15 }

Answers

Answer:

#include<stdio.h>

#include<stdlib.h>

int main(void){

int seedval;

scanf ("%d", &seedval);

srand(seedval);

printf("%d\n", rand()%10);

printf("%d\n", rand()%10);

 return 0;

}

Explanation:

The given code is poorly formatted. So, I picked what is usable from the code to write the following lines of code:

#include<stdio.h>

#include<stdlib.h>

int main(void){

This line declares seedval as integer

int seedval;

This line gets user input for seedval

scanf ("%d", &seedval);

This line calls the srand function to generate random numbers

srand(seedval);

This prints a random number between 0 and 9

printf("%d\n", rand()%10);

This also prints a random number between 0 and 9

printf("%d\n", rand()%10);

 return 0;

}

Exercise 1.3.5: Expressing conditional statements in English using logic. info About Define the following propositions: c: I will return to college. j: I will get a job. Translate the following English sentences into logical expressions using the definitions above: (a) Not getting a job is a sufficient condition for me to return to college. (b) If I return to college, then I won't get a job. (c) I am not getting a job, but I am still not returning to college. (d) I will return to college only if I won't get a job. (e) There's no way I am returning to college. (f) I will get a job and return to college..

Answers

hope this helps!!!. i worked hat

Write a class called TextProcessor that implements the methods listed below. Your implementation may use the charAt() and length() methods from the String class You must not use any other String methods, and you must not use any of the methods in the Character class. You may not use any integer literal values except for 0 and 1.

Answers

Ieisiwizudhrhejwjjsjrjrjje

The divBySum method is intended to return the sum of all the elements in the int array parameter arr that are divisible by the int parameter num. Consider the following examples, in which the array arrcontains {4, 1, 3, 6, 2, 9}.
The call divBySum(arr, 3) will return 18, which is the sum of 3, 6, and 9, since those are the only integers in arr that are divisible by 3.
The call divBySum(arr, 5) will return 0, since none of the integers in arr are divisible by 5.
Complete the divBySum method using an enhanced for loop. Assume that arr is properly declared and initialized. The method must use an enhanced for loop to earn full credit.
/** Returns the sum of all integers in arr that are divisible by num
* Precondition: num > 0
*/
public static int divBySum(int[] arr, int num)

Answers

Answer:

The complete method is as follows:

public static int divBySum(int[] arr, int num){        

     int sum = 0;

     for(int i:arr){

         if(i%num == 0)

         sum+=i;

     }

     return sum;

   }

Explanation:

As instructed, the program assumes that arr has been declared and initialized. So, this solution only completes the divBySum method (the main method is not included)

This line defines the method

public static int divBySum(int[] arr, int num){        

This line declares and initializes sum to 0

     int sum = 0;

This uses for each to iterate through the array elements

     for(int i:arr){

This checks if an array element is divisible by num (the second parameter)

         if(i%num == 0)

If yes, sum is updated

         sum+=i;

     }

This returns the calculated sum

     return sum;

   }

Which function in Excel tells how many numeric entries are ther​

Answers

Answer:The answer is given below:

Explanation:

Count function is used to get the number of entries in Excel.

There is a specific formula for it to count the entries.

The formula is A1:A20: =COUNT(A1:A20.

It is also used to find the data in the following cells.

The values et return to the cell argument.

There can be individual items or in a cluster.

First, we select the blank cell and then use the formula.

Tyrell is required to find current information on the effects of global warming. Which website could he potentially cite as a credible source? Select four options.

a blog by an unknown person that accuses certain companies of contributing to pollution
a nonprofit website that provides information on how to clean up the environment
a recent newspaper article on global warming from a reputable news organization
a government website providing information on national efforts to investigate global warming
a magazine article about climate change in a respected scientific journal

Answers

Answer:

2345

Explanation:

Answer:

✔ a nonprofit website that provides information on how to clean up the environment

✔ a recent newspaper article on global warming from a reputable news organization

✔ a government website providing information on national efforts to investigate global warming

✔ a magazine article about climate change in a respected scientific journal

Explanation:

simplified version: 2345

How does calculate() work?

Answers

By answering questions math problems lol

Answer:

calculate works by determining the amount of something

Explanation:

A Process of receiving selecting
organizing interpreting checking and
reacting to sensory stimuli or data
so as to form a meaningful and
coherent picture of the world is
Select one:
a. Attitude
b. Perception
c. Communication
d. Thinking

= Perception​

Answers

Answer:

I think it’s B based on the answer choices

Explanation:

6. Pattern Displays

Use for loops to construct a program that displays a triangle of Xs on the screen. The

triangle should look like this

X XXXXX

XX XXXX

XXX XXX

XXXX XX

XXXXX X​

Answers

Answer:

public static void displayPattern()

  {

 

      for (int x = 1; x <= 5; x++)

      {

       for (int i = 0; i <= 6; i++)

       {

           if (x == i)

           {

             System.out.print(" ");

           } else {

             System.out.print("X");

           }

       }

       System.out.println("");

      }

     

  }

Don't delete my answer Brainly moderators, you know as well as I do that you'll never be stack overflow so take what you can get.

In which type of network will a problem with one computer crash the network?


mesh

ring

star

bus

Answers

Answer:

Probably a mesh since they daisy chain off one another. If one in the middle crashes, there is a disconnect of all the ones following it.

Answer:

bus + ring

Explanation:

edge 2021 :)

Write a program that takes a first name as the input, and outputs a welcome message to that name.
Ex: If the input is Pat the output is:
Hello Pat and welcome to cs Online
Input Welcome message
1 user_name = input 2 3
Type your code here

Answers

Answer:

The program in Python is as follows:

user_name = input("Name: ")

print("Hello "+user_name+" and welcome to cs Online")

Explanation:

The program is written in Python, and it uses basic input and output function to execute the instruction in the question.

First: Prompt the user for username

This is done in the following line

user_name = input("Input your name: ")

Next, the print function is used to output the welcome message

print("Hello "+user_name+" and welcome to cs Online")

The program that takes first name as the input, and outputs a welcome message to that name is represented below:

user_input = str(input("please type your first name: "))

print(f" Hello {user_input} !! Welcome to CS online ")

The code is written in python.

The variable user_input is used to store the user's input. It ask the user for his/her first name and store it.

Then we print the welcome statement using the f string.

F-string are use to combine strings and variables.

learn more on python program; https://brainly.com/question/14644566?referrer=searchResults

Cathy connected a keyboard, mouse, and printer to her Computer through a Bluetooth connection. What type of network has she created?

Answers

Answer:

Cathy has created a Personal Area Network

Explanation:

Let us define a personal area network.

A personal area network is created by connecting multiple devices of a user and it is panned over a very short distance. Mainly used technology is Bluetooth.

Cathy has used Bluetooth to connect keyboard, mouse and printer to her computer, she has formed a Personal Area Network.

Answer: pan

Explanation: got it right edmentum

System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web. True or False
O True
O False

Answers

Answer:

False

Explanation:

System software is the collection of programs that controls and manage the operation of a computer.

System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web is a false statement.

What is the software about?

A system software is made up of software development tools but software that gives room for users to create text documents, play games, listen to music, or others are known to be application software.

Therefore, System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web is a false statement.

Learn more about System software from

https://brainly.com/question/24321656

#SPJ6

If an ISP assigned you a /28 IPv6 address block, how many computers could be as- signed an address from the block?

Answers

Answer:

I think 14 hosts (computer)

What is the next line? >>> tupleB = (5, 7, 5, 10, 2, 7) >>> tupleB.count(7) 1 0 5 2

Answers

Answer:

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

Answer:

The answer is 2!!!!

Explanation:

Good luck!

Hydraulic pressure is the same throughout the inside of a set of brake lines. What determines the amount of resulting mechanical
force is the size of the piston in the wheel cylinder or caliper. For example: 100 psi of fluid pressure acting against a caliper piston
with 4 square inches of surface area will result in 400 lbs of clamping force.
A fluid line with 200 psi in it acting against a piston with 3 square inches of area would result in 600 lbs of force.
A fluid line with 50 psi acting on a larger piston with 12 square inches of surface area would result in 600 lbs of force, and so on...
How much fluid pressure would it take to lift a 6000 lb truck on a lift with a 60 quare inch piston (such as on an automotive lift)?
Give your answer and try to justify your answer using an equation or formula.. Pressure x surface area equals mechanical force,
or... force divided by surface area equals fluid pressure

Answers

Answer: 1000 square ponds of force hope you know the answer

Explanation: i guessed

What is the software of Apple

Answers

IOS
I hope it’s correct :)

Write a program that has a user guess a secret number between 1 and 10. Store the secret number in a variable called secretNumber and allow the user to continually input numbers until they correctly guess what secretNumber is. Complete the method guessMyNumber that uses a while loop to ask the user for their guess and compares it againist secretNumber. For example, if secretNumber was 6, an example run of the program may look like this:_______.

Answers

Answer:

Explanation:

The following code is written in Python. It is a function called guessMyNumber and like requested creates a random number and saves it to secretNumber. Then it continuously asks the user for their guess and compares it to the secret number. If the guess is correct it exits the loop otherwise it will continue to ask for a new guess.

import random

def guessMyNumber():

   secretNumber = random.randint(1, 10)

   print(secretNumber)

   while True:

       guess = input("Enter your guess: ")

       guess = int(guess)

       if (guess == secretNumber):

           print("Congratulations you guessed correctly")

Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new videos for $3.00 a night, and oldies for $2.00 a night.Write a program that the clerks at Five Star Retro Video can use to calculate the total charge for a customer’s video rentals.

Answers

Answer:

The total cost is $13.0

Explanation:

Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new videos for $3.00 a night, and oldies for $2.00 a night.

Write a program that the clerks at Five Star Retro Video can use to calculate the total charge for a customer's video rentals.

The program should prompt the user for the number of each type of video and output the total cost.

Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises.

a. True
b. False

Answers

Answer: True

Explanation:

The Intrusion Detection System (IDS) is used for the detection of malicious activities and thus is done by monitoring if the network communications and also the examination of systems logs.

When something looks suspicious of fishy, the Intrusion Detection System scans such thing out. When violations of policy occurs, the Intrusion Detection System is at alert to notice.

Therefore, the answer to the statement in the question is true.

Other Questions
Help I dont get itMath kirana buys boxes of crackers that each has the same cost x. she represents the cost of 3 boxes of cheese crackers, 5 boxes of poppy seed crackers, and 4 boxes of plain crackers using the expression 3x+5x+4x. What equivalent expression can represent the cost.A. 354xB. 10xC. 12x Read the passage from When Birds Get the Flu by John DiConsiglio.The Spanish flu would kill between 40 and 50 million peoplemore people than were killed in the war. The pandemic affected everyoneand spread everywhere. Outbreaks swept through North America, Europe, Asia, Africa, Brazil, and the South Pacific. At one point, one-fifth of the entire globe was infected.The reason this passage was included in the body of the article is because it providesa claim.evidence.a rebuttal.research. What does "transmit mean?the result of sendingsomethingto send to the wrongplaceto send from oneplace to anotherthe act of sendingsomething Which of the following quantities are vectors?charges electric fieldsenergypotentials What is an angle that is complementary to DGE?(Please hell Ill reward) Can someone help me with this to? A ball rolling on the floor eventually comes to a stop. Which statement best describes this situation?A) The energy on the macroscopic scale and the energy on the molecular scale both decreased.B) The energy on the macroscopic scale increased, and the energy on the molecular scale decreased.C) The energy on the macroscopic scale decreased, and the energy on the molecular scale increased.D) The energy on the macroscopic scale and the energy on the molecular scale both remained constant.If you have the rest please put them down :) What gas in the atmosphere helps to protect us from that radiation What would you have done if you had conquered the whole subcontinent opinions of climate change Abraham Lincoln's "Gettysburg Address" (1863) and Martin Luther King, Jr.'s "I Have a Dream" Speech (1963) were separated by 100 years. How were the two similar? help please In which country do the people eat fish and seaweed using chopsticks?1 Greece2 India3 Japani pretty sure its 3 What Energy Transformations Occur Inside The Flashlight When It Is Turned On? The increase in violence between white settlers and Plains Indians most directly resulted from a nativist theories that were used to justify violent actions. b the competition for western land and the resources it provided. c the attempt by the federal government to assimilate Native Americans into the dominant culture. d the destruction of the buffalo by white settlers moving into the western territories. what are you most optimistic about for the upcoming semester? Solve the system of linear equations by elimination.-y-10 = 65x +y = -10 Why are they called congruence transformations? Which equation represents the line passing through the points (-2,4) and(2,8)?A. y = -x + 2B. y = -x + 6C. y = x +4D.y = x + 6 Which were reasons for US Imperialism? Check all that apply. to acquire more land for building cities to establish naval bases around the world to support the belief in cultural and racial superiority to find new markets in which to sell their products to enlist colonial citizens for the US military to compete with other imperial powers