1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
3 years ago
11

Define function multiply(), and within the function: Get user input() of two strings made of whole numbers Cast the input to int

() Multiply the integers and return the equation with result as a str()
Computers and Technology
1 answer:
fredd [130]3 years ago
7 0

Answer:

def multiply():#defnition of a function multiply.

   return str(int(input("enter the vale of first whole number: "))*int(input("Enter the value of the second whole number: "))) # it is used to take the two value and then print the multiplication of that value after converting it into integer.

Explanation:

  • The above code is in python language, which holds the function multiply. The user can use this function when he calls the function.
  • The first line of the function will render a message to enter the two whole numbers and then take the two values from the user.
  • The value is get converted into an integer value.
  • Then the value is getting multiplied.
  • Then the value is returned with the help of return function after converting it into a string value.
  • The input function is used to take the value, int function is used to convert the value in integer,'*' is used to multiply, and str function is used to convert the multiplication into a string value.
You might be interested in
You would like to enter a formula that subtracts the data in cell B4 from the total of cells B2 and B3. What should the formula
anastassius [24]

Answer:

=b2 b3-b4 or something close to that, I hope this helps ^^

Explanation:

6 0
3 years ago
Is a collection of limited versions of Microsoft office programs
alexgriva [62]
A Microsoft Office Suite.

 An office suite is a collection of Microsoft Office productivity software and is readily available for both Windows and Macintosh Operating System. A list of these programs includes, Microsoft Word, Excel, Access, Powerpoint, Publisher, and Outlook. Each of these programs serve a different purpose. 

3 0
3 years ago
What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
vovangra [49]
The threats as well as the risk and vulnerabilities are present with the WLAN. The WLAN would encounter security issues with the range of the signal which is wireless, SSID broadcasting, password security and the packet sniffing or the capturing of signal.
4 0
3 years ago
Meaning of mesh topology​
Pachacha [2.7K]

The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

<h3>What is meant by mesh topology?</h3>

Mesh topology is a kind of networking that is said to be where the full nodes do act in a form of a cooperation  so that they can be able to share or distribute data among themselves.

Note that this topology was said to be first seen or developed in about an approximate of about 30+ years ago and it is one that is often used in military applications and now it is seen to be used in home automation, smart HVAC control, and others.

Hence, The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

Learn more about mesh topology​ from

brainly.com/question/14879489

#SPJ1

6 0
1 year ago
List and discuss five economic growth indicators
patriot [66]
Strong employment numbers. To see economic growth there needs to be an increase in Gross Domestic Product (GDP). ...
Stable Inflation. ...
Interest rates are rising. ...
Wage Growth. ...
High Retail Sales. ...
Higher New Home Sales. ...
Higher Industrial Production.
5 0
2 years ago
Other questions:
  • What role do career pathways play?
    11·2 answers
  • What action makes RAM on your computer disappear?
    12·2 answers
  • Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion o
    9·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • ___________ is a computer processor which incorporates the functions of a computer's central processing unit (CPU) on a single i
    15·2 answers
  • The architecture in which the database resides on a back-end machine and users access data through their workstations is
    5·2 answers
  • The graphic shows a cause and effect organizational aid.
    6·1 answer
  • What was software for modems that connected through phone lines called?
    6·1 answer
  • Write bubblesort algorithm using random programming language
    13·2 answers
  • Giving brainliest to the Person finishes this song lyric.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!