1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
10

Write and run a Python program that asks the user for a temperature in Celsius and converts and outputs the temperature in Fahre

nheit. (Use the formula given in the example above and solve for tempF in terms of tempC.)
Computers and Technology
1 answer:
adelina 88 [10]3 years ago
6 0

Answer:

Program :

celsius_input= float(input("Enter the value of celcius"))#It is used for the input from the user.

print((celsius_input * 1.8) + 32) # it prints the value of fahrenheit for the user.

Output:

  • If the user gives the input as 23.6, then the output is 74.48.
  • If the user inputs is 45, then the output is 113.

Explanation:

  • The above code is in python language, in which the first line is used to generate the message for the user, take the input from the user and store it into the "celsius_input" variable after converting it into float data type.
  • Then the second line will print the value of Fahrenheit by the help of formula "(celsius_input * 9/5) + 32". The 9/5 will become 1.8. hence we used 1.8 in the place of 9/5.
You might be interested in
What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
Mashcka [7]

Answer:oof

Explanation:

4 0
3 years ago
Read 2 more answers
Kellyn needs to move Slide 8 of his presentation up so that it becomes Slide 6. What best describes how he can do this using the
uranmaximum [27]

Answer:

C

Explanation:

Most programs for slides allow the individual to click and drag a slide where it belongs.

8 0
3 years ago
Read 2 more answers
What is the purpose for adding images and graphics to a web page?
m_a_m_a [10]
A. This is very important to keep your readers/users interested in your content / organization or whatever.
8 0
3 years ago
The amount of interest you will earn in one year from a savings account is the _____. A) APY B) return C) IDA D) CD
pav-90 [236]
B) return,<span>D) CD  i now is the </span>
7 0
3 years ago
Read 2 more answers
The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
SashulF [63]

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

8 0
3 years ago
Other questions:
  • What is one course of action available in every problem solving process?
    9·2 answers
  • Write an if-else statement to describe an object. Print "Balloon" if isBalloon is true and isRed is false. Print "Red balloon" i
    9·1 answer
  • What kind of value should an employee possess when employees are expected to be responsible and fair?
    7·1 answer
  • A research team is studying parallel computing. They want to run parallel processes without having to use multiple processors. H
    15·2 answers
  • If you notice files being transferred to or from your computer a. Simply close the window c. Tell the lab instructor b. Open a n
    11·2 answers
  • The 8-bit ____ field is used by source network hosts and forwarding routers to distinguished classes or priorities in ipv6 packe
    11·1 answer
  • Who is your favorite smite god in Hi-Rez’s “Smite”
    14·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • Word can only print documents on one size of paper.<br><br> True or false
    15·1 answer
  • What type of malware is best known for carrying other malware as a payload?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!