1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
12

Create a program called "Geometry" Prompt the user for a small decimal number. Prompt the user for a large decimal number. Using

those numbers as lower and upper bounds, randomly generate a decimal value between the two. Using the randomly generated number, calculate the VOLUME of a sphere if it were to have that size radius. Output the radius as well as the volume back to the user.
Computers and Technology
1 answer:
skelet666 [1.2K]3 years ago
8 0

Answer:

In Python:

import random

small = float(input("Small: "))

large = float(input("Large: "))

radius = round(random.uniform(small, large),2)

volume = round(4/3 * 22/7 * radius* radius* radius,2)

print("Radius: "+str(radius))

print("Volume: "+str(volume))

Explanation:

This imports the random module

import random

The next two lunes prompt the user for small and large decimal number

small = float(input("Small: "))

large = float(input("Large: "))

This generates the radius

radius = round(random.uniform(small, large),2)

This calculates the volume

volume = round(4/3 * 22/7 * radius* radius* radius,2)

This prints the generated radius

print("Radius: "+str(radius))

This prints the calculated volume

print("Volume: "+str(volume))

<em>Note that, the radius and the volume were approximated to 2 decimal places. Though, it wasn't stated as part of the program requirement; but it is a good practice.</em>

You might be interested in
Use the Internet to gather information on four filesystems compatible with Linux. For each filesystem, list the situations for w
marta [7]
If fhun gftrfjjtcbjjbsufcghtfghyrssfbkoire crazy ahh young man
7 0
4 years ago
Por qué el entorno gráfico de Windows es amigable con el hombre ?
elena-14-01-66 [18.8K]

Explanation:

Por que es un sistema diseñado para ayudar a las personas de forma amable

ESPERO Y TE AYUDE ;)

3 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
1. What arguments can you make for the idea of a single language for all programming domains
SVEN [57.7K]

Answer:

The answer to this question defined below.

Explanation:

It's a smart idea to get a common language for coding of every kind. It would help all developers and customers understand the language better because, in every case, there's no more need to learn, that language.  

  • This could also render software developed in the very same language consistent, and therefore, ports on multiple platforms are not required.
  • In this process, we talk about the common property and function of the classes, that's why it is the correct answer.
3 0
3 years ago
A folder has been shared with other users and set to read-only. what does this mean for users?
fomenos
It means they cannot make changes inside those folders and they don't have permission to execute files within it.
5 0
4 years ago
Read 2 more answers
Other questions:
  • Recursion is memory-intensive because ________. Select one: a. it requires large data values b. it must occur numerous times bef
    11·1 answer
  • Please Help Fast!!!!!! Brainliest for First to answer!!! Conflict resolution is the process of solving disputes and disagreement
    5·1 answer
  • Some people are unable to arrange six matches to form four equilateral triangles because they fail to consider a three - dimensi
    6·1 answer
  • Which topology requires a central controller or hub?
    15·1 answer
  • When you are using inprivate browsing, the "inprivate is turned on" page displays in the browser window, the inprivate label is
    14·1 answer
  • Interface elements include but are not limited to:
    8·1 answer
  • Assume a TCP sender is continuously sending 1,090-byte segments. If a TCP receiver advertises a window size of 5,718 bytes, and
    7·1 answer
  • Which footing supports a long brick or concrete wall<br>​
    14·1 answer
  • What are the advantages of Database management system (DBMS)??<br>At least mention six of them​
    10·1 answer
  • Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryB
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!