1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
7

Read three integers from user input. Then, print the product of those integers. Ex: If input is 235, output is 30. Note: Our sys

tem will run your program several times, automatically providing different input values each time, to ensure your program works for any input values.
1 first-2
2 second-3
3 third=5
4 s=int(first second third)
5 print(s)
Computers and Technology
1 answer:
sesenic [268]3 years ago
5 0

Answer:

The program in Python is as follows:

first = int(input())

second = int(input())

third = int(input())

s = first * second * third

print(s)

Explanation:

This prompts the user for first input

first = int(input())

This prompts user for second input

second = int(input())

This prompts user for third input

third = int(input())

This calculates the product

s = first * second * third

This prints the calculated product

print(s)

You might be interested in
Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct
OlgaM077 [116]

Answer: C. Netiquette.

Explanation: Netiquette simply means online etiquette. Etiquette means standard behavioral principle or conduct required of an individual who is polite, responsible and law abiding. Netiquette could be explained as the standard or acceptable code of conduct an internet user is expected to follow. Such conduct could include ; avoiding the use of all caps( capital letter while typing), careful consideration of acts which could violate other user's privacy and lack of courtesy.

4 0
3 years ago
What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
dalvyx [7]

Answer:

WPAN ( wireless personal area network )

Explanation:

a. PAN ( personal area network )

This network is limited to the work place of a single person. Hence, the name given as personal area network. The devices connected by PAN belong to the range supported by the technology used to implemented the personal area network.

The devices present in this type of work place are connected to each other through PAN. PAN can connect computer, mobile and other technological devices which support PAN.

The data is transferred among these devices through PAN.

Both wireless and wired networks can be used to implement PAN. Wired PAN is achieved by using USB. Wireless PAN uses various technologies which are discussed below.

b. WPAN ( wireless personal area network )

The wireless PAN covers only short distance and hence requires low power.

The distance can range from few centimetres to few meters.

IEEE 802 has described the technologies and standards for each type of network. This network is implemented mainly by technologies such as Bluetooth, wireless USB, IrDA.

1. Bluetooth uses radio waves of short waves. Devices like keyboard, mobile phones, personal digital assistant ( PDA ) use this technology to communicate.

WPAN implemented using Bluetooth is known as piconet. It can connect up to 8 devices. Among them, one is the master device while rest devices become the slaves.

The range of such a network varies from 10 meters to 100 meters.

2. IrDA stands for Infrared Data Association. This technology uses infrared light. Examples using this technology include printers and scanners.

Plugging in

i. Devices supporting WPAN can only communicate with each other when they are within the supported range or distance from each other.

ii. In addition, these devices should have the capability to block devices which will cause unnecessary interference or are not authorized to gain information.

5 0
3 years ago
HELP PLZZZZZZZZ!!!!!!!!!!!
adelina 88 [10]

Answer:

Its either business format franchise or business brokers

7 0
3 years ago
What did do you do if you made a mistake on a computer?
Andrej [43]
Get ADW cleaner, and ccleaner. It will work on almost any bug. It basicley wipes out cache (ccleaner), and cleans ad ware off your device (ADW). If it is something else email, a snap shot of your problem. My email is, [email protected] Rate me crown me thank me. If it really helped, crown me. If it helped, thank me. Rate me, and comment.
5 0
3 years ago
Read 2 more answers
It takes an older computer twice as long to send out a company's email as it does a newer computer. Working together, it takes t
bulgar [2K]

Answer:

13,33  MIN.

Explanation:

1. Time with Older Computer (OC) = 2 time with New Computer (NC)

2. OC+ NC = 10 MIN.

replacing 1. in 2.    OC + OC/2 = 10 min.  

1.5 OC =10min

OC=6.66 MIN

NC = 3,33 MIN.

If we replace NC with OC , 3,33 min will take 2 times (6,66 min)

Total Time = 6,66 + 6,66= 13,33 min

4 0
3 years ago
Other questions:
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an i
    7·1 answer
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space a
    10·1 answer
  • Which is an advantage that electronic scheduling tools have over paper calendars?
    13·2 answers
  • When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the
    6·2 answers
  • The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.
    7·1 answer
  • why is the disk method a special case of the general slicing​ method? choose the correct answer below. a. the cross sections of
    7·1 answer
  • Small data files that are deposited on a user's hard disk when they visit a website are called _______.
    6·2 answers
  • Which option is referred to by the Reports Due tag?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!