1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
9

Can some one fix this input ("Enter a number: ") print (num * 8)

Computers and Technology
1 answer:
Kaylis [27]3 years ago
6 0
If you save the input as num,
this will print the input 8 times.

num = input("Enter a number: ")
print(num * 8)

If you want to do actual math calculations,
then the input needs to be a number.

num = float(input("Enter a number: "))
print(num * 8)

This doesn't account for any errors in which the user doesn't input a number, but I don't think that's what you were looking for anyway :)
You might be interested in
You can use this effect to break a color into a percentage of its full strength.
Dmitriy789 [7]
The answer on this scenario would then be c. drop out. This effect can be done if one wants to break a color into one's percentage of the full strength. Hope this is the answer and would be of big help.
6 0
3 years ago
What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology
Ilya [14]

Answer:

hybrid cloud

Explanation:

hybrid cloud is a cloud environment that employs both public and private cloud services.

Hybrid cloud gives businesses more flexibility and greater efficiency in coverage due to its ability to move files between public and private cloud.

7 0
3 years ago
Which is an example of intrinsic motivation?
kkurt [141]

Answer: allowing time to do an after-school activity once studying is done

Explanation: Motivation could be explained as any event, factors or circumstances which increases an individual's willingness, zeal or strength to do something. Motivation could also be inform of incentive or reward which one stands to gain when a certain assignment or mission is accomplished.

However, Intrinsic motivation refers to a class of motivation which are triggered naturally. When a motivation is intrinsic, there is no usually no obvious and or external source of motivation, incentive or reward attached to one's quest of doing something. In the scenario above, all other options except allowing time to do an after-school activity once studying is done have a lucid external incentive which the individual stands or aims to achieve by studying.

5 0
3 years ago
Read 2 more answers
1. JAVA Create one method to do the following expressions. Given the following declarations, what is the result of each of the e
nordsb [41]
<span>public void myMethod(int w, int y, int z) {
</span>int a, b, c, d, e, f, g, h, i, j, k, l;

<span>a = w * z;
</span>b = w * z + y;
c = w * -z;
d = w * --z + y++;
e = w * z-- + ++y<span> ;
</span>f = w + z * y;
g =  w – y + z;
h = (w + y) * z;
i = y / w;
j = y / z;
k = w % y;
<span>l = y % w;
</span>System.out.println( "%d %d %d %d %d %d %d %d %d %d %d %d", a,b,c,d,e,f,g,h,i,j,k);
}

To use 
myMethod(2, 7, 12);
7 0
3 years ago
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
Hoochie [10]

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

7 0
3 years ago
Other questions:
  • Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the followi
    5·2 answers
  • Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threat
    10·1 answer
  • In the file MajorSalary, data have been collected from 111 College of Business graduates on their monthly starting salaries. The
    15·1 answer
  • Jennifer recently bought a new computer to type a new manuscript she’s been working on. She also stored a lot of movies on it to
    10·1 answer
  • Fill in the blank.
    7·1 answer
  • ) Doyou know applets and Java Beans in Java? Please briefly state eachone with an example.
    10·1 answer
  • What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
    11·1 answer
  • PLZ help
    5·1 answer
  • A vacuum tube that contains a grid can be classified as a A. rectifier B. triode C. pentode D. diode
    12·1 answer
  • The technologist has recorded the red cell morphology as macrocytic. which mcv value would confirm this observation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!