Answer:
s = input("Input a float: ")
print("{:12.2f}".format(float(s)))
Explanation:
- Read a number from user using the input function of Python.
- Use the format function of Python to correctly format the output according to the given requirements.
- Note: Use Python 3.6 or above for this code to run without any issue.
Output:
Input a float: 1234.56789
1234.57
Answer:
False because the inside could be dirty and cause problems.
Explanation:
Answer:
// program in Python to check perfect number
#function to find number is perfect or not
def is_Perfect_Number(n):
#total variable
tot = 1
i = 2
#sum of all divisor of number
while i*i<=n:
if n%i==0:
tot = tot + i + n/i
if tot == n and n != 1:
return 1
i = i+1
return 0
#read until user enter a perfect number
while True:
#read integer
num = int(input("Input an integer: "))
#call the function
if(is_Perfect_Number(num)):
print(num,"is perfect number")
#if perfect number break
break
else:
print(num,"is not a perfect number")
#ask again
print("try again.")
Explanation:
Read number from user and then call the function is_Perfect_Number() with parameter "num".This will find the sum of all divisor of number.If sum is equal to number then it will return 1 else return 0.If the number is not perfect then it will again ask to enter a number until user enter a perfect number.
Output:
Input an integer: 24
24 is not a perfect number
try again.
Input an integer: 28
28 is perfect number
Answer:
Its a good game but an amazing show. 10/10
Explanation:
The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.
<h3>What are some ways to handle against email phishing attacks?</h3>
People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:
- Be on guard towards the handing of sensitive information.
- Never click on alarming messages.
- Do not open any form of attachments that is suspicious or strange.
Learn more about phishing attacks from
brainly.com/question/2537406