You would click the right button to a shortcuts
Answer:
weight = float(input("Enter your weight in pounds: "))
height = float(input("Enter your height in inches: "))
weight = weight * 0.45359237
height = height * 0.0254
bmi = weight / (height * height)
print("Your BMI is: %.4f" % bmi)
Explanation:
*The code is written in Python.
Ask the user to enter weight in pounds and height in inches
Convert the weight into kilograms and height into meters using given conversion rates
Calculate the BMI using given formula
Print the BMI
Complete Question: You decide to bulk upload your multiple business locations to Google My Business. Some of the locations in your upload were disapproved. Which two errors can cause this issue? (Choose two.)
A Missing listing photos
B Late listing registration
C Multiple locations in one physical address
D Too many listing users
E Incorrect business name
Answer:
C) Multiple locations in one physical address
E) Incorrect business name
Explanation:
Google provides a service called Google My Business which allows users with the aid of special tools create, update and maintain their business profiles on the internet. In this way, users are able to build free simple websites and publish posts to engage their customers more effectively.
In the process of signing up for this service, new users are required to verify their business names and physical locations, In the given question a user trying to upload multiple business locations will not get approval if he uploads Multiple locations in one physical address or enters an Incorrect business name.
Solution:
The first step in devising security services and mechanisms is to develop a security policy.
A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
This is the required answer.
Answer:
// here is code in c++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main() {
// variables to read birth month and year
int birthMonth,birthYear;
cout<<"Enter the birth month:";
// read the birth month
cin>>birthMonth;
cout<<"Enter the birth Year:";
// read the birth year
cin>>birthYear;
// print the output
cout<<birthMonth<<"-"<<birthYear<<endl;
return 0;
}
Explanation:
Declare two variables "birthMonth" and "birthYear". Read the value of birthMonth and birthYear from user. Then print the birth month and birth year and a dash(-) in between them.
Output:
Enter the birth month:1
Enter the birth Year:2000
1-2000
Enter the birth month:5
Enter the birth Year:1950
5-1950