1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
2 years ago
7

Can u write a python program with this output

Computers and Technology
1 answer:
cestrela7 [59]2 years ago
3 0

Answer:

Not exact, but it will help.

Explanation:

do something like this.

       print("""

       this program will help you plan your garden.

       First, we need some information about the dimensions you want.

       """)

       while True:

           try:

               response = int(input("Please enter the side length for your garden (in feet) : "))

           except ValueError:

               print("(!)Please Enter A Number(!)")

               print("")

               continue

           if str(response) == "":

               continue

           else

               length = int(response)

               break

repeat stuff like that up above for the rest, and then you can decide what to do with the variables and how they need to be multiplied for the output. Good luck!

                       

You might be interested in
How do you resolve conflicts in your life??
amm1812

Answer:

What problems?

Explanation:

6 0
2 years ago
Which cell has no nucleus ?​
Llana [10]
The answer is Prokaryotic Cell
5 0
3 years ago
Read 2 more answers
Your task is to create a bash shell script that is able to backup all the C++ program files in your current directory. The algor
Oliga [24]

Answer:

backup() {

 read dirname;

 if [[ whereis . /`$dirname` 2>  sterr.exe]]  

    then

        mkdir  $dirname

 for f in . / *.cpp

 do

    cp f "path_to_dirname"

    echo "file backup complete"

}

backup( )

Explanation:

The bash script above is used to backup C++ source files in a directory to a backup directory which is created if it does not exist, and copy's each .cpp file to backup, then sends a message to declare its completion.

7 0
3 years ago
There have not been any changes to instruments or music in the last 50 years. The technology in music is still the same.
aliya0001 [1]

Answer:

False i hope this is rigth

7 0
2 years ago
Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
Anna007 [38]

Answer:

Internet is the correct answer for the above question.

Explanation:

  • The Internet Explorer define some security zone (which includes the Restricted sites, internet, Trusted sites, and Local intranet) which is used to block the unwanted sites which can be opened by some other websites.
  • When any user use any website, sometimes that websites open different websites. This security zone gives the features to secure the user from this event.
  • There are four-zone which are described in the first line, in which the internet zone is used to take all the websites which are not defined for the other security zone. It means that when any user does not decide the security zone for any websites then by default it comes in the internet zone.
  • This is also asked by the question, Hence "internet" is the correct answer.
4 0
2 years ago
Other questions:
  • Dial-up connections can be made over a(n) ____ line or phone line. isdn dsl ipx tcp/ip
    12·1 answer
  • Solar power plants trap the sun’s energy and convert it into electricity. What is a problem associated with this technology?
    11·1 answer
  • 25 POINTS + BRAINLIEST PLS HELPWhere should you put the argument for a command?
    13·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    6·1 answer
  • When you copy a formula that contains an absolute reference to a new location, the reference ____. a. has a dotted outline in it
    6·1 answer
  • The physical parts or components of a computer system is called?
    8·2 answers
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • EASY What does the Backspace key do?
    6·1 answer
  • Complete the steps for adding a recurring event.
    10·1 answer
  • The startup routine runs,when machine boots up is known as​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!