1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
8

Consider the following line of code: price= input(Please enter the price: ") What would be the next line in your code that will

allow you to store the price as a decimal number price price(decimal) price float(price) price decimal(price) price int(price
Computers and Technology
1 answer:
hodyreva [135]3 years ago
6 0

Answer:

price float(price)

Explanation:

There are four basic type of data type use in the programming to declare the

variable.

1. int:  it is used for integer values.

2. float:  it is used for decimal values.

3. char:  it is used for character values

4. Boolean: it is used for true or false.

in the question, the one option contain the data type float (price float(price)). So, it store the value in decimal.

price int(price):  it store the value in integer.

price decimal(price):  it is wrong declaration of variable. their is no data type in the programming which name is decimal.

price price(decimal):  it is wrong declaration of variable. their is no data type in the programming which name is price.

You might be interested in
What process describes using technology as a basis for controlling the access and usage of sensitive data?
Ipatiy [6.2K]

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

6 0
2 years ago
What impact did congress declaration on copyrighting sound recordings have on home recording and record sales
cricket20 [7]

Answer:

By the late 1980s, several manufacturers were prepared to introduce read/write digital audio formats to the United States. These new formats were a significant improvement over the newly introduced read-only (at the time) digital format of the compact disc, allowing consumers to make perfect, multi-generation copies of digital audio recordings. Most prominent among these formats was Digital Audio Tape (DAT), followed in the early 1990s by Philips' Digital Compact Cassette (DCC) and Sony's Minidisc.

DAT was available as early as 1987 in Japan and Europe, but device manufacturers delayed introducing the format to the United States in the face of opposition from the recording industry. The recording industry, fearing that the ability to make perfect, multi-generation copies would spur widespread copyright infringement and lost sales, had two main points of leverage over device makers. First, consumer electronics manufacturers felt they needed the recording industry's cooperation to induce consumers – many of whom were in the process of replacing their cassettes and records with compact discs – to embrace a new music format. Second, device makers feared a lawsuit for contributory copyright infringement.[1]

Despite their strong playing hand, the recording industry failed to convince consumer electronics companies to voluntarily adopt copy restriction technology. The recording industry concurrently sought a legislative solution to the perceived threat posed by perfect multi-generation copies, introducing legislation mandating that device makers incorporate copy protection technology as early as 1987.[2] These efforts were defeated by the consumer electronics industry along with songwriters and music publishers, who rejected any solution that did not compensate copyright owners for lost sales due to home taping.[3]

The impasse was broken at a meeting in Athens in 1989, when representatives from the recording industry and the consumer electronics industry reached a compromise intended to enable the sale of DAT recorders in the United States. Device manufacturers agreed to include SCMS in all consumer DAT recorders in order to prevent serial copying. The recording industry would independently pursue legislation requiring royalties on digital audio recording devices and media.[4]

A year later the songwriter Sammy Cahn and four music publishers, unhappy with the absence of a royalties provision in the Athens agreement, filed a class action copyright infringement suit against Sony.[5] The plaintiffs sought declaratory and injunctive relief that would have prevented the manufacture, importation or distribution of DAT recorders or media in the United States. The suit brought Sony to heel. In July 1991, Sony, as part of larger agreement between the recording industry and consumer electronics makers, agreed to support legislation creating a royalty scheme for digital media. In exchange, Cahn and the publishers agreed to drop the suit.[6]

With all the major stakeholders satisfied, the bill easily passed both houses of Congress. President George H. W. Bush signed the AHRA into law in 1992 proclaiming " S. 1623 [AHRA] will ensure that American consumers have access to equipment embodying the new digital audio recording technology. It also protects the legitimate rights of our songwriters, performers, and recording companies to be fairly rewarded for their tremendous talent, expertise, and capital investment. This will be accomplished by fairly compensating these artists for the copying of their works and by creating a system that will prevent unfettered copying of digital audio tapes."

3 0
3 years ago
Read 2 more answers
50 POINTS! What can be viewed in the Tasks folder? Check all that apply.
Rom4ik [11]

1, 2, and 4 :))) good luck

6 0
3 years ago
Read 2 more answers
Implement the function charCnt. charCnt is passed in a name of a file and a single character (type char). This function should o
SVEN [57.7K]

Answer:

Answered below

Explanation:

//Program is written in Python programming language

def charCnt( fileName, char){

if not fileName.exists( ):

return sys.exit(1)

else:

openFile = open("$fileName.txt", "r")

readFile = openFile.read( )

fileLength = len (readFile)

count = 0

for character in range(fileLength):

if readFile[character] == char:

count++

openFile.close( )

return count

}

7 0
2 years ago
Can someone please help me in answering this!?! <br> The language is C++
Llana [10]

Here is a somewhat cryptic solution that works:

#include <algorithm>

#include <cstdlib>

using namespace std;

void q(char c, int count)

{

for (int i = 0; i < count; i++) {

 putchar(c);

}

}

void p(int b1, int plusses)

{

q(' ', b1);

q('+', plusses);

}

int main()

{

for (int i = -3; i <= 3; i++)

{

 int pl = min(6, (3 - abs(i)) * 2 + 1);

 p(6-pl, pl);

 i == 0 ? p(0, 6) : p(6, 0);

 p(0, pl);

 putchar('\n');

}

getchar();

}


5 0
3 years ago
Other questions:
  • A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
    10·1 answer
  • Interior gateway protocols are used by routers in order to share information within a single
    9·1 answer
  • Instructions:Drag the tiles to the boxes to form correct pairs.
    11·2 answers
  • Which CSS attribute would change an element's font color to blue
    15·2 answers
  • Type 1 hypervisor:
    10·1 answer
  • Which of the following is not considered format?
    8·2 answers
  • Which of the following browsers was introduced with windows 10?
    10·1 answer
  • _____ describes the layout of the screen. Block-based, Interface, Editor, Player
    11·2 answers
  • What are the major benefits of preproduction?
    11·1 answer
  • Write a method in pseudocode or Java called move that accepts a boolean[], integer value, and a boolean value. Your method shoul
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!