1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
3 years ago
8

Write a program that has the user input how many classes they are taking this semester and then output how many hours they will

need to study each week. Assume that they need to study five hours per week for each class that they take.
Computers and Technology
2 answers:
NeTakaya3 years ago
8 0

wait i don't understand: "Write a program that has the user input how many classes they are taking this semester and then output how many hours they will need to study each week."

olya-2409 [2.1K]3 years ago
8 0

This is for Python

class_amt = int(input('Amount of Classes: '))

hours = class_amt * 5

print(f'You need to study for {hours} hours every week')

You might be interested in
you where discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every da
umka2103 [35]
Ahh, software. What is software piracy?
.
Ok... so it sounds evil.
.
BECAUSE IT IS!!
.
Software piracy can get you and suspected accomplices in court.
.
Fines up to a million dollars and lots of jail time.
.
Lots.
.
And lots.
.
But an effect of software piracy is that the software stealer himself earns money...
.
illegaly.
7 0
3 years ago
What is the most useful advantage of social media in an emergency response effort?
gladu [14]
Being able to communicate directly with constituents.

ability to build situational awareness speed in which information can be delivered directly to the public
4 0
3 years ago
What statement should you use to print the value of total with a precision of 5 digits?
Norma-Jean [14]

Answer:

Option A: print("The total is %0.5f" % total)

Explanation:

To ensure the value is rounded to a precision of 5 digits, we have to create a formatted string which is %0.5f. The <em>.5</em> denotes five decimal places and <em>f </em>refers to float data type.

Next, we use the <em>%</em> operator again and followed with the variable <em>total</em>. The % is used as a string modulo operator that will interpolate the value held by the the variable <em>total </em>in the formatted string that we create previously. The interpolated value will be rounded to 5 decimal places. For example, if

total = 256.786789

The output will be 256.78679

5 0
3 years ago
Betty is applying for a software analyst role. which field should she specialize in? information technology resource management
Schach [20]
Since Betty is applying for a software analyst role, she should specialize in INFORMATION TECHNOLOGY.

<span>Information technology or IT is defined as the study or use of systems in computers and telecommunications for storing, retrieving, and sending information.
</span>
Betty's role as a software analyst  would be to:
1) <span> study the </span>software<span> application domain,
2) prepare </span>software<span> requirements and specification (</span>Software<span> Requirements Specification) documents.
3) be the link between the software users and software developers.</span>
5 0
3 years ago
Read 2 more answers
Which of the following indicates the main benefit of having a larger hard drive on a computer
dem82 [27]
I would say the primary Beni fit is more space for storage , but also it does effect the speed eventually. If your hard drive is almost full, everything will be slower
8 0
3 years ago
Other questions:
  • What type of device is built into a tablet computer and can send data over radio waves to another device such as a laser printer
    10·1 answer
  • True or False: You cannot change the default margin size for Word documents.  
    6·1 answer
  • ____ software is rights-protection software used to control the use of a work.
    9·1 answer
  • A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
    8·1 answer
  • What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at t
    12·1 answer
  • Write if true or false
    12·1 answer
  • Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
    15·1 answer
  • Can anyone please help me out
    10·1 answer
  • How does digital and hybrid computers differ in portability​
    9·1 answer
  • Which option is typically only used when utilizing self joins?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!