1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
9

Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can

cover 350.0 square feet. So gallons = the square feet divided by 350.0. If the input is 250.0, the output should be:
0.714285714286
Computers and Technology
1 answer:
Zepler [3.9K]3 years ago
4 0

Answer:

The program in Python is:

Area = float(input("Area: "))

print("Gallons: "+str(Area/350.0))

Explanation:

The requirement of the program is straightforward and what is required is to divide the inputted area by 350.

Hence, the explanation is as follows:

This line prompts user for Area

Area = float(input("Area: "))

This line calculates and prints the equivalent number of gallons

print("Gallons: "+str(Area/350.0))

You might be interested in
RFID tags uses memory that is read-only.A. TrueB. False
rewona [7]

Answer:

true

Explanation:

4 0
3 years ago
Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary
Sergeeva-Olga [200]

Answer:

The answer is "One week".

Explanation:

Following are the number represents of the given values:  

Serial number (se)  = 200302028

Refresh (ref) = 3600 \ second =  1 \ hour

Updated -retry (ret)=  3600 \ second =  1 \ hour

Expiry =  3600 \times 24 \times 7 =  604800 \ second \ = 1 \ week

Minimum TTL =  3600 \ min = 1 \ h

3 0
3 years ago
A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
professor190 [17]

Answer:

wireless replay attack

Explanation:

Based on the scenario being described within the question it can be said that the type of attack that is being described is known as a wireless replay attack. Like mentioned in the question this is a network attack where an individual hijacks data in the middle of it being sent in order to copy it before the data reaches the intended recipient. This information can then be used for whatever the attacker intends.

6 0
3 years ago
Read 2 more answers
Q1 To remove filter
stealth61 [152]

Answer:

Click DATA, Look for "Sort & Filter", Click Filter Box (right above "Sort & Filter"). Done.

8 0
3 years ago
Read 2 more answers
A network administrator has been creating a baseline of network performance. During this process, he realizes that one router is
LiRa [457]

If the network administrator found that one of his routers is slow in performance better to check the traffic packet transactions. If any huge file size is been transferred better to disconnect the router and reconnect.

Possible to kill the network task packet so the network speed can be restored.

<u>Explanation:</u>

Moreover, possible to scan the end-user PC or workstation or desktop whether any malware or spyware is affected, if so better to remove that particular PC or workstation or desktop to disconnected from the router.

Updating the PC or workstation or desktop OS patches to be done at regular intervals.

5 0
3 years ago
Other questions:
  • What is the purpose of a title slide on power point
    14·2 answers
  • You are configuring IP settings on a new network. For the external interfaces, you decide to obtain registered IP addresses from
    5·1 answer
  • Insert the components that the computer uses to perform the tasks of each of the parts:
    13·1 answer
  • You might have trouble interpreting a message if:
    15·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • What is a web browser​
    9·1 answer
  • What is the purpose of application software policies? Check all that apply.
    9·1 answer
  • What does business informWhat does business information management do?
    12·1 answer
  • What is the function of ALU? <br>​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!