1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
4 years ago
14

Write a program that accepts as input the mass, in grams, and density, in grams per cubic centimeters, and outputs the volume of

the object using the formula: volume mass / density. Format your output to two decimal places.
Computers and Technology
1 answer:
rewona [7]4 years ago
3 0

Answer:

Program for the above question in python:

mass = float(input("Enter the mass in grams")) # It is used to take the mass as input.  

density = float(input("Enter the density grams per cm cube")) # It is used to take the input for the grams.

print("Volume ={:.2f}".format(mass/density)) #It is used to print the Volume.

Output:

  • If the user inputs as 2.98 and 3.2, then it will results as 0.92.

Explanation:

  • The above code is in python language, in which the first statement is used to take the inputs from the user for the mass and sore it into a mass variable.
  • Then the second statement also takes the input from the user and store it into a density variable.
  • Then the third statement of the code is used to print the volume up to two places using the above-defined formula.
You might be interested in
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
Digital security measures include _____. Select 2 options.
elixir [45]

Answer:

firewalls

passwords

8 0
3 years ago
Read 2 more answers
What does this comparison block indicate?
natima [27]

Answer:

This comparison block indicates that the comparison is true if the left side is equal to the right side.

Explanation:

The comparison uses the = operator, which is the assignment operator in most programming languages. This operator is used to assign a value to a variable. In this case, the comparison is checking whether the value of the getItem variable is equal to 5. If the value of getItem is equal to 5, then the comparison will evaluate to true. If the value of getItem is not equal to 5, then the comparison will evaluate to false.

5 0
1 year ago
Factor f(x)=x^3-6x^2+9x
liq [111]
Since all terms have an x in them, you can first factor that out, yielding:

f(x) = x(x² - 6x + 9)

Then you are looking for numbers that multiplied give 9 and added give -6, which is -3 and -3. So the final factorization is:

f(x) = x(x-3)²

6 0
3 years ago
A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
satela [25.4K]

Answer:

Carbon Monoxide poisoning

Explanation:

According to my research on studies conducted by various medical professionals, I can say that based on the information provided within the question the most likely cause for this is Carbon Monoxide poisoning. This is a gas very similar to oxygen although it is poisonous to living organisms and very flammable. When inhales displaces oxygen on hemoglobin molecules which then formes carboxyhemoglobin complexes, which causes the mucous membrane to become bright red.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Other questions:
  • What does nntp stand for?
    12·2 answers
  • In normal view, powerpoint's ________ contains buttons such as notes, comments, and view.
    14·1 answer
  • What will happen if a user clears the analytics cookie from their browser?
    7·1 answer
  • An IT company revises its process parameters in response to complaints from vendors that products were not ready on time. This w
    15·1 answer
  • The purchase of a computer by a person for household use would be counted in what category of GDP?
    15·1 answer
  • Can someone please help me on these short short questions marking Brainly computer modeling people please help
    14·1 answer
  • When would it be most beneficial to package a presentation on a CD? Check all that apply. when sending the file via email for di
    6·2 answers
  • Python;
    6·1 answer
  • What is the main advantage of using a WYSIWYG("what you see is what you get")editor when constructing a website
    5·1 answer
  • Cisco cyber security would classify this email?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!