1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
12

) Write a program to calculate the time to run 5 miles, 10 miles, half marathon, and full marathon if you can run at a constant

speed. The distance of a half marathon is 13.1 miles and that of a full marathon is 26.2 miles. Report the time in the format of hours and minutes. Your program will prompt for your running speed (mph) as an integer.
Computers and Technology
1 answer:
Kamila [148]3 years ago
6 0

Answer:

def cal_time(distance, speed):

   time = distance / speed

   hour = str(time)[0]

   minutes = round(float(str(time)[1:]) * 60)

   print(f"The time taken to cover {distance}miles is {hour}hours, {minutes}minutes")

miles = [5, 10, 13.1, 26.2]

myspeed = int(input("Enter user speed: "))

for mile in miles:

   cal_time(mile, myspeed)

Explanation:

The python program prints out the time taken for a runner to cover the list of distances from 5 miles to a full marathon. The program prompts for the speed of the runner and calculates the time with the "cal_time" function.

You might be interested in
The process of ensuring that web pages coded with new or advanced techniques still are usable in browsers that do not offer supp
grigory [225]

Answer:

progressive enhancement

Explanation:

Progressive enhancement is a powerful method for web developers when building websites accessible to different level user-agents.

Progressive enhancement technique allows you start with <em>simple</em> and <em>foundational</em> layers and then building more complex technologies on top of it. This principle lets multiple level user-agents can access and retrieve your work no matter what level of technologies they are using.

8 0
3 years ago
Is a bottle opener considered an engineered item?
KIM [24]
Yes actually it is it’s a machine to use for opening bottles such as cans n other
3 0
3 years ago
Find all supplier names and cities who supply expensive chairs, where expensive chairs are those whose selling price is greater
Gnesinka [82]

Answer:

select s.sname from supplier s,product p,supply su where s.s#=su.s# and p.p#=su.p# and p.p_name like 'chairs' and p.price>300

Explanation:

First of all, we need to select all the required columns from the specific tables so that the data in those columns can be display by executing this SQL query.

As the task at hand is to find all supplier names and cities who supply expensive chairs therefore we need to join three tables in order to look for the supplier name selling the highest prices.

In the above SQL query, the conditons "s.s#=su.s# and p.p#=su.p#" will join tables and the conditons "p.p_name like 'chairs' and p.price>=300" will be used to search for the chair with price greater than $300.

6 0
3 years ago
Manually selecting an A,F point helps the camera to do what? focus on an off-center subject
Lemur [1.5K]

it would be b c and a or b for 3


7 0
3 years ago
A(n) ________ is a chart based on PivotTable data.
Mrrafil [7]
Well since it’s a chart based on a PivotTable prettyyyy sure it’s gonna be a PibltChart
7 0
3 years ago
Other questions:
  • Which formula best expresses your monthly ending balance?
    12·1 answer
  • Why is personal responsibility important when considering technology?​
    14·2 answers
  • Select what's true about packet sniffers. Check All That Apply Legitimate sniffers are used for routine examination and problem
    15·1 answer
  • Which model involves the creation of data and process models during the development of an application?
    8·2 answers
  • Editing tool for quickly making a repeated change throughout a document
    14·1 answer
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • You are the IT security administrator for a small corporate network. You would like to use Group Policy to enforce settings for
    14·1 answer
  • Outline 3 computer system problem that could harm people and propose the way avoid the problem​
    12·1 answer
  • What is the purpose of exploring data?
    6·2 answers
  • Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!