Explain what each line of code does:

a) const PI = 3.14

b) radius = float(input(“Enter radius: ”))

c) Area = PI * radius * radius

d) print(area)

Answers

Answer 1

Answer:

10 please mark me as brainleast


Related Questions

Which would a student most likely do in a digital laboratory? conduct an experiment in chemistry take continuing education classes in chemistry look for an out-of-print book about chemistry watch an instructional video about chemistry.

Answers

Answer:

conduct an experiment in chemistry

Explanation:

A digital laboratory is an interactive online tool, where students are asked to mimic an experiment.

Answer:

"conduct an experiment in chemistry"

Explanation:

A digital laboratory is an online tool used to conduct chemistry experiments when, say, you are at home or the tools needed are dangerous. It also helps to make sure you have exact results since it is computerized.

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

Answers

Answer:

A virtual privte network is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

yes cause you didn’t block them

Source ________ contains instructions written by a programmer specifying the actions to be performed by computer software.

Answers

Source code contains instructions written by a programmer specifying the actions to be performed by computer softwa

How do you create a website​

Answers

Well, you would need a website builder program. Such as WordPress, Web.com, Gator Builder, and dozens of more. After you have the base and the look, depending on the program you would need to do some scripting.

Scripting may sound easy but depending on the language it takes some time to learn.

Or you could hire someone, you know that works too

Maya wants to connect three peripheral devices to her laptop , but has only one USB port. What is the best way to connect all the devices?

Answers

Answer:

USB hub.

Explanation:

what is draft pls help me​

Answers

Answer:

draft like as a rough draft it pretty much a set were you can play and the do the real thing

Drafting refers to actually writing the words of the paper. As part of the writing process, you will write multiple drafts of your paper. Each rough draft improves upon the previous one. The final draft is simply the last draft that you submit.

A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

Answers

A form is an access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

Which of the following can be termed “application software”? *
1 point
a) DOS
b) Linux
c) Defragment
d) Internet Explorer/ Microsoft Edge

Answers

The answer option which can be described as an application software is: d) Internet Explorer/ Microsoft Edge.

A software can be defined as a set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

In Computer and Technology, software applications (programs) are broadly classified into three (3) main categories and these are;

System softwareUtility softwareApplication software

An application software refers to a type of software applications (programs) that is typically designed and developed for the performance of a specific task rather than the operation of a computer system.  Some examples of application software include the following:

1. Internet Explorer/Microsoft Edge

2. Notepad

3. Windows media player

Find more information: https://brainly.com/question/14379808

where is the flash drive listed in a windows 7 save as dialog box?

Answers

Answer:

In the left pane below Computer.

Explanation:

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext

Answers

The answer is decryption

4.10.4 Inventory codehs python
i have no idea on how tp fix this, pls help:(

Answers

Answer:

between line 23 and 24, add:

    if num > 0:

(and indent the next line)

Explanation:

You want to suppress the "Now we have 0 left" message, and an additional if statement will do that for you.

In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:

  if num > 0:

Want to suppress the "Now we have 0 left" message, and an additional so for that is necessary to put between line 23 and 24, the code:

   if num > 0:

See more about computer at brainly.com/question/950632

Helppppppp pleaseeeewweeweee

Answers

Answer:

D

Explanation:

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets

Your customer said that understanding the directions is difficult. This is an aspect of

Answers

Answer:

Usability

Explanation:

The degree to which a program meets the needs of a user, including but not limited to learnability, reliability, and ease of use

What will print to the console after running this code segment?


A. 15.

B. 16.

C. 18.

D. 21.

Answers

Answer:

16

Explanation:

answer =3+2

answer =5+3

return 8 × 2

16 will print to the console after running this code segment. Therefore, option B is correct.

What do you mean by code segment ?

A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.

A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.

In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.

answer = 3+2, answer = 5+3

return 8 × 2

= 16

Thus, option B is correct.

To learn more about the code segment, follow the link;

https://brainly.com/question/20063766

#SPJ2

1. how did the prototype help you think about your idea?
2. what was frustrating about making a prototype?

Answers

[tex] \: \: \: \: \: [/tex]

1. how did the prototype help you think about your idea?

it can clarifies the things about the products as well as the user flow.

2. what was frustrating about making a prototype?

There may be too much variation in requirements.

hope it helps

[tex] \: \: \: \: \: \: [/tex]

Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a fileserver, network
attached storage, or the cloud?
Why?
What are some possible disadvantages of your recommendation that they should be aware of?

Answers

Answer:

I would recommend the cloud because they can access their data on every single device. There are virtually no disadvantages to the cloud.

Explanation:

Hope this helps.

una laptop agarra mas internet que una computadora de escritorio?

Answers

una laptop agarra mas internet que una computadora de escritorio?

Su computadora no puede afectar la velocidad de Internet de sus otros dispositivos. ... La única forma en que su computadora puede reducir la velocidad de Internet de otros dispositivos es si no obtiene suficiente velocidad de su ISP y sus dispositivos luchan por un ancho de banda limitado.

^^

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.

Answers

Answer:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.

Software that enables information to be obtained from a computer without the user's knowledge is ____________

Answers

Answer:

Spyware

Explanation:

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.

Answers

Answer:

Telemedicine refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other. Modern technology has enabled doctors to consult patients by using HIPAA compliant video-conferencing tools.

Explanation:

What are software applications?
lines of code that were written by developers
devices that you insert into the computer
files that are stored on the computer

Answers

Answer:

the person above is correct if i were you id take notes!

Explanation:

Answer:

Only A (Top answer)

Explanation:

Files do not create any software alltogether and devices pluged in are not considered software.

This question is worth 15points

Why do you think that computer programs use different data types? Wouldn't it be simpler if they treated all data the same? Why or why not?
What would happen if, for instance, a date were treated like an integer? Please answer all of the questions.

Answers

Answer:

The data type defines wich operations can safely be performed to create, transform and use the variable in another computation.

Computer programs use different data types for efficiency, precision, etc.

Treating all data the same would lead to confusion, inefficiency, and errors.

Treating a date like an integer would result in a loss of semantics, limited operations, etc.

We have,

Computer programs use different data types for a variety of reasons:

- Efficiency:

Different data types allow programs to allocate memory and perform operations more efficiently.

- Precision:

Different data types have different levels of precision. For example, using floating-point numbers allows for decimal values but might introduce rounding errors, while integers are exact but can't represent fractions.

- Semantics:

Different data types convey meaning and help programmers and the compiler understand how the data should be used.

- Operations:

Different data types support different operations. For instance, you can't perform arithmetic operations on text strings as easily as you can on numbers.

- Type Safety:

Using distinct data types helps catch errors early in the development process. If you accidentally treat a string as an integer or vice versa, type systems can catch such errors during compilation.

If a date were treated like an integer:

- Loss of Semantics:

Treating a date as an integer would strip away its meaning. Dates have attributes like day, month, and year, which would be lost if they were treated as integers.

- Limited Operations:

Integers can't directly perform operations related to date manipulation, such as finding the difference between two dates or determining the day of the week for a given date.

- Error-Prone:

Treating dates as integers would likely lead to confusion and errors. It would be easy to make mistakes when handling date-related calculations and comparisons.

- Lack of Flexibility:

Dates have a complex structure, including leap years, varying month lengths, and time zones. Treating them as integers wouldn't allow for representing these complexities.

Thus,

Computer programs use different data types for efficiency, precision, etc.

Treating all data the same would lead to confusion, inefficiency, and errors.

Treating a date like an integer would result in a loss of semantics, limited operations, etc.

Learn more about computer programs here:

https://brainly.com/question/33841076

#SPJ3

The ____ method constructs a text string from Unicode character codes that are passed as arguments.

Answers

Answer:

The fromCharCode() method constructs a text string from Unicode character codes that are passed as arguments.

After determining that a printer is unable to print in red ink, you replace the magenta cartridge. Upon attempting to print again, you discover the problem still exists. What would be the NEXT logical step

Answers

Answer:

Make sure your yellow cartridge also has ink.  

Explanation:

Also make sure yellow cartridge also has ink. Mixture of Mag and Yellow will give you red.  If still does not work, depending upon your printer, try going to the setup and try running Print Quality diagnostics.  Run it few times and see if it helps.

The logical step that follows with the replacement of the magenta cartridge for not printing the red ink is the cleaning of the printer head.

What is the function of a printer?

The Printer is used to transfer the graphics output from the system and create the output to the paper. It uses a cartridge to perform the printing with the help of ink.

The printer uses the ink in the cartridge to form the representation of the color on the paper. In case the red ink is not printable, and the issue did not get resolved with the change in the magenta cartridge, the next logical step involves the cleaning of the printer head.

Learn more about the cartridge, here:

https://brainly.com/question/13504303

#SPJ2

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

Similar how CSS is applied to your HTML page, JavaScript is as well. JavaScript just needs one friend in the world of HTML—the script> element—unlike CSS, which employs link> elements to apply external stylesheets and style> elements to apply internal stylesheets to HTML. Let's find out how this operates.

What JavaScript, implemented using JavaScript statements?

Script statements in Java. JavaScript's statements are the instructions that inform the browser what to do. Semicolons are used to separate statements (;). The JavaScript code is made up of JavaScript statements, which the browser translates line by line.

The most widely used JavaScript framework right now is by far, React. Functional programming techniques are used in this basic framework to greatly simplify parallel programming and coding comprehension.

Therefore, JavaScript can be implemented using the (JavaScript statements) HTML tags in a web page.​

Learn more about JavaScript here:

https://brainly.com/question/13089689

#SPJ2

which of these is not enumerated as a motivation to create accessible web content?

Answers

Answer:

Which of what?

Explanation:

Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should avoid using a web app for the project

Answers

Rajesh might want to avoid the use of a web app for the project due to connectivity issues. Hence, one reason he might want to avoid using the Webb app is slow or poor internet connection.

Collaborating on a web application relies very heavily on network connectivity which is the what establishes the link ms allows the apllications to achieve optimum performance.

Therefore, slow internet connection is a major reason whuhe might want to avoid using a web app.

Learn more : https://brainly.com/question/25531734

Artificial intelligence (AI) and machine learning are especially important during which security information and event management (SIEM) task?

Answers

Answer:

hueiweke

Explanation:

Artificial intelligence (AI) and machine learning are especially important during analysis and report review security information and event management (SIEM) task. Thus, option (b) is correct.

What is management?

The term “management” refers to the act of managing. The management of the business activities. Management is the basis of art, science, and the profession. Management are they manage the organization. Management are based of the different functions are the step by step.

According to the security information and event management (SIEM) task. There are the artificial intelligence and the learning are the significant review in the information of the task in the management. There was the analysis of the past daily report.

As a result, the artificial intelligence (AI) and machine learning are especially significant during analysis and report review security information and event management (SIEM) task.

Learn more about on management, here:

https://brainly.com/question/29023210

#SPJ2

Your question is incomplete, but most probably the full question was.

A.) Packet capture.B.) Analysis and report review.C.) Data aggregation.D.) Log collection.

Other Questions
GIVING BRAINLIEST1. Tom and Tina decided they wanted to start a family. Tom knew his grandfather had sickle-cell disease. Sickle-cell disease is a recessive disorder that causes blood cells to stiffen and take on a crescent shape. These blood cells have a difficult time moving through the blood vessels and can cause health problems. Tina didnt know of any family members that had it. Still, before they got pregnant they both went to the doctor for genetic tests. The doctor found that even though Tom and Tina were healthy, they both carried the gene for sickle-cell disease. Make a Punnett Square to determine the probability of Tom and Tinas child having sickle-cell disease.Use the space below to tell the probability of Tom and Tina having a child with sickle-cell and explain how you determine that. A group of students was asked to explain how one organelle in a plant cell directly supports the work oranother organelle to maintain cellular homeostasis. Which of the following students provides the BESTexplanation?A. Student 1: Lysosomes supply amino acids which ribosomes use to build proteins.B. Student 2: Vacuoles store genetic information which are used to construct the cell wall.C. Student 3: Chloroplasts produce simple sugars which mitochondria use to provide energy for the cell.D. Student 4: Golgi Bodies sort and package lipids which the Endoplasmic Reticulum uses to make proteins. 2. If (2, 3) is an ordered pair of thefunction F(x), which of the followingmust be an ordered pair of the inverseof F(x)?Answer Choices:(3, 2)(-2,-3)(2,3)(-3,-2) Katelyn has $1200.45 in her checking account. She spent $85.70 on groceries, paid her rent of $1000. Her grandmother sent her a check for her birthday for $85. How much money will be in Katelyn's account at the end of the month? Please help do this hi i need help with this The graph below shows the relationship between the number of ice cubes made and the number of ice trays used: A graph is shown. The values on the x axis are 0, 1, 2, 3, 4, 5. The values on the y axis are 0, 16, 32, 48, 64, 80. Points are shown on ordered pairs 0, 0 and 1, 16 and 2, 32 and 3, 48 and 4, 64. Only the point on the ordered pair 3, 48 is labeled as A. These points are joined by a line. The label on the x axis is Ice Trays. The title on the y axis is Ice Cubes.Which statement best describes point A on the graph? One ice tray makes 32 ice cubes. One ice tray makes 48 ice cubes. Three ice trays make 16 ice cubes. Three ice trays make 48 ice cubes. Find the slope of the line that passes through the following points E(4,1 2/3) and F (-2, 2/3) Use the dropdown menus to write an equation with infinitely many solutions.4(2x + 3) x = A. 4 B. 5 C. 6 D. 7 x + A. 12 B. 15 C. 16 D. 18 Now you are going to make up similes and metaphors of your own by finishing these sentences. 1. As heavy as 2. He was a cold 3. She had skin like a 4. As cool as 5. The mountain was a 6. Slippery like a The 95% confidence interval is from __ to __? x (2/3) = 1.06Enter your answer as a fraction in simplest form. If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only community, what kind of software would this be? georgia signers of the declaration of independence Why Amphibians are Vanishing What is the equation of the given line in standard form? Use integer coefficients.y=-1.7x + 8.5A.)17x + 10y = 85B.)-17x + 10y = 85C.)-17x + 10y = -85D.)17x+10y = -85 domain and range of y = x/(x+4) our license will be suspended for failing, refusing, or neglecting to report an accident in which there is more than ________ worth of property damage, an injury, or a death. $300 $400 $550 $750 explain how as kent (king lear) loses his status in the kingdom he starts to gain knowledge and becomes more of a true man. lower in status, higher in morality. ahh i need help with these 2 questions ill mark u as brainliest