1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kramer
3 years ago
8

The program below reads in the number of minutes entered by a user. The program that converts the number of minutes to hours and

minutes. Run the program, then modify the code to work in reverse: The user enters two numbers for hours and minutes and the program outputs total minutes.
Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
4 0

Answer:

Written in Python:

hours = int(input("Hours: "))

mins = int(input("Minutes: "))

result = hours * 60 + mins

print("Result: "+str(result)+" minutes")

Explanation:

This line prompts user for hours

hours = int(input("Hours: "))

This line prompts user for minutes

mins = int(input("Minutes: "))

This line calculates the required output

result = hours * 60 + mins

This line prints the required output in minutes

print("Result: "+str(result)+" minutes")

You might be interested in
A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
Finger [1]

Answer: True

Explanation:

Yes, the given statement is true that the due to the very low feasibility the IT (Information technology) department are not aware of the hidden backlog that basically contain projects.

The feasibility is the main factor in the IT department as it helps to study whole objective of the project and then also uncover all the strength and weakness of the project so that we can easily go through the details to make the project more efficient and reliable.

8 0
3 years ago
Hãy mô tả mô hình xử lý của hệ thống thông <br> tin kế toán tài chính trong một doanh nghiệp
GrogVix [38]
Yes because it’s the square size of life
6 0
2 years ago
Ano ang<br> rotasyon ng daigdig​
Degger [83]

Answer:  are you tying to ask a question

Explanation:

6 0
2 years ago
Read 2 more answers
Agent Hunt is transferring classified files from the CIA mainframe into his flash drive. SSS represents the size of the files on
stiv31 [10]

Answer:

The size on the drive before the transfer is 45 megabytes

Explanation:

Before transfer, t which is the time in seconds is 0. Therefore given the formula: S = 5t + 45,

substituting t into the formula gives;

S = 5(0) + 45

S = 0 + 45

S = 45

7 0
3 years ago
ABC inc. has built a large, normalized, relational database to capture current/historical data originating /copied from its tran
kow [346]

Answer:

"Datawarehouse" is the correct answer for the above question.

Explanation:

  • The Datawarehouse is a collection of large data or database which holds the historical data and the current or operation data for future decisions of the profit of the organization.
  • The decision can be made after being analyzed the data which is extracted from the Dataware house.
  • The above question also states the database which works like the above-defined concept. Hence Datawarehouse is the correct answer to the above question.
6 0
3 years ago
Other questions:
  • SOMONE TELL ME THERE ROBLOX USER NAME AND DO U PLAY IT!!!!! MINE IS Borutouzimaki2133
    9·2 answers
  • Maria found a cupcake recipe on a cooking blog. However, she would like to read comments and suggestions before she begins bakin
    6·2 answers
  • How many cells does the organism have?\
    5·2 answers
  • A user has a network device that streams media to the LAN. The device is visible on the network. All PCs on the LAN can ping the
    13·1 answer
  • How to be good at photography?
    5·2 answers
  • This exercise shows why each pivot (in eli1nination by pivoting) must be in a different row. (a) In Example 7, make the third pi
    15·1 answer
  • What is a good rule of thumb for how much white space you should have in a flyer or poster
    7·2 answers
  • Provide an example where a company has demonetized a market or industry.
    8·1 answer
  • Write a application that can determine if a 5 digit number you input is a palindrome. If the number is a palindrome then print "
    14·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!