1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
7

The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * sym

bol represents multiplication. Fix the errors so that the code works correctly: input ("Enter a number: ") print (num * 8)
Computers and Technology
1 answer:
liq [111]3 years ago
5 0

Answer:

The correct program is as follows:

num = float(input ("Enter a number: "))

print(num * 8)

Explanation:

Notice the difference between (1)

num = float(input ("Enter a number: "))

print (num * 8)

and (2)

input ("Enter a number: ")

print(num * 8)

Program 1 is correct because:

- On line 1, it takes user input in numeric form, unlike (2) which takes it input as string

- On line 2, the program multiplies the user input by 8 and prints it out

You might be interested in
For a typically large organization how many dns servers should you install
DiKsa [7]
<span>A large organization minimum at-least 2 DNS servers are needed. DNS servers are each internet domain in need. and Multiple server farms distribute the DNS Server. One of the DNS Server is must in separate location. install DNS server on all domain controller. DNS server on every domain controller is must.</span>
4 0
3 years ago
An audit trail is a record of how a transaction was handled from input through processing and output
Nostrana [21]

The answer is : True.  An audit trail is a record of how a transaction was handled from input through processing and output.  An audit trail is the evidence, such as purchase orders and invoices, that a financial transaction actually occurred.

6 0
4 years ago
You are most likely to use<br> images for photos or digital paintings.
Lubov Fominskaja [6]

Answer: Digital Paintings

7 0
3 years ago
An asymmetric encryption system utilizes how many keys?
ivanzaharov [21]
Two. One for encryption, and one for decryption. RSA is an example of an asymmetric encryption algorithm.
7 0
3 years ago
What is the easiest way to create a diverse set of cover pages?<br><br> Word 2016
Sindrei [870]

Answer:

using the cover page gallery

Explanation:

This is certainly the easiest way. And you just need to add this as first page, set the borders, pagination, headers and footers from second page, and avoiding the first page as it is the cover page as well as customize the various section of the cover page design you choose.

Inserting a blank page will require a lot of effort.

Inserting pictures will not  result into a complete and a meaningful cover page.

Same is the case if you insert shapes.

hope it helps :)

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which piece of personal information do websites often require users to enter?
    6·2 answers
  • What is the last step in planning your budget
    11·1 answer
  • Describe the general process of creating a DataFlow Diagram (DFD)
    7·1 answer
  • What is a way to minimize technical problems with computer
    13·1 answer
  • What does it mean when your check engine light comes on?
    7·1 answer
  • after placing her insertion point after grandma's kitchen, order the steps Danica needs to follow to insert and format the regis
    12·2 answers
  • Hard and soft skills can both be transferable skills. *<br><br> True<br><br> False
    5·2 answers
  • A solid understanding of __________ is the foundation of verbal communication
    7·1 answer
  • In c#, how are parameters passed on?
    15·2 answers
  • Hardware is found outside the system unit.​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!