1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
12

350 square feet requires 1 gallon of paint. Assign gallons_paint with the amount of paint required for wall_area. Sample output

for the given program:
250.0 square feet wall will need:
0.714285714286 gallons of paint
Computers and Technology
1 answer:
Marina CMI [18]3 years ago
4 0
Here's a solution in node.js. Can be easily transcribed to other languages:

var paint_per_sqf = 1/350;
var wall_area = 250.0;
var gallons_paint = wall_area * paint_per_sqf;

console.log(wall_area.toFixed(1) + " square feet wall will need:");
console.log(gallons_paint.toFixed(12) + " gallons of paint");


You might be interested in
……………………is one of the most popular cloud storage facilities.​
lord [1]
Chcgzrsfchvuvjbnkggvbbb.
4 0
3 years ago
You can include up to _____ logical conditions in the and function. (487181)
Allushta [10]
Hi ! 

<span>You can include up to <u>255</u> logical conditions in the and function. </span>
8 0
3 years ago
As the number of billboards for a firm's product increases from 100 to 500, its sales increase from $1,000 to $10,000. If this i
KonstantinChe [14]

Answer:

0.444

Explanation:

Formula for slope = (X2 - X1)/(Y2 - Y1)

X1 =100

X2 = 500

Y1 = 1000

Y2 = 10000

Slope = (500 - 100)/(10000 - 1000)

=400/9000

=4/90

=0.04444

Number of bill(X axis) against sales (Y axis)

4 0
4 years ago
A type of technology that can be attached to a tag and used to identify postal packages is a(n)
deff fn [24]

Answer: bar code

Explanation: that is what it is

5 0
4 years ago
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code
Maslowich
A Cryptographich hash is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
3 0
3 years ago
Other questions:
  • Presentation software allows users to _____.
    15·1 answer
  • Use the Law of Sines to solve the triangle. Round your answers to two decimal places.
    6·1 answer
  • What are different types of inner classes ?
    8·1 answer
  • What does the following code segment do?
    13·1 answer
  • What type of computer system can be found in the computer lab at school?
    14·1 answer
  • Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a l
    5·1 answer
  • Which of the following are factors that can cause damage to a computer? Check all of the boxes that apply.
    13·2 answers
  • Internet speed test, why does it take some time to get maximum speed
    14·1 answer
  • PLEASE HELP THIS IS CONFUSING ME
    8·2 answers
  • Suppose a computer's login mechanism first asks for a user name, and then for the password, regardless of whether or not the log
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!