1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
12

>>> import math >>> print(math.Pi) 3.141592653589793 >>> def print_volume(): print ("What is the radi

us of the sphere? Please input:") r=float(input()) V=4/(3*math.Pi*(r**3)) print (V) >>> print_volume() What is the radius of the sphere? Please input: 0.5 3.3953054526271007 >>> print_volume() What is the radius of the sphere? Please input: 15 0.00012575205380100372 >>> print_volume() What is the radius of the sphere? Please input: 5 0.0033953054526271007
Computers and Technology
1 answer:
nata0808 [166]3 years ago
4 0
I have no clue what this is asking...
You might be interested in
Explain the risks to privacy from collecting and storing personal data on computer systems and the programmer’s role to safeguar
Deffense [45]

Answer:

The risks is If your computer is stolen, someone  could get the data and If your laptop messes up you will you lose all the data.

Explanation:

7 0
3 years ago
____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
elixir [45]

Answer:

The correct answer to the following question will be Vendor Lock-In.

Explanation:

Vendor Lock-In: It is also known as Customer Lock-In. The Vendor Lock-In makes the costumer depends on services and products on the vendor. The costumers are not able to use another vendor without changing costs as it creates barriers.

Some ways to avoid Vendor Lock-In, these are as follows:

  • Design your application portable.
  • Keep watching vendor contracts.
  • Arrange both entry and exit with your vendor.

8 0
3 years ago
We cannot share software in computer network true or false​
Usimov [2.4K]

Answer:

false

Explanation:

false but other thing is that it can be very risky increasing the chances of getting infected by a virus

6 0
3 years ago
One out of how many people in the world has a Fac3book account?
DanielleElmas [232]
Two highest maybe five
8 0
3 years ago
When searching for your word processing file to finish writing your report, you should look for a file with which extension? (6
trasher [3.6K]

Answer:

doc

Explanation:

6 0
3 years ago
Other questions:
  • Int, char, bool, and double are all valid data types in c , true or false
    15·1 answer
  • Directions: pick the right letter for each number.
    11·2 answers
  • A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have d
    11·1 answer
  • You have implemented a network where each device provides shraed files with all other devices on the network. what type of netwo
    10·1 answer
  • Joshua needs to join in two cells together which of the following would perform the function
    14·1 answer
  • Which software would you use to create a print design?
    8·2 answers
  • Which career field has grown most as a result of technological changes?
    13·1 answer
  • What internet access technology currently uses a technology called 4G?
    13·1 answer
  • What federation system technology uses federation standards to provide SSO and exchanging attributes?
    7·1 answer
  • It is for employees to make mistakes that compromise the security of an organization’s computer devices and sensitive informatio
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!