1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
2 years ago
15

Def area(length, height):

Computers and Technology
1 answer:
Basile [38]2 years ago
6 0

Following are the <em><u>python complete code </u></em>to calculate the area:

Program Explanation:

  • Defining a method "area" that takes two variables "length, height" in the parameters.
  • Inside the method, a variable "area" is declared that calculates the area by multiplies "length and width".
  • After calculating the area a return keyword is used that returns its value.
  • Outside the method, a print method is declared that calls the area method by accepting value into its parameters.

Program:

def area(length, height):#defining a method area that takes two parameters "length, height"  

  area = length * height#defining a variable area that calculates the area by multiplies length and width  

  return area#using return keyword that returns area value  

print(area(9,8))#using a print method that calls area method by accepting the value  

Output:

Please find the attached file.

  • <u>In this code, the </u><u>method call</u><u> is missing therefore, the final answer is</u> "Option A".

Learn more:

brainly.com/question/24819022

You might be interested in
I used the Pearson correlation coefficient for my study to test the correlation and how strong is the relationship between two v
slamgirl [31]

Answer: NO

Explanation:

6 0
3 years ago
Read 2 more answers
Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a co
lisabon 2012 [21]

Answer:

Major risks include computer security and maintability of the software and hardware components of the computers in these objects.

I may feel more scared if I was riding a roller coaster that was computer controlled because if there were vunerabilities in the computer's software, a hacker could exploit that and remotely have access to the controls of the roller coaster, putting many people's lives at risk.

I think the benefits of computerizing an increasing number of everyday objects outweigh the potential risks.

This is because computers is very reliable and they do exactly what you tell them to do. However, humans are clumsy and can sometimes be extremely stubborn. Computerizing more everyday objects is an overall good thing for society, however, policies and protocols need to be followed to ensure these computerized objects remain secure.

Explanation:

Hope this helps.

4 0
4 years ago
What is output?
Misha Larkins [42]

Answer:

The output of code will be 10

Explanation:

We need to find output of following code:

C = 1

Sum = 0

while (c less than 10):

C = c + 3

sum = sum + c

print (sum)

Solution:

We will check the condition of while loop, if the condition is true, then the statements inside the loop will be executed. Since brackets are not available so, only one statement is linked with while loop.

First while loop will be executed c < 10 (1<10) the condition becomes true, and statement c=c+3 will be executed ( 4=1+3) and then loop condition will be checked (4<10) the condition becomes true, and statement c=c+3 will be executed ( 7=4+3) and then loop condition will be checked (7<10) the condition becomes true and statement c=c+3 will be executed ( 10=7+3) and then loop condition will be checked (10<10) the condition becomes false, so we will come outside loop body and execute: sum=sum+c (10=0+10) and print sum i. e 10

So, The output of code will be 10

6 0
3 years ago
. Suppose: x = (1111 1111 1111 1111 1111 1111 1111 1100)2 y = (0011 1011 1001 1010 1000 1010 0000 0000)2 a. Is x bigger than y i
ahrayia [7]

Answer:

a. Using 32bit unsigned binary system, x is bigger than y

b. Using 32 bit signed system, x is not bigger than y.

Explanation:

a.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In an unsigned system all binary digits are used up as the magnitude bits;

First, we need to convert each number to decimal

x = 4294967292 (decimal)

y = 999983616 (decimal)

4294967292 is greater than 999983616

So, x is greater than y (in 32 bit unsigned binary system)

b.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In a signed system, the most significant bit is used as the signed bit, the remaining bits are used in representing the magnitude bits;

The most significant bit is always the first bit.

0 represents positive (+)

While

1 represents negative (-)

First we need to separate the most significant bit from the magnitude bits.

So x = 1 (111 1111 1111 1111 1111 1111 1111 1100)2

And y = 0 (011 1011 1001 1010 1000 1010 0000 0000)2

Then, we need to convert each number to decimal

x = -2147483644

y = +999983616

From the above, y is greater than x

4 0
3 years ago
A combined counting and logical looping statement may be needed in the following situations: (a). The values stored in a linked
sergejj [24]

Answer:

a i think

Explanation:

5 0
2 years ago
Other questions:
  • Which icon will automatically adjust the amount of space between letters from very tight to very loose in style? Hyphenation, Te
    6·2 answers
  • You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there
    15·1 answer
  • The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
    7·1 answer
  • Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
    7·1 answer
  • If the ____________ is broken on a laptop, chances are other parts are also broken.
    12·1 answer
  • The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally fund
    5·2 answers
  • Write function that ask for input from a user. Use this input as input for the countdown function that we wrote using the while
    6·1 answer
  • USB 3.1 offers an improvement over its predecessors by enabling a maximum data transfer rate of up to:
    8·1 answer
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • Which of the following Office Online apps is most effective for creating multi-media presentations?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!