Instructions
An object's momentum is its mass multiplied by its velocity. Write a program that accepts an object's mass (in kilograms) and velocity (in meters per second) as inputs, and then outputs its momentum. Below is an example of the progam input and output:
Mass: 5
Velocity: 2.5
The object's momentum is 12.5

Answers

Answer 1

Answer:

mass = float(input("Mass: "))

velocity = float(input("Velocity: "))

momentum = mass * velocity

print("The object's momentum is ", momentum)

Explanation:

*The code is in Python.

Ask the user to enter the mass and velocity. Since both of the values could be decimal numbers, cast them as float

Calculate the momentum using given information, multiply mass by velocity

Print the momentum as example output


Related Questions


If you set your margins to be 0.5" all around, you would say these are ____
margins.
a. wide
b. standard
c. narrow
d. custom

Answers

Answer:

Narrow

Explanation:

Python (and most programming languages) start counting with 0.
True
False

Answers

True....................

Answer:

yes its true  :)

Explanation:

what if an html code became cracked and formed a bug how can i repair that

Answers

I suggest you look up a video for it ofc

Online privacy and data security are a growing concern. Cybercrime is rampant despite the various security measures taken.

-Mention five tools to safeguard users against cybercrime. How do these tools help decrease crime?
-Provide the details of how each of these tools work.
-Describe how these tools are helping to restrict cybercrime.

Answers

Answer:

The SANS Top 20 Critical Security Controls For Effective Cyber Defense

Explanation:

Password/PIN Policy

Developing a password and personal identification number policy helps ensure employees are creating their login or access credentials in a secure manner. Common guidance is to not use birthdays, names, or other information that is easily attainable.

Device Controls

Proper methods of access to computers, tablets, and smartphones should be established to control access to information. Methods can include access card readers, passwords, and PINs.

Devices should be locked when the user steps away. Access cards should be removed, and passwords and PINs should not be written down or stored where they might be accessed.

Assess whether employees should be allowed to bring and access their own devices in the workplace or during business hours. Personal devices have the potential to distract employees from their duties, as well as create accidental breaches of information security.

As you design policies for personal device use, take employee welfare into consideration. Families and loved ones need contact with employees if there is a situation at home that requires their attention. This may mean providing a way for families to get messages to their loved ones.

Procedures for reporting loss and damage of business-related devices should be developed. You may want to include investigation methods to determine fault and the extent of information loss.

Internet/Web Usage

Internet access in the workplace should be restricted to business needs only. Not only does personal web use tie up resources, but it also introduces the risks of viruses and can give hackers access to information.

Email should be conducted through business email servers and clients only unless your business is built around a model that doesn't allow for it.

Many scams and attempts to infiltrate businesses are initiated through email. Guidance for dealing with links, apparent phishing attempts, or emails from unknown sources is recommended.

Develop agreements with employees that will minimize the risk of workplace information exposure through social media or other personal networking sites, unless it is business-related.

Encryption and Physical Security

You may want to develop encryption procedures for your information. If your business has information such as client credit card numbers stored in a database, encrypting the files adds an extra measure of protection.

Key and key card control procedures such as key issue logs or separate keys for different areas can help control access to information storage areas.

If identification is needed, develop a method of issuing, logging, displaying, and periodically inspecting identification.

Establish a visitor procedure. Visitor check-in, access badges, and logs will keep unnecessary visitations in check.

Security Policy Reporting Requirements

Employees need to understand what they need to report, how they need to report it, and who to report it to. Clear instructions should be published. Training should be implemented into the policy and be conducted to ensure all employees understand reporting procedures.

Empower Your Team

One key to creating effective policies is to make sure that the policies are clear, easy to comply with, and realistic. Policies that are overly complicated or controlling will encourage people to bypass the system. If you communicate the need for information security and empower your employees to act if they discover a security issue, you will develop a secure environment where information is safe.

Answer:

anyone know if the other answer in right?

Explanation:

Write a method that evaluates to true or false depending on whether a box completely fits inside another:
public boolean nests( Box outsideBox )
This is potentially a difficult method, since the box may fit or not fit depending on how it is rotated. To simplify the method, write it so that it returns true if the two boxes nest without considering rotations (so height is compared to height, length compared to length, and so on.)

Answers

Answer:

box outside box

Explanation:

It is used to display a window with many options, or buttons, in Easy GUI. It can be used in situations when it is necessary to determine which option is the first selection because it returns 1 for buttons with index 0 and 0 for buttons with other indexes.

What public boolean nests contain box outside box?

One of the built-in data types in Python is the Boolean type. It serves as a representation of an expression's truth value. For instance, the statement 0 == 1 is False while the statement 1 = 2 is True.

To write effective Python code, one must have a solid understanding of how Python's Boolean values operate.

A boolean value describes the checked attribute. Whenever it is present, it indicates that a checkbox next to an input> element should be selected (checked) before the page loads.

Therefore,  The checked attribute can be applied to both checkbox and radio input types. Additionally, JavaScript can be used to modify the checked attribute after the page has loaded.

Learn more about boolean nests here:

https://brainly.com/question/28660200

#SPJ5

Write a function that receives three StaticArrays where the elements are already i n sorted order and returns a new Static Array only with those elements that appear i n all three i nput arrays. Original arrays should not be modified. If there are no elements that appear i n all three i nput arrays, return a Static Array with a single None element i n i t.

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that takes the three arrays as parameters. It loops over the first array comparing to see if a number exists in the other arrays. If it finds a number in all three arrays it adds it to an array called same_elements. Finally, it prints the array.

def has_same_elements(arr1, arr2, arr3):

   same_elements = []

   

   for num1 in arr1:

       if (num1 in arr2) and (num1 in arr3):

           same_elements.append(num1)

       else:

           continue

   

   print(same_elements)

Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for the year. Using the information entered by the user and selection statements, display how many days are in the month. Note: In the name of the file, LastName should be replaced with your last name and FirstName should be replaced with your first name. When you run your program, it should look similar to this:

Answers

Answer:

Explanation:

The following code is written in Java and uses Switch statements to connect the month to the correct number of days. It uses the year value to calculate the number of days only for February since it is the only month that actually changes. Finally, the number of days is printed to the screen.

import java.util.Scanner;

public class NumDaysPerezGabriel {

   public static void main(String args[]) {

       int totalDays = 0;

       Scanner in = new Scanner(System.in);

       System.out.println("Enter number for month (Ex: 01 for January or 02 for February): ");

       int month = in.nextInt();

       System.out.println("Enter 4 digit number for year: ");

       int year = in.nextInt();

       switch (month) {

           case 1:

               totalDays = 31;

               break;

           case 2:

               if ((year % 400 == 0) || ((year % 4 == 0) && (year % 100 != 0))) {

                   totalDays = 29;

               } else {

                   totalDays = 28;

               }

               break;

           case 3:

               totalDays = 31;

               break;

           case 4:

               totalDays = 30;

               break;

           case 5:

               totalDays = 31;

               break;

           case 6:

               totalDays = 30;

               break;

           case 7:

               totalDays = 31;

               break;

           case 8:

               totalDays = 31;

               break;

           case 9:

               totalDays = 30;

               break;

           case 10:

               totalDays = 31;

               break;

           case 11:

               totalDays = 30;

               break;

           case 12:

               totalDays = 31;

       }

       System.out.println("There are a total of " + totalDays + " in that month for the year " + year);

   }

}

A structure that organizes data in a list that is commonly 1-dimensional or 2-
dimensional
Linear Section
Constant
No answertet provided
It intro technology

Answers

Answer:

An array.

Explanation:

An array can be defined as a structure that organizes data in a list that is commonly 1-dimensional or 2-dimensional.

Simply stated, an array refers to a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.

Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements. Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

Hence, array elements are mainly stored in contiguous memory locations on computer.

g n this program, you will prompt the user for three numbers. You need to check and make sure that all numbers are equal to or greater than 0 (can use an if or if/else statement for this). You will then multiply the last two digits together, and add the result to the first number. The program should then start over, once again asking for another three numbers. This program should loop indefinitely in this way. If the user enters a number lower than 0, remind the user that they need to enter a number greater than or equal to 0 and loop the program again.

Answers

Answer:

In Python:

loop = True

while(loop):

   nm1 = float(input("Number 1: "))

   nm2 = float(input("Number 2: "))

   nm3 = float(input("Number 3: "))

   if (nm1 >= 0 and nm2 >= 0 and nm3 >= 0):

       result = nm2 * nm3 + nm1

       print("Result: "+str(result))

       loop = True

   else:

       print("All inputs must be greater than or equal to 0")

       loop = True

Explanation:

First, we set the loop to True (a boolean variable)

loop = True

This while loop iterates, indefinitely

while(loop):

The next three lines prompt user for three numbers

   nm1 = float(input("Number 1: "))

   nm2 = float(input("Number 2: "))

   nm3 = float(input("Number 3: "))

The following if condition checks if all of the numbers are greater than or equal to 0

   if (nm1 >= 0 and nm2 >= 0 and nm3 >= 0):

If yes, the result is calculated

       result = nm2 * nm3 + nm1

... and printed

       print("Result: "+str(result))

The loop is then set to true

       loop = True

   else:

If otherwise, the user is prompted to enter valid inputs

       print("All inputs must be greater than or equal to 0")

The loop is then set to true

       loop = True

We have looked at several basic design tools, such as hierarchy charts, flowcharts, and pseudocode. Each of these tools provide a different view of the design as they work together to define the program. Explain the unique role that each design tool provides (concepts and/or information) to the design of the program.

Answers

Answer:

Answered below

Explanation:

Pseudocode is a language that program designers use to write the logic of the program or algorithms, which can later be implemented using any programming language of choice. It helps programmers focus on the logic of the program and not syntax.

Flowcharts are used to represent the flow of an algorithm, diagrammatically. It shows the sequence and steps an algorithm takes.

Hierarchy charts give a bird-eye view of the components of a program, from its modules, to classes to methods etc.

Please select the word from the list that best fits the definition Asking for review material for a test

Answers

Answer:

B

Explanation:

Answer:

B is the answer

Explanation:

According to the vulnerability assessment methodology, vulnerabilities are determined by which 2 factors?

Answers

Answer:

3 and 60!

Explanation:

Consider the definition of the Person class below. The class uses the instance variable adult to indicate whether a person is an adult or not.

public class Person
{
private String name;
private int age;
private boolean adult;
public Person (String n, int a)
{

name = n;
age = a;
if (age >= 18)
{
adult = true;
}
else
{
adult = false;
}
}
}

Which of the following statements will create a Person object that represents an adult person?

a. Person p = new Person ("Homer", "adult");
b. Person p = new Person ("Homer", 23);
c. Person p = new Person ("Homer", "23");
d. Person p = new Person ("Homer", true);
e. Person p = new Person ("Homer", 17);

Answers

Answer:

b. Person p = new Person ("Homer", 23);

Explanation:

The statement that will create an object that represents an adult person would be the following

Person p = new Person ("Homer", 23);

This statement creates a Person object by called the Person class and saving it into a variable called p. The Person method is called in this object and passed a string that represents the adult's name and the age of the adult. Since the age is greater than 18, the method will return that adult = true.

The other options are either not passing the correct second argument (needs to be an int) or is passing an int that is lower than 18 meaning that the method will state that the individual is not an adult.

In this programming assignment, you will write a simple program in C that outputs one string. This assignment is mainly to help you get accustomed to submitting your programming assignments here in zyBooks. Write a C program using vim that does the following. Ask for an integer input from the user. Do not print any prompt for input. If the number is divisible by 3, print the message CS If the number is divisible by 5, print the message 1714 If the number is divisible by both 3

Answers

Answer:

In C:

#include <stdio.h>

int main() {

   int mynum;

   scanf("%d", &mynum);

   if(mynum%3 == 0 && mynum%5 != 0){

       printf("CS");    }

   else if(mynum%5 == 0 && mynum%3 != 0){

       printf("1714");    }

   else if(mynum%3 == 0 && mynum%5 == 0){

       printf("CS1714");    }

   else    {

       printf("ERROR");   }

   return 0;

}

Explanation:

This declares mynum as integer

   int mynum;

This gets user input

   scanf("%d", &mynum);

This condition checks if mynum is divided by 3. It prints CS, if true

   if(mynum%3 == 0 && mynum%5 != 0){

       printf("CS");    }

This condition checks if mynum is divided by 5. It prints 1714, if true

   else if(mynum%5 == 0 && mynum%3 != 0){

       printf("1714");    }

This condition checks if mynum is divided by 3 and 5. It prints CS1714, if true

   else if(mynum%3 == 0 && mynum%5 == 0){

       printf("CS1714");    }

This condition checks if num cannot be divided by 3 and 5. It prints ERROR, if true

   else    {

       printf("ERROR");    }

Draw TOUT Uw Use the space below to draw your own image with the shapes. Then see if you can communicate it to your partner to draw using the shape drawing tool in Game Lab. You can also give your drawing to another group to use as a challenge 0 50 100 150 200 250 300 350 400 Shape Size These shapes are the correct size 50 100 Pattern Reference If you don't have red, green, or blue to draw with fill in the patterns or colors you'll use instead 150 200 Red 250 Green 300​

Answers

Answer:

um

Explanation:

Implement the function charCnt. charCnt is passed in a name of a file and a single character (type char). This function should open the file, count the number of times the character is found within the file, close the file, and then return the count. If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.

Answers

Answer:

Answered below

Explanation:

//Program is written in Python programming language

def charCnt( fileName, char){

if not fileName.exists( ):

return sys.exit(1)

else:

openFile = open("$fileName.txt", "r")

readFile = openFile.read( )

fileLength = len (readFile)

count = 0

for character in range(fileLength):

if readFile[character] == char:

count++

openFile.close( )

return count

}

What is the relationship between an object and class in an OOP program?


The object contains classes.

The object and class are the same thing.

The object is used to create a class.

The object in a program is called a class.

Answers

Answer:

D. The object in a program is called a class.

Explanation:

Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995. Java was designed by a software engineer called James Gosling and it is originally owned by Oracle.

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.

Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.

Hence, the relationship between an object and class in an OOP program is that the object in a program is called a class.

For example, if you declare a class named dog, the objects would include barking, color, size, breed, age, etc. because they are an instance of a class and as such would execute a method defined in the class.

Write a program that prompts the user to enter a fraction in the following format (x/y). You may assume that the user will input numbers and a slash, but your program should deal with spaces. Use String methods to parse out the numerator and denominator (e.g. indexOf(), trim(), substring() etc.) Once you have the numerator and denominator, your program will determine whether the number is a proper fraction or an improper fraction. If it is a proper fraction, display the number. If not, reduce it to a mixed fraction or to an integer (see sample output below).

Answers

Answer:

fraction = input("enter fraction x/y: ")

if len(fraction) == 3:

   if fraction[1] == "/":

       try:

           num = int(fraction[0])

           den = int(fraction[2])

           if num < den:

               print(f"{num}/{den} is a proper fraction")

           else:

               if num% den == 0

                   print(f"{num}/{den} is an improper fraction and can be reduced to {num/den}")

               else:

                   print(f"{num}/{den} is an improper fraction and can be reduced to {num//den} + {num - (den * (num//den))}/{den}")

       except ValueError:

           print("numerator and denominator must be integer numbers")

Explanation:

The try and except statement of the python program is used to catch value error of the input fraction of values that are not number digits. The program converts the numerator and denominator string values to integers and checks for the larger value of both.

The program prints the fraction as a proper fraction if the numerator is lesser and improper if not.

The Clean Air Act Amendments of 1990 prohibit service-related releases of all ____________. A) GasB) OzoneC) MercuryD) Refrigerants

Answers

Answer:

D. Refrigerants

Explanation:

In the United States of America, the agency which was established by US Congress and saddled with the responsibility of overseeing all aspects of pollution, environmental clean up, pesticide use, contamination, and hazardous waste spills is the Environmental Protection Agency (EPA). Also, EPA research solutions, policy development, and enforcement of regulations through the resource Conservation and Recovery Act .

The Clean Air Act Amendments of 1990 prohibit service-related releases of all refrigerants such as R-12 and R-134a. This ban became effective on the 1st of January, 1993.

Refrigerants refers to any chemical substance that undergoes a phase change (liquid and gas) so as to enable the cooling and freezing of materials. They are typically used in air conditioners, refrigerators, water dispensers, etc.

Answer:

D

Explanation:

Write a function called is_present that takes in two parameters: an integer and a list of integers (NOTE that the first parameter should be the integer and the second parameter should be the list) and returns True if the integer is present in the list and returns False if the integer is not present in the list. You can pick everything about the parameter name and how you write the body of the function, but it must be called is_present. The code challenge will call your is_present function with many inputs and check that it behaves correctly on all of them. The code to read in the inputs from the user and to print the output is already written in the backend. Your task is to only write the is_present function.

Answers

Answer:

The function in python is as follows

def is_present(num,list):

    stat = False

    if num in list:

         stat = True

       

    return bool(stat)

Explanation:

This defines the function

def is_present(num,list):

This initializes a boolean variable to false

    stat = False

If the integer number is present in the list

    if num in list:

This boolean variable is updated to true

         stat = True

This returns true or false        

    return bool(stat)

b) Develop a truth table for expression AB+ C.

Answers

It will become c-ab :)

You've created a new programming language, and now you've decided to add hashmap support to it. Actually you are quite disappointed that in common programming languages it's impossible to add a number to all hashmap keys, or all its values. So you've decided to take matters into your own hands and implement your own hashmap in your new language that has the following operations:
insert x y - insert an object with key x and value y.
get x - return the value of an object with key x.
addToKey x - add x to all keys in map.
addToValue y - add y to all values in map.
To test out your new hashmap, you have a list of queries in the form of two arrays: queryTypes contains the names of the methods to be called (eg: insert, get, etc), and queries contains the arguments for those methods (the x and y values).
Your task is to implement this hashmap, apply the given queries, and to find the sum of all the results for get operations.
Example
For queryType = ["insert", "insert", "addToValue", "addToKey", "get"] and query = [[1, 2], [2, 3], [2], [1], [3]], the output should be hashMap(queryType, query) = 5.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 2, 2: 3}
3 query: {1: 4, 2: 5}
4 query: {2: 4, 3: 5}
5 query: answer is 5
The result of the last get query for 3 is 5 in the resulting hashmap.
For queryType = ["insert", "addToValue", "get", "insert", "addToKey", "addToValue", "get"] and query = [[1, 2], [2], [1], [2, 3], [1], [-1], [3]], the output should be hashMap(queryType, query) = 6.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 4}
3 query: answer is 4
4 query: {1: 4, 2: 3}
5 query: {2: 4, 3: 3}
6 query: {2: 3, 3: 2}
7 query: answer is 2
The sum of the results for all the get queries is equal to 4 + 2 = 6.
Input/Output
[execution time limit] 4 seconds (py3)
[input] array.string queryType
Array of query types. It is guaranteed that each queryType[i] is either "addToKey", "addToValue", "get", or "insert".
Guaranteed constraints:
1 ≤ queryType.length ≤ 105.
[input] array.array.integer query
Array of queries, where each query is represented either by two numbers for insert query or by one number for other queries. It is guaranteed that during all queries all keys and values are in the range [-109, 109].
Guaranteed constraints:
query.length = queryType.length,
1 ≤ query[i].length ≤ 2.
[output] integer64
The sum of the results for all get queries.
[Python3] Syntax Tips
# Prints help message to the console
# Returns a string
def helloWorld(name):
print("This prints to the console when you Run Tests")
return "Hello, " + name

Answers

Answer:

Attached please find my solution in JAVA

Explanation:

long hashMap(String[] queryType, int[][] query) {

       long sum = 0;

       Integer currKey = 0;

       Integer currValue = 0;

       Map<Integer, Integer> values = new HashMap<>();

       for (int i = 0; i < queryType.length; i++) {

           String currQuery = queryType[i];

           switch (currQuery) {

           case "insert":

               HashMap<Integer, Integer> copiedValues = new HashMap<>();

               if (currKey != 0 || currValue != 0) {

                   Set<Integer> keys = values.keySet();

                   for (Integer key : keys) {

                       copiedValues.put(key + currKey, values.get(key) + currValue);

                   }

                   values.clear();

                   values.putAll(copiedValues);

                   currValue = 0;

                   currKey = 0;

               }

               values.put(query[i][0], query[i][1]);

               break;

           case "addToValue":

               currValue += values.isEmpty() ? 0 : query[i][0];

               break;

           case "addToKey":

               currKey += values.isEmpty() ? 0 : query[i][0];

               break;

           case "get":

               copiedValues = new HashMap<>();

               if (currKey != 0 || currValue != 0) {

                   Set<Integer> keys = values.keySet();

                   for (Integer key : keys) {

                       copiedValues.put(key + currKey, values.get(key) + currValue);

                   }

                   values.clear();

                   values.putAll(copiedValues);

                   currValue = 0;

                   currKey = 0;

               }

               sum += values.get(query[i][0]);

           }

       }

       return sum;

   }

magine that you are designing an application where you need to perform the operations Insert, DeleteMaximum, and Delete Minimum. For this application, the cost of inserting is not important, because itcan be done off-line prior to startup of the time-critical section, but the performance of the two deletionoperations are critical. Repeated deletions of either kind must work as fast as possible. Suggest a datastructure that can support this application, and justify your suggestion. What is the time complexity foreach of the three key operations

Answers

Answer:

Use the stack data structure with both best-case and worst-case time complexity of O(1) for insertion and deletion of elements.

Explanation:

The stack data structure is used in programs to hold data for which the last data in the stack is always popped out first when retrieving the data sequentially, that it, first-in, last-out.

The elements in the stack are located in an index location, which means that they can be retrieved directly by choice with constant time complexity of 1 or O(1) for best and worst-case.

So inserting, and deleting the minimum and maximum elements in the stack data structure executes at a speed of the constant 1 (big-O notation, O(1) ).

You are creating a mobile version of a community discussion site for busy moms. Users post questions and other topics for discussion. Some days there are as many as 20 new discussion threads. Considering your audience, what might be the best way to lay out navigation elements on the home page

Answers

Answer:

Create a small, collapsible navigation bar at the top of the home page so users can see new topics without scrolling

Explanation:

By so doing the user experience on the website would be improved because, instead of struggling through several pages to read through discussion threads, they can simply click on the navigation bar and pick a discussion topic that interests them.

Mark is a stockbroker in New York City. He recently asked you to develop a program for his company. He is looking for a program that will calculate how much each person will pay for stocks. The amount that the user will pay is based on:


The number of stocks the Person wants * The current stock price * 20% commission rate.


He hopes that the program will show the customer’s name, the Stock name, and the final cost.


The Program will need to do the following:


Take in the customer’s name.

Take in the stock name.

Take in the number of stocks the customer wants to buy.

Take in the current stock price.

Calculate and display the amount that each user will pay.

A good example of output would be:

May Lou
you wish to buy stocks from APPL
the final cost is $2698.90

Answers

ok sorry i cant help u with this


What are the two basic functions (methods) used in classical encryption algorithms?

Answers

Substitution and transposition

substitution and transport

PHP is based on C rather than ______.


Select one:


a. PEARL


b. JAVA


c. PERL


d. COBOL

Answers

Answer:

The answer is "option b and option d"

Explanation:

In this question, both choice "b and c" is correct because Java is compiled and run on a JVM  and it uses the byte code. On the other hand, PHP has interpreted language, that compiled into the bytecode after that the output engine interpreted. Similarly, the COBOL is used for enterprise, finance, and administrative systems, and PHP is used in web creation.

PLEASE HELP
This graph shows the efficiencies of two different algorithms that solve the same problem. Which of the following is most efficient?

Answers

Answer:

D is correct

Explanation:

Think of it by plugging in values. Clearly the exponential version, according the graph, is more efficient with lower values. But then it can be seen that eventually, the linear will become more efficient as the exponential equation skyrockets. D is the answer.

most of the answers for this test is wrong.

Answers

Answer: C, Showing professional behavior.

Explanation:

Write a program that accepts two numbers R and H, from Command Argument List (feed to the main method). R is the radius of the well casing in inches and H is the depth of the well in feet (assume water will fill this entire depth). The program should output the number of gallons stored in the well casing. For your reference: The volume of a cylinder is pi;r2h, where r is the radius and h is the height. 1 cubic foot

Answers

Answer:

Answered below.

Explanation:

#Answer is written in Python programming language

#Get inputs

radius = float(input("Enter radius in inches: "))

height = float(input("Enter height in feet: "))

#Convert height in feet to height in inches

height_in_inches = height * 12

#calculate volume in cubic inches

volume = 3.14 * (radius**2) * height_to_inches

#convert volume in cubic inches to volume in gallons

volume_in_gallons = volume * 0.00433

#output result

print (volume_in_gallons)

Other Questions
PLEASE HELP MEEEEAlthough congress is the most powerful branch of government, there are several limits placed on its power. Discuss at least three of the limits on the power of congress and explain how each one limits the power of congress. Tell which on you think is the most important and explain why 3.6y = 1.6y + 24 Help Who is in the executive branch at the national level what about the state and local level What is a microbiome? how do you say "I am in high school" In spanish Pls help Im being timed The subtext of Their Eyes Were Watching God is revealed through the use of _____.dialogueflashbackssymbolismparallelism A. What is militarism?B. What caused militarism to spread throughout europe? C. How was militarism used to prevent fighting? Answer all Giving away 20 points and brainlest, please helpWhat type of transport does not require energy to move molecules across the plasma membrane?A. bilayerB. activeC. passiveD. concentration gradient From the list below, select all the probable items that make up the core. (Select all that apply.)A.IronB.AluminumC.SodiumD.MagnesiumE.Nickel In addition to the sources of error mentioned above, since the caliper jaws squeezed the flexible, rubber surface of the ball slightly, the measured diameters were slightly __________________ compared to what a non-contact method of measuring would provide. This represents an ________________ ________________ error in ________________. This additional source of error ________________ ________________ significant. When the caliper jaws closed, the zero mark on the sliding Vernier scale, ________________ line up with the zero mark on the measuring scale. This means the caliper ________________ calibrated correctly. Show how to rewrite 1/5 with the denominator 10 help me pls this is my last missing assignment (will give brainly if I get 2 answers)question is in the picture < If you want to enjoy theski slopes of Portillo, inChile, it is better to goinJuly or JanuaryJanuary or FebruaryJuly or Augustany month of the year What is a delta?20 characters... Background information: In 2012, President Obama and Congress debated the issue of taxes and tax cuts. In this speech, President Obama is discussing the effects of a potential tax increase.A typical middle-class family of four would see its income taxes go up by $2,200. That's $2,200 out of people's pockets. That means less money for buying groceries, less money for filling prescriptions, less money for buying diapers. . . .. . . Businesses can't afford it either. . . . Economists predict that if taxes go up on the middle class next year, consumers will spend nearly $200 billion less on things like cars and clothes and furniture - and that obviously means fewer customers. That cuts into business profits.That makes businesses less likely to invest and hire, which means fewer jobs.And that can drag our entire economy down.President Barack Obama,November 28, 2012Which statements best communicate the main idea of this speech? Check all that apply.Increased taxation on the middle class will improve the economy.Lower taxes increase consumer spending.Increased consumer spending strengthens the economy. Higher taxes will have a severe impact on citizens.Spending on social needs is a low priority. class A has 11 pupils and class B has 14 pupils. Both classes sit the same maths test. the mean score for class A is 32. The mean score for class B is 38. What is the mean score(rounded to 2DP) in the maths test across both classes? An air conditioning System can circulate 480 cubic feet of air per minute. How many cubic yards of air can circulate per minute? i need help 56 = -10 + 2x How do you calculate the area of a circle