1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
14

During the past decade ocean levels have been rising faster than in the past, an average of approximately 3.1 millimeters per ye

ar. Write a program that computes how much ocean levels are expected to rise during the next 15 years if they continue rising at this rate. Display the answer in both centimeters and inches.
Computers and Technology
1 answer:
Alecsey [184]3 years ago
4 0

Answer:

Program in Python is as follows:

rise = 3.1

for i in range(1,16):

     print("Rise in Year "+str(i))

     cm = rise * 0.1 * i

     inch = rise/25.4 * i

     print(str(cm)+" centimetres")

     print(str(inch)+" inches")

     print

Explanation:

This line initializes the rise of the ocean level

rise = 3.1

The following iterates from 1 to 15 (which stands for year)

<em>for i in range(1,16):</em>

   print("Rise in Year "+str(i))

This calculates the rise in each year in centimetre

   cm = rise * 0.1 * i

This calculates the rise in each year in inches

   inch = rise/25.4 * i

The line prints calculated ocean rise in centimetres

   print(str(cm)+" centimetres")

The line prints calculated ocean rise in inches

   print(str(inch)+" inches")

     print

You might be interested in
The data in a data warehouse have which of the following characteristics?
Marina CMI [18]
What are the options it says which of the following characteristics.
4 0
2 years ago
Why is drive of value when pursuing a career in IT?
balandron [24]

Answer:

Drive is only important when you work for Microsoft.

8 0
2 years ago
Which of the following is a correct definition of the term rectification? A. Rectification is the opposition to current flow in
AlekseyPX
Rectification is "C. The conversation of an AC current to a DC current
5 0
2 years ago
Read 2 more answers
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software,
alexira [117]

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

8 0
2 years ago
When Creating a game ( Which I Am, FPS ofc ) what are the basic rules would you want to add
Gnesinka [82]

Answer:

2 ig

Explanation:

5 0
3 years ago
Other questions:
  • Why did LISD had to block the game “among us”?
    8·2 answers
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Sto
    9·1 answer
  • A common technique for masking contents of messages or other information traffic so that opponents can not extract the informati
    14·1 answer
  • Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in t
    15·1 answer
  • Find the Nearest Repeated Entries in an Array People do not like reading text in which a word is used multiple times in a short
    15·1 answer
  • Define a constructor as indicated. Sample output for below program:Year: 0, VIN: -1Year: 2009, VIN: 444555666// ===== Code from
    8·1 answer
  • Which type of computer is used to process large amount of data​
    15·2 answers
  • Computers that are joined together are called networks true or false
    10·1 answer
  • Data becomes _______ when it is presented in a format that people can understand and use.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!