1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
3 years ago
12

>>> import math >>> print(math.Pi) 3.141592653589793 >>> def print_volume(): print ("What is the radi

us of the sphere? Please input:") r=float(input()) V=4/(3*math.Pi*(r**3)) print (V) >>> print_volume() What is the radius of the sphere? Please input: 0.5 3.3953054526271007 >>> print_volume() What is the radius of the sphere? Please input: 15 0.00012575205380100372 >>> print_volume() What is the radius of the sphere? Please input: 5 0.0033953054526271007
Computers and Technology
1 answer:
kvasek [131]3 years ago
8 0
I have no clue what this is asking...
You might be interested in
Which statement describes the relationship between science and technology?
Elden [556K]
Answer: science is the study of the world, and technology changes the world to solve problems.
3 0
2 years ago
Read 2 more answers
Routers do not forward broadcast packets.A. TrueB. False
mestny [16]
The answer you’re looking for is false
5 0
3 years ago
Which of the followings is not a testingtype? [2 marks]
Agata [3.3K]

Answer:

Subsystem testing

Explanation:

This is NOT a testing type

<em>PLEASE</em><em> </em><em>DO MARK</em><em> </em><em>ME AS</em><em> </em><em>BRAINLIEST</em><em> </em><em>IF</em><em> </em><em>MY ANSWER</em><em> </em><em>IS HELPFUL</em><em> </em><em>;</em><em>)</em><em> </em>

5 0
3 years ago
Mr. Yang is a doctor who regards video games as an effective means of staying fit. What type of game would he recommend to his p
LUCKY_DIMON [66]

wii sports, just dance, etc.

Explanation:

3 0
3 years ago
Why is malware dangerous
Sonbull [250]

Malware can be hugely damaging to businesses as well as individuals. Hackers often use malware to try and gain entry into an organisation's systems or networks, from where they can access valuable data to steal and sell on.

6 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • I'm curious why I would need to know this on a school learning site.
    12·1 answer
  • How do you know if a remote host is alive or not?
    5·1 answer
  • Where Can you find 2tickets Universal Studios Horror night
    10·2 answers
  • (10 points) 5.12. Discuss how the following pairs of scheduling criteria conflict in certain settings. a. CPU utilization (effic
    9·1 answer
  • What are 3 ways to select an entire document?
    15·1 answer
  • Which of the following is a correct group scope type in AD, windows server 2016?
    6·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • Is Filmora 9 or Final Cut Pro Better for personal use?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!