1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
3 years ago
11

Define function multiply(), and within the function: Get user input() of two strings made of whole numbers Cast the input to int

() Multiply the integers and return the equation with result as a str()
Computers and Technology
1 answer:
fredd [130]3 years ago
7 0

Answer:

def multiply():#defnition of a function multiply.

   return str(int(input("enter the vale of first whole number: "))*int(input("Enter the value of the second whole number: "))) # it is used to take the two value and then print the multiplication of that value after converting it into integer.

Explanation:

  • The above code is in python language, which holds the function multiply. The user can use this function when he calls the function.
  • The first line of the function will render a message to enter the two whole numbers and then take the two values from the user.
  • The value is get converted into an integer value.
  • Then the value is getting multiplied.
  • Then the value is returned with the help of return function after converting it into a string value.
  • The input function is used to take the value, int function is used to convert the value in integer,'*' is used to multiply, and str function is used to convert the multiplication into a string value.
You might be interested in
A debate about city schools are more better than village schools​
Vladimir [108]
No it is not because village school is the traditional education
6 0
3 years ago
Why does a layer 3 device perform the anding process on a destination ip address and subnet mask?
mafiozo [28]
To get the network number and node number of the destination machine. The subnet mask is usually called the NETwork MASK, so anding it with the address gives you the network number. Using the not logical operator on the netmask then protects the node bits in a second and operation.

address & netmask = network number
address & not( netmask ) = node number

The not operator essentially just flips the bits of it's argument.
8 0
3 years ago
given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at
Tamiku [17]

Answer:

new_list = play_list[0:4]

Explanation:

5 0
3 years ago
Why is translator required?​
stich3 [128]

In Lanugange=Hi! translator is required because if you visit a different country and you don't know the language than a translator will help a lot

In computer=Hi! It translates a high level language program into machine language program the central processing unit (CPU) can understand.

5 0
2 years ago
Read 2 more answers
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • In preparing categorical variables for analysis, it is usually best to​ Select one:
    6·1 answer
  • Which type of financial institution typically has membership requirements?
    9·2 answers
  • The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
    7·2 answers
  • You use ddl to create, modify, and delete the ___________________________ of a database.
    6·1 answer
  • Suppose users share a 1 Mbps link. Also suppose each user
    10·1 answer
  • Which type of chart or graph uses vertical bars to compare data? a Column chart b Line graph c Pie chart d Scatter chart
    14·2 answers
  • HELP ASAP!!<br> What is the difference between an internal event and an external event?
    10·1 answer
  • Which letter shows the ball when it has the maximum kinetic energy
    15·1 answer
  • Which of the following is one of the first two levels of formatting in a Word document?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!