1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neporo4naja [7]
3 years ago
14

For python, Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this

function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2
Computers and Technology
1 answer:
tia_tia [17]3 years ago
7 0

import math

def getResults(r):

   return "Volume = {}\nSurface Area = {}".format(round((4/3)*math.pi*(r**3),1), round((4*math.pi)*(r**2),1))

print(getResults(3.5))

I hope this helps!

You might be interested in
Often, a single source does not contain the data needed to draw a conclusion. It may be necessary to combine data from a variety
nlexa [21]

To measure the pollution of a particular river, one must take the sample of the river and take the sample of pure water, then draw the conclusion, it will tell the amount of pollution in the river water.

<h3>What is pollution?</h3>

Pollution is the mixing of unwanted or harmful things in any substance or compound.

Water pollution is the mixing of toxics and chemicals in water.

Thus, to measure the pollution of a particular river, one must take the sample of the river and take the sample of pure water, then draw the conclusion, it will tell the amount of pollution in the river water.

Learn more about pollution

brainly.com/question/23857736

#SPJ1

6 0
2 years ago
How to make a 'Sign in with replit' button in replit (Node.js) will make brainliest
Y_Kistochka [10]

hit the sign in botten or create new account

3 0
3 years ago
Read 2 more answers
Which of the following protocols support the encryption and decryption of e-mail messages?
Katena32 [7]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway, here is the answer. The protocol that supports the encryption and decryption of e-mail messages is this: <span>Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP). Hope this helps.</span>
7 0
3 years ago
An application team plans to follow the 10-phase SDLC model. After the team identifies both functionality and security requireme
Valentin [98]

Answer:

The team did not adequately formalize the software's design

Explanation:

The most logical reason for this confusion is the fact that the team did not adequately formalize the the software design.

The design approach has to do with clearly defining the architectural modules of the application. The requirements in the software requirement specification document would serve as input for the next phase. The documents are prepared and they give a definition of the overall system architecture.

The team got confused because they did not go through this phase of the 10-phase SDLC model.

3 0
3 years ago
The general syntax for the function prototype to overload the assignment operator = for a class is ____.a. friend className&amp;
dsp73

Answer:

Option (B) is the correct answer to the following question.

Explanation:

Here, in the code "const" is the constant keyword which is used when we need that the value stored in that variable will never change.

The following option is correct because the assignment operator are those operator which initialize the value in the variable and overloading of the assignment operator would be as we use the other operators and also we could use them by creating the objects as we use in the copy constructor.

So, that's why the following option is correct.

4 0
3 years ago
Other questions:
  • If all of Earth's history were squeezed into one 12-hour period, how long ago did Precambrian time end? How long did the Cenozoi
    15·1 answer
  • Write a shell (text-based) program, called sum_second.py, that opens a text file called stuff.txt with 2 numbers per line separa
    8·1 answer
  • This technology was developed in the 1980s and was a successful attempt to provide services for voice, video, and video traffic
    11·1 answer
  • Your new home has a vacuum system. what kind of computer is controlling it?
    5·1 answer
  • The penalties for a person's third DUI conviction include fines of __________.
    11·2 answers
  • You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the
    7·1 answer
  • ) A popular PivotChart that is used in Access is (Points : 4) column.
    9·1 answer
  • 4. What is the connection between productivity and Microsoft Office/ Office 365?
    13·1 answer
  • Write a function (subroutine) that inputs a data value in register r0 and returns value in r0. The function returns y 5 a 1 bx 1
    15·1 answer
  • !!! PLEASE HELP ASAP REALLY NEED IT !!!
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!