1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
2 years ago
15

Input a string of digits. Convert the string to an int. Print the int. Convert the string to a float. Print the float.

Computers and Technology
1 answer:
ollegr [7]2 years ago
7 0

Answer:

x_inp = [ '1', '2', '3']

   int_val = [ int(a) for a in x_inp ]

   print("integer: int_val")

y_inp = [ '1.0', '2.0', '3.0']

flo_val = [ float(a) for a in y_inp ]

   print("float: flo_val")

Explanation:

All the items in the arrays x_inp and y_inp are coverted to integer and float data types respectively with the for loop statement, which individually assigns the resolved integer and float values to the memory locations int_val and flo_val respectively.

The output becomes,

integer:

1

2

3

float:

1.0  

2.0

3.0

You might be interested in
What happens in the process represented by the flowchart ?
Readme [11.4K]

Answer:

the person drinks water if the answer to “thirsty?” is yes

5 0
3 years ago
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
antiseptic1488 [7]

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, <u>it would have been better if the writer includes experience with a computer virus</u> so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

3 0
2 years ago
Someone help ASAP! Match the type of information system with its description.
iragen [17]

Internal Information

6 0
2 years ago
Read 2 more answers
Please select the word from the list that best fits the definition<br><br> Plagiarism
Pachacha [2.7K]
The practice of taking someone else's work or ideas and passing them off as one's own.
5 0
1 year ago
Read 2 more answers
You will start by doing a bit of research on viewfinders and LCD displays on digital cameras. After you feel that you have an un
Lemur [1.5K]

Answer:

SOMEBODY ANSWER IT

Explanation:

JESUS C

3 0
3 years ago
Other questions:
  • Write a program that can be used to gather statistical data about the number of movies college students see in a month. The prog
    11·1 answer
  • Consider a movie database in which data is recorded about the movie industry. the data requirements are summarized as follows:
    15·1 answer
  • You can use Facebook's Live Feed tool to broadcast content as you post it, true or false?
    11·1 answer
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • The set of rules for how computers talk to one another
    6·1 answer
  • Linda is viewing the campaign report in her Google Ads account after successfully implementing conversion tracking tags for her
    7·1 answer
  • Is there a way to earn free robux
    7·2 answers
  • What is the result of executing the following code? You can assume the code compiles and runs. #include using namespace std; voi
    6·1 answer
  • Types of data processing
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!