1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
3 years ago
7

3.18: Pizza Pi Joe’s Pizza Palace needs a program to calculate the number of slices a pizza of any size can be divided into. The

program should perform the following steps: Ask the user for the diameter of the pizza in inches. Calculate the number of slices that may be taken from a pizza of that size. Display a message telling the number of slices. To calculate the number of slices that may be taken from the pizza, you must know the following facts: Each slice should have an area of 14.125 inches. To calculate the number of slices, simply divide the area of the pizza by 14.125. The area of the pizza is calculated with this formula: Area = "pi r squared" where pi is approximately 3.14159 and r is the radius (half the the diameter).
Computers and Technology
1 answer:
alina1380 [7]3 years ago
6 0

Answer:

#program in python.

#variables

slice_area=14.125

pi=3.14159

#read diameter

d=int(input("Enter diameter of pizza:"))

#area of pizza

area=pi*(d/2)*(d/2)

#number of slice

no_slice=int(area/slice_area)

#print slice

print("total silce are:",no_slice)

Explanation:

Declare and initialize a variable "slice_area" with 14.125 which is the area of a pizza slice.Initialize a variable "pi" with 3.14159.Then read the diameter of pizza.Find the area of pizza as "area=pi *d/2*d/2".Divide the total area with area of pizza slice.This will be the number of slice.

Output:

Enter diameter of pizza:20                                                                                                

total silce are: 22

You might be interested in
What will be the output of the following program? Assume the user responds with a 5.
FrozenT [24]

The output will be: You owe $ 15.0

4 0
3 years ago
network consisting of computers and other devices that are eithrr fully or partially connected to each other
tekilochka [14]

The answer is a Mesh topology. This method connects every device to each other device in the network. A wired full-mesh topology is not as common as it is impractical and highly expensive. A partial mesh topology offers redundancy if one of the connections goes down and usually uses a connecting medium such as a router to eliminate cables and expensive PCI NIC's.

8 0
3 years ago
Step into the year 2028. How are people viewing digital video? Or have we moved on to a completely new format?
WINSTONCH [101]

In the year 2028 I don't believe our digital video viewing experience would change too much considering most, if not all, the population is already satisfied with how easy, simple, and versatile our current experience is. If everything changes one thing will for sure remain unchanged. That one thing is cinemas, I don't think cinemas will ever change much as they provide a constant source of revenue while providing a place for family and friends to get together to watch a movie before it becomes available to other sources.


8 0
3 years ago
A(n) ____ is a computer that requests and uses network resources from a(n) ____.
Crazy boy [7]

A(n) client exists a computer that requests and utilizes network resources from a(n) server.

<h3>What is a computer network?</h3>
  • A computer network is a collection of computers that share resources that are available on or provided by network nodes.
  • The computers communicate with one another via digital links using standard communication protocols.
  • These links are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a variety of network topologies.
  • Nodes in a computer network can be personal computers, servers, networking equipment, or other specialized or general-purpose hosts.
  • They can be identified by network addresses and have hostnames.
  • Local-area networks (LANs) and wide-area networks (WANs) are the two basic network types.
  • A(n) client exists a computer that requests and utilizes network resources from a(n) server.

To learn more about computer network, refer to:

brainly.com/question/8118353

#SPJ4

6 0
1 year ago
Something which has a special meaning in a python programming language is termed as what?
Elis [28]

Answer:

Explanation:

A Dutch programmer named Guido van Rossum made Python in 1991.This also means Python is slower than a compiled language like C, because it to avoid changing the language to make it better until they have a lot of things to change.

Python is an interpreted, high-level and general-purpose programming language. Created by  This compact modularity has made it particularly popular as a means of  a rough transcription from another programming language is called unpythonic. It has fewer syntactic exceptions and special cases than C or Pascal.

plz mark as brainliest

6 0
3 years ago
Other questions:
  • The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
    6·1 answer
  • If you want to boot from a hard drive what must it have
    6·1 answer
  • How does adding additional light bulbs affect a series circuit?
    10·1 answer
  • 1). What is the proper name of the healing agent?
    5·1 answer
  • Friedman (1999) argues that "we are wrong to base health promotion in all societies on a Western framework for human development
    11·1 answer
  • Assume that a 5 element array of type string named boroughs has been declared and initialized. Write the code necessary to switc
    5·1 answer
  • What are some things that games were historically used for?
    7·1 answer
  • What is the velocity of a 0.100kg car with a momentum of 5 kgm/s?
    12·1 answer
  • Which iteration must have an expression that has a true or false value?
    10·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!