1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
6

When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit. Write a program that will help

a cook make taffy. The cook should be able to enter the temperature reading from their thermometer into the program. The program should continue to let the cook enter temperatures until the temperature is at least 270 degrees. When the mixture reaches or exceeds 270 degrees, the program should stop asking for the temperature and print Your taffy is ready for the next step!. However, if the temperature ever reaches above 330 degrees, print You burned the taffy!
Computers and Technology
1 answer:
hichkok12 [17]3 years ago
3 0

Answer:

The solution code is written in Python 3.

  1. temp = int(input("Enter current temperature (Fahrenheit): "))
  2. while(temp < 270):
  3.    temp = int(input("Enter current temperature (Fahrenheit): "))
  4.    
  5. if(temp > 330):
  6.    print("You burned the taffy!")
  7. else:
  8.    print("Your taffy is ready for the next step")

Explanation:

Firstly, we can try to get a first temperature reading (Line 1)

if the first reading is smaller than 270, keep prompting user for the next reading using while loop (Line 3 - 4)

if the input temperature is bigger or equal to 270, the program will exist the while loop and proceed to check if the final temperature reading is bigger than 330 to determine an appropriate message to display (Line 6 - 9).

You might be interested in
Find out about the different technological solutions available for interconnecting LANs to from larger networks such as wide are
drek231 [11]

The different technological solutions available for interconnecting LANs to from larger networks are:

  • Ethernet
  • Wi-Fi

<h3>What technology is used by wide area network?</h3>

The use of WAN Connections and Technology is known to be often used in wide areas or places.

Note that Wired WANs makes use of broadband internet services and also the use of multiprotocol label switching (MPLS) in traffic flow control  and network speed up process.

Note also the use of wireless WANs  such as 4G/5G and Long-Term Evolution (LTE) networks can help interconnecting LANs to from larger networks.

Learn more about LANs from

brainly.com/question/8118353

#SPJ1

6 0
2 years ago
Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus
Artemon [7]

Answer:

The answer is "Creates a profile, that permits master-detail relationship".

Explanation:

This relationship provides the relationship between parent and child when masters describe as a parent and information describes a child by which the main item controls the actions of the object of the detail.  

  • In this relationship, the main object history is destroyed, the detailed object associated with it will also be lost.
  • It lists all related information on the details page of the database, and other choices were wrong which can't be defined in the given senior.
4 0
4 years ago
What is the target audience for this poster?
bija089 [108]

Answer:

there is no car on a bus a bus is one long vehicle

Explanation:

7 0
3 years ago
Read 2 more answers
Which item is not part of a college application
olga_2 [115]

Answer:

Explanation:

application form and any fees

4 0
3 years ago
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
Other questions:
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • George and Miguel want to know more about their local and online competitors and about the retail industry. What is the best way
    9·1 answer
  • How can i complain a rude comment
    7·1 answer
  • When examining the digital evidence, what stage deals with using keyword searches and file-carving utilities to locate data that
    5·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • Who invented Leibnitz calculating machine ?
    12·1 answer
  • Which of these functions may be used with positional arguments? Select four options.
    10·1 answer
  • If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/A
    7·1 answer
  • An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RR
    5·1 answer
  • Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y =
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!