1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
15

2.4 Code Practice: Question 2

Computers and Technology
1 answer:
Romashka-Z-Leto [24]3 years ago
6 0

Answer:

import math

x = float(input("Input a decimal number of your choice: "))

y=int(x)

x=x-y

print(math.fabs(x))

Explanation:

You might be interested in
After an entry in the medical record has been written or keyed and an error is discovered, what procedure should be followed to
Readme [11.4K]

Answer:

(C) Draw a line through the error; then call the patient’s physician.

Explanation:

According to my research on medical procedures, I can say that based on the information provided within the question the best procedure that should be taken in this situation would be to draw a line through the error; then call the patient’s physician. By doing so you get rid of the the error and by telling the patient's physician you get rid of any possibility of the physician still thinking that the error was something that was already done.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
The ____ statement is used to execute specific programming code if the evaluation of a conditional expression returns a value of
OverLord2011 [107]

Answer: if statement

Explanation:

The statements executes when a specific conditions are true.

5 0
3 years ago
Which term describes a protocol to manage a network able to configure out a network monitor activity and control devices
cricket20 [7]

Answer:

im not sure but my brother told me it's Simple Network Management Protocol

7 0
3 years ago
A large data set contains information about all students majoring in computer science in colleges across the United States. The
Vsevolod [243]

Answer:

The correct option is B

B. How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

Explanation:

A.We can not analyze that students majoring in computer science tend to have higher grade point averages than students majoring in other subjects because we are only given data sets about computer science not about other majoring subject students

B. Because data set contains attributes of gender and state so we can easily analyze that how many states have a higher percentage of female computer science majors than male computer science majors attending college in that state.

C.We can not analyze that what percent of students attending college in a certain state are majoring in computer science because data sets doesn't contain any information about students other computer science students.

D. We can not analyze that which college has the highest number of students majoring in computer science because data sets doesn't contain attribute of college name.

4 0
3 years ago
What is the name of the national outreach project?
bagirrra123 [75]

Answer:

FCCLA should be the answer.

Explanation:

5 0
3 years ago
Other questions:
  • When u look at a green object through red glass the object will appear
    11·2 answers
  • How could you insert a new row between rows 20 and 21?
    10·2 answers
  • What does Mishler mean by the foreground-background interaction? How can this affect the photographs, based on the examples in t
    14·2 answers
  • In a database list, fields are displayed as _____. rows columns tables records
    10·1 answer
  • 16. Budget Analysis Write a program that asks the user to enter the amount that he or she has budgeted for a month. A loop shoul
    14·1 answer
  • You need to implement a web application that is split in three parts, namely, Webpage, PHP and MySQL. Each of them will be used
    13·1 answer
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • [30 points, will mark Brainliest] Which of the following is the lowest hexadecimal value? Explain why. Options to chose; F2, 81,
    9·1 answer
  • Withdrawal from a conflict is best used when ______.
    6·2 answers
  • You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!