1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
15

A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i

s the miles walked. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: printf("%0.2lf", yourValue);
Computers and Technology
2 answers:
kenny6666 [7]3 years ago
7 0

Answer:

steps = int(input("Enter the number of steps: "))

miles = steps / 2000

print('{:.2f}'.format(miles))Explanation:

Explanation:

Amanda [17]3 years ago
6 0

Answer:

import java.util.Scanner;

public class num1 {

   public static void main(String[] args) {

   Scanner in = new Scanner(System.in);

   //Prompt and receive user input

       System.out.println("Enter number of Steps");

       int numSteps = in.nextInt();

       double numMiles = numSteps/2000;

       //Print the formated number of miles

       System.out.printf("The equivalent miles is %.2f ",numMiles);

   }

}

Explanation:

  • This is solved using Java programming language
  • Scanner class is imported and used to receive user input (number of steps walked)
  • To convert number of steps to number of miles, we divide by 2000, Since the question says the pedometer treats walking 2,000 steps as walking 1 mile.
  • Output the number of miles to 2 decimal places using java's printf() method
You might be interested in
Which option can be used to automatically scan a document to prepare it for publishing, identifying personal information that sh
lubasha [3.4K]

Answer:

Document Inspector  option can be used to automatically scan a document to prepare it for publishing, identifying personal information that should be removed

Explanation:

Document scanner: This converts the text written in the paper in to a digital form. Most probably it will convert the text in paper in to image only.

Document Inspector is the tool which removes the personal information while sharing the document. The personal information can be name, mail id, phone number etc. This personal information though hidden will get reflected while publishing and this document inspector allow us to protect these data from sharing.

Privacy manager: This is a software reducing the risk of unauthorized access of data

Security manager: This once again protect the document.

4 0
4 years ago
_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or scre
Lady_Fox [76]

Answer:

Trojan horses

Explanation:

4 0
2 years ago
Every program that is created will have a starting point called ___________and is the beginning of execution.
pashok25 [27]

Answer:

Compute I think

Explanation:

I'm not 100% sure

4 0
3 years ago
Write a program that accepts three decimal numbers as input and outputs their sums?​
coldgirl [10]

Answer:

The answer to this question is given below in the explanation section

Explanation:

The code is written in C++ language:

// Example program

#include <iostream>

#include <string>

using namespace std;

int main()

{

 double number [3];

 double addition=0;

 for (int i=0;i<3;i++)

 {

     cout<<"Enter decimal number at position " <<i+1< " ";

     cin>>number[i];

     addition= addition+ number[i];

           

     }

 cout<<"The addition is "<<addition;

}

5 0
3 years ago
1. Why does a computer have different types of ports?
iren2701 [21]

Answer:

Computer ports are classified into two types based on the protocols used. A protocol is a set of rules and standards to be followed during data transfer and communication. Usually, data is transmitted in a particular pattern.

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • Which networking model can the network now support that it could not support without the addition of the eighth computer?
    15·1 answer
  • When a routerâs interface is configured with multiple ip addresses with each address belonging to different networks, what is it
    10·1 answer
  • When installing a device driver, start the computer in
    14·1 answer
  • How are special characters added to a Word document? Check all that apply.
    11·2 answers
  • Mary is employed by a multinational firm, and works lon hours on a desktop computer. Recently, she experienced back pain and vis
    5·2 answers
  • Someone, please answer this.
    15·1 answer
  • What is the difference of using Selection Tool and Direct Selection Tool?
    6·1 answer
  • Pls help me Pls help me
    13·1 answer
  • After data is collected, how is it analyzed?
    10·1 answer
  • after adding a sound to a slide, the audio tools tab will allow you to apply artistic effects and quick styles to your sound ico
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!