1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
13

Complete the program by writing and calling a function that converts a temperature from Celsius into Fahrenheit. Use the formula

F = C x 9/5 + 32. Test your program knowing that 50 Celsius is 122 Fahrenheit.
Computers and Technology
1 answer:
Rina8888 [55]3 years ago
4 0

Answer:

C = int(input("Enter a number ::))

F = (C * (9 /5)) + 32

print(" {} in Fahrenheit is {} ". format(C, F))

Explanation:

The program takes an input from the user and converts the input to a fahrenheit.

You might be interested in
Which of the following is not a benefit of introducing an e-commerce solution to an organisation?
emmainna [20.7K]

Answer:

A. Improving human resource management by offering more information to employees about available services, from annual leave arrangements to retirement plans.

Explanation:

e-commerce is a short for electronic commerce and it can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.

This ultimately implies that, e-commerce is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.

Some of the benefit of introducing an e-commerce solution to an organisation's includes;

I. Improving internal communication by offering various means for exchanging information with minimum effort and cost.

II. Reducing the personalisation of services.

III. Supporting purchasing functions by offering responsive pricing models based on the analysis of market status.

7 0
3 years ago
একটা ছবি কতটি কথার সমান?
OlgaM077 [116]

Answer:

একটি ছবির মূল্য 84.1 শব্দের

Explanation:

8 0
3 years ago
What other identifiers would you need to alter in a cloned virtual machine to be sure it was unique? What might happen if these
Romashka [77]

Answer:

Following identifiers needs to be altered in cloned VM.

  1. Changing the IP address
  2. Selecting Ethernet Ports
  3. Rename the Pointers
  4. Renaming the Second Disk Drive
  5. Host names must be unique
  6. Rename the VM name

Explanation:

When we clone the VM, we have to make sure that Cloned VM should have unique system information and network addresses in and out of guest OS.

If UUID’s of all cloned VM's are different then DHCP will get separate ip addresses for those. Suppose if the IP addresses are static or If the IP address was hardcoded then it has to be changed to new IP address manually. If this is not done then it will cause duplicate IP’s and will cause networking issues.

When Cloned VM is created then the ethernet port has to be chosen correctly to make sure that LAN networking is correct.

You should specify the disk capacity. If you choose disk capacity as single file then it will create one vmdk file. So, specify the correct disk capacity, If you did not choose the disk file as single file then you may end up having multiple .vmdk files. So in that case you need to rename the pointers of copy of vmdk files.

Rename the Second Disk Drive. For example : You may find two VM files with VM Copy.vmdk, So you have to rename second disk to VM Copy-1.vmdk or any other name.

The cloned VM copies the parent virtual machine and it also includes the VM name. To avoid problems caused by having VM's with duplicate names on the network, give the VM in the cloned VM a unique name.

You have to make sure that hostnames are different as well. Hostname resolution will lead to conflict if its same on both VM's.

7 0
4 years ago
This is how you debug code ​
Bogdan [553]

Answer:

thanks for teaching us how to debug

Explanation:

4 0
2 years ago
The command button to protect a document is part of the​.
Arlecino [84]

Answer:

C file tab

Explanation:

hope this helps

7 0
4 years ago
Other questions:
  • what is the goal of technology A. to understand how the natural world functions B. to study the natural world C. to improve the
    9·1 answer
  • - The concept of communication competence suggests there is no single "ideal" or "effective" way to communicate in every situati
    6·2 answers
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
    8·1 answer
  • What is the purpose of networking with other businesses?
    10·1 answer
  • ​ In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until ___
    5·2 answers
  • Drag each label to the correct location. Each label can be used more than once. Match the device to the port through which it co
    15·1 answer
  • What tool can help discover and report computer errors when you first turn on a computer and before the operating system is laun
    9·2 answers
  • PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
    14·1 answer
  • HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!