The world would be in chaos and we would all be dead duh.
Which line of code will allow the user to enter their current temperature to the nearest tenth of a degree?Group of answer choicesnum1 = input(""What is your temperature?"")num1 = int(input(""What is your temperature?"")num1 =float(input(""What is your temperature?""))1num = print(""What is your temperature?)
In programming we have different data types and in this question two data types was specified, Int and float, the only data type that can receive input to the nearest tenth of degree is float, hence, float(input(""What is your temperature?""))
Data types are use as place holders, we have the primitive and non-primitive data types
Example of data types are FloatArrayIntegerDoubleStringLearn more about data types at
https://brainly.com/question/179886
pa help please I need help
10 points :'(
nonsense report:
1 heart
Answer:
√ 1. Cellphone
Product Description:A cellphone is any portable telephone that uses cellular network technology to make and receive calls.
Please help explain Loops question. I will give brainliest.
Answer:
And 1 and 2 and 3
Explanation:
It is asked to display the 'and' every time, and the count is equal to 1 plus the previous count starting at zero, so it runs 3 times
If you know that a file for which you are searching starts with the letters MSP, you can type ____ as the search term.
PLEASE I NEED HELP ASAP PLEASE PLEASE!!!
For a list of numbers entered by the user and terminated by 0, find the sum of the positive numbers and the sum of the negative numbers. C++ language only.
Answer:
Following are the program in the Python Programming Language
#set variables to 0
positive_sum=0
negative_sum=0
#print message
print("Enter 0 to terminate")
#set the while loop
while(True):
#get input from the user
num=float(input("Enter positive or negative numbers: "))
#set if statement to check condition
if(num==0):
break
elif(num>0):
positive_sum+=num
else:
negative_sum+=num
#print output with message
print()
print("sum of positive numbers: ", positive_sum)
print("sum of negative numbers: ", negative_sum)
Output:
Enter 0 to terminate
Enter positive or negative numbers: 1
Enter positive or negative numbers: 3
Enter positive or negative numbers: 5
Enter positive or negative numbers: -7
Enter positive or negative numbers: -2Enter positive or negative numbers: 0
sum of positive numbers: 9.0
sum of negative numbers: -9.0
Explanation:
Here, we set two integer data type variables "positive_sum", "negative_sum" and initialize to 0.
Then, we set the while infinite loop inside the loop.
Set a variable "num" and get input from the user in it.
Set the if conditional statement and check condition the variable "num" is equal to 0 then, loop will terminate.
Set the elif statement and check condition the variable "num" is greater than 0 then, add that input and store in the variable "positive_sum"
Otherwise, add that input and store in the variable "negative_sum".
Finally, we print the output with the message.
which computer belongs to the first generation?
A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
Answer:
A cellular network is a network...
Fill in the blank to complete the sentence.
Binary Digit 1 0 0 0 0 0 1 1
Decimal Equivalent of Place Value 128 ? 32 16 8 4 2 1
The missing place value is
.
Answer:
ANSWER:62
Explanation:i dont know just trust me
The base of every positional numeral system is ten, which is expressed as 10 in the decimal numeral system (also known as base-ten). It is the numeral system that modern cultures utilize the most frequently.
What Binary Digit Decimal Equivalent of Place Value?In binary numbers, place values rise by a factor of 2, as opposed to decimal numbers, where place values rise by factors of ten. The symbol for a binary number is X2. Think about the binary number, 10112 as an example. The place value of the rightmost digit is 120, while the place value of the leftmost digit is 123.
Digits are used to fill in the spaces on the place value chart in the decimal system. Binary, on the other hand, is restricted to 0 and 1, therefore we can only utilize 0 or 1 with each location. In a binary place value chart, the binary number 1001 is positioned to the right.
Therefore, Decimal Equivalent of Place Value 128 64 32 16 8 4 2 1.
Learn more about Binary Digit here:
https://brainly.com/question/20849670
#SPJ2
how to send an email without showing recipients outlook
Answer:
Outlook. When you open a new blank email in Outlook, click on the “Options” tab. From there, you'll want to select the Bcc field in the message header. This is your “blind carbon copy” option, meaning that your email recipients will not see other names on the list.
Explanation:
With the goal of keeping your hardware safe, explain the physical hazards you should avoid.
Based on health safety procedures, the physical hazards you should avoid include "eyestrain."
What are Physical Hazards in Computing?Physical hazards are computing are hazards that affect the physical body of the users due to operating the Computer system.
Different Physical Hazards in ComputingBack pain Neck and shoulder painsHeadacheEyestrainInjuries of the arms, hands, and thumbs, etc.Hence, in this case, it is concluded that there are various physical hazards computer users need to avoid.
Learn more about Physical hazards in Computing here: https://brainly.com/question/5622984
to find detailed information about the origin of an email message, look at the ________________.
1. What is the difference between a columnn and a row?
2. How many rows are being used?
3. How many columns are being used? rows?
3. Who got the highest grade on Quiz 1? What is its cell reference?
5. What is the range of cell of all the names of the students?
write a program to print. *
**
***
****
*****
Program:-
[tex]\tt for\:i \:in\: range(2,6):[/tex]
[tex]\tt\quad for\: j\: in \:range(1,i+1):[/tex]
[tex]\tt\quad\quad print("*",end='')[/tex]
[tex]\tt\quad print()[/tex]
Output:-
[tex]\tt **[/tex]
[tex]\tt ***[/tex]
[tex]\tt ****[/tex]
[tex]\tt *****[/tex]
congress are smart becuase.....
Answer:
If we are talking about government then they are smart bc of there two house policies, both are equal yet super unique. They make sure each state has an equal voice in the senate.
The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?
Answer: 45.45%
Explanation:
Time Passed: 4 hours
Difference in Temperature: 20°F
20/44 = .45454545454545
.45454545454545*100 = 45.45%
Correct me if I am incorrect.
susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct statements are correct her error
The recursive formula of the explicit formula [tex]A_n = 3 + 2n[/tex] is [tex]A_n = A_{n-1} + 2[/tex]
The explicit formula is given as:
[tex]A_n = 3 + 2n[/tex]
When n = 1, we have:
[tex]A_1 = 3 + 2(1)[/tex]
[tex]A_1 = 5[/tex]
When n = 2, we have:
[tex]A_2 = 3 + 2(2)[/tex]
[tex]A_2 = 7[/tex]
When n = 3, we have:
[tex]A_3 = 3 + 2(3)[/tex]
[tex]A_3 = 9[/tex]
So, we have:
[tex]A_1 = 5[/tex]
[tex]A_2 = 7[/tex]
[tex]A_3 = 9[/tex]
Rewrite the functions as follows:
[tex]A_1 = 5[/tex]
[tex]A_2 = 5 + 2[/tex]
[tex]A_3 = 7 + 2[/tex]
So, we have:
[tex]A_1 = 5[/tex]
[tex]A_2 = A_1 + 2[/tex]
[tex]A_3 = A_2 + 2[/tex]
Express 2 as 3 - 1
[tex]A_3 = A_{3-1} + 2\\[/tex]
Substitute n for 3
[tex]A_n = A_{n-1} + 2[/tex]
Hence, the recursive formula is [tex]A_n = A_{n-1} + 2[/tex]
Read more about recursive and explicit formulas at:
https://brainly.com/question/11235928
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge
to find detailed information about the origin of an email message, look at the ________________.
Answer: header
Explanation:
Do you want to run a listing to see files that were used by the last access date is date does not display by default which command would you use to find additional properties of the files to reference.
Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "Get-childitem | get-member "
What is Get-childitem command?Get-childitem command in computer applications is used to get the items in specific locations.
Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.
Similarly, the Get-member command used to gets the members, the properties, and methods of files.
Hence, in this case, it is concluded that the correct answer is Get-childitem | get-member
Learn more about Computer commands here: https://brainly.com/question/25243683
can’t be opened because apple cannot check it for malicious software.
Answer:
try to reset your computer.
Explanation:
Pls help me pls I’m struggling
By the mid-1990s, how did revenue generated from video games compare to revenue generated from movies?
By the mid-1990s, the revenue generated from video games was two and a half times the revenue generated from movies.
Research shows that in 1994, the revenue generated from arcades in the United States was about $7 billion quarterly while the revenue generated from home console sales was about $6 billion dollars.
When combined, this revenue from games was two and a half times the amount generated from movies.
Learn more about video games here:
https://brainly.com/question/8870121
Answer:
Revenue made from video game sales still lagged behind revenue made from movies.
Write a program that outputs "Hello World!".
The Internet Assigned Numbers Authority (IANA) delegates Internet resources to the Regional Internet Registries (RIRs) who then:
Answer:
management, distribution, and registration of public IP addresses within their respective assigned regions.
Brake fluid is made up of a chemical that:
hi there!
Brake fluid is a type of hydraulic fluid used in hydraulic brake and hydraulic clutch applications in automobiles, motorcycles, light trucks, and some bicycles. It is used to transfer force into pressure, and to amplify braking force. It works because liquids are not appreciably compressible.
hope this helps.
What software type is software that is distributed free of charge, but the source code is not available
Answer:
Closed Source software programs
DOES ANYONE KNOW COMPUTER SCIENCE?
Answer:
statClass.java
Explanation:
You use the classname of the public class.
One of those will contain main()
Note that this example has a typo. statClass vs startClass.
when demonstrating 2022 versa’s maneuverability, what available systems should you point out when backing up?
When demonstrating 2022 Versa's maneuverability, what you should you point out while driving in a parking lot is the excellent rearward visibility that is given or shown by the RearView Monitor.
2022 Nissan Versa is a new model by Nissan. They are known to have different technology and safety features. Its includes automatic emergency braking with pedestrian detection, remote keyless entry etc.
This vehicle comes with 2 functions such as a 5-speed manual transmission or an Xtronic Continuously Variable Transmission. With this one can quickly adjusts to the best gear ratio for a easyy acceleration and efficiency.
Learn more about 2022 Versa's from
https://brainly.com/question/25980600
what is a copy of a theme with different color schemes called?
Answer:
A copy of a theme with different color schemes is called a Variant
Explanation:
A _____ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam.
A large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam is called; botnet
To answer this question, we need to first define an internet bot. An Internet bot is simply defined as a software application that runs tasks in an automated manner over the Internet.
Now, a number of connected internet devices that run one or more bots is referred to as a botnet and this botnet tends to control tasks on the infected computers without the user's knowledge.
Read more on botnets at; https://brainly.com/question/13624552