1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
9

Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use? float() int() print()

string()Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use? float() int() print() string()
Computers and Technology
2 answers:
Goshia [24]3 years ago
5 0

Answer:

float()

Explanation:

I think you are talking about python and if you are then that is great. I always use python and here are the meanings of all of them

float() = incude dicimal

int() = round down or take away the digits less then 1

print() = show on the screen whatever you write inside

string() = turn a number into a word or sentance so it can be printed (for some reason python  can not print numbers, only words)

kotykmax [81]3 years ago
3 0

Answer:

I think it is float()

You might be interested in
Which of the following is an example of a federal tax? A. Social Security tax B. Sales tax C. Property tax D. Transaction tax
Nastasia [14]
Property tax should be the correct answer
6 0
3 years ago
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
3 years ago
Read 2 more answers
Define Based Assessment ​
Oduvanchick [21]

Explanation:

In an educational setting, standards-based assessment is assessment that relies on the evaluation of student understanding with respect to agreed-upon standards, also known as "outcomes". The standards set the criteria for the successful demonstration of the understanding of a concept or skill -WIKIPEDIA

8 0
2 years ago
A computer lab is an example of what type of network
alexandr402 [8]

computers i think i dont sounds right to me

4 0
3 years ago
A*=++a/6+b++ 3 if a=3,b=4​
Vinil7 [7]

Answer:

a=22.5

Explanation:

Given

a*=++a/6+b++3

Required

The result when a=3 and b=4

Analyzing the given instruction

a*=(++a)/(6)+(b++3)

Single out and solve the expressions in bracket

(++a) = a -- When the ++ operator appears before an operand, it is called pre increment. meaning that the operation will be done before the operand will be incremented.

So: in this case: ++a = a

b++3 = b + 3

The operator, as used in that statement is the same as: b + 3.

So:

a*=(++a)/(6)+(b++3)

a*=(a)/(6)+(b+3)

a*=(3)/(6)+(4+3)

a*=0.5+7

a*=7.5

The above expression is calculated as:

a=a*7.5

So:

a=3*7.5

a=22.5

8 0
3 years ago
Other questions:
  • Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
    5·2 answers
  • Does functionality provided by the app play an important role in a decision to
    13·1 answer
  • Press the _______ key to move to the next cell in a row.
    5·1 answer
  • I want pizzzzzzzaaaaaaaaaaa
    9·1 answer
  • python This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defi
    5·2 answers
  • Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
    13·1 answer
  • When was the Ethics Resource Center (ERC) established? In the 1970s In the 1980s In the 1990s In the 2000s
    14·1 answer
  • Briefly describe the fundamental differences between project-based and product-based Software Engineering.
    10·1 answer
  • The _________________ can be used to repair common causes of unbootable operating systems. It is based on the Windows Preinstall
    6·1 answer
  • when an overridden method is called from within a subclass, it will always refer to the version of that method defined by the (a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!