1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
6

Display the cost of landscaping a backyard with sod that is sold by the square foot and fencing that is sold by the foot. The in

put will be the length and width of the backyard, the price of sod per square foot and the price of fencing per foot.
Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
7 0

Answer:

length = float(input("Enter length of the backyard in foot: "))

width = float(input("Enter width of the backyard in foot: "))

sod_price = float(input("Enter the price of sod per square foot: "))

fencing_price = float(input("Enter the price of fencing per foot: "))

area = length * width

perimeter = 2 * (length + width)

cost = sod_price * area + fencing_price * perimeter

print("The cost of landscaping is $" + str(cost))

Explanation:

*The code is in Python.

Ask the user to enter the length, width, sod_price, and fencing_price

Calculate the area and perimeter of the backyard

Calculate the cost, sod_price * area + fencing_price * perimeter

Print the cost

You might be interested in
¿Por qué es importante que lo países crezcan a nivel tecnológico?
IrinaK [193]

Answer:

Importancia de la tecnología en el crecimiento económico de los países. ... El desarrollo de estas vías tecnológicas aporta un aspecto positivo como el ahorro del tiempo, la disminución de los esfuerzos de los trabajadores que permite una economía progresiva.

Explanation:

4 0
2 years ago
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
List some of the cautions related to costume change
Volgvan

Answer:

Costume Change?

Explanation:

You might not have enough time to complete the costume and it may look a little sloppy. Also, if you are in a play, everyone must be notified of the change.

4 0
2 years ago
What is the difference between arithmetic and relational operators​
denpristay [2]

Answer:

The arithmetic operator is used by the program to perform simple algebraic operations like addition, subtraction, multiplication, division, etc. Relational operators are the ones that are used to validate a relationship between the two operands as if they are equal, greater than, less than, etc.

4 0
2 years ago
What does a head frame do​
coldgirl [10]

Answer:

The main objects of a head frame, or poppet head, are to support the winding pulley firmly and to guide the cage above the surface to the discharging stage. 

7 0
3 years ago
Other questions:
  • What is faster a hi-speed usb port or superspeed usb port?
    13·1 answer
  • The waterfall model and spiral model are variations of SDLC. Do some research to find out what they are and explain how these mo
    14·1 answer
  • Describe shortly about the following Linux directories and theirpurpose,1. lib2. etc3. Boot4. Root5. home
    6·1 answer
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
    13·1 answer
  • Write down a pair of integers whose sum is​ 0
    5·1 answer
  • Which technique is best suited to create technical drawings?
    10·1 answer
  • What is another word for: a location in memory that contains a value? A. integer B. Boolean C. variable D. float PLEASE HELP URG
    10·1 answer
  • write the files used on QBASIC (If u will answer right answer I will follow U and U will got 40 points)​
    7·1 answer
  • Criminal investigations are limited to finding data defined in the search ____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!