1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
3 years ago
11

Write a python program to find the volume of the pepsi present in the can which is in the shape of cylinder accepting the radius

and height of the can from user.(Note :Apply float input and display Radius ,Height, Volume of Pepsi in can)
(V = pi r^2 h )
Computers and Technology
2 answers:
stepladder [879]3 years ago
8 0

Answer:

r=float(input("Enter radius: "))

h=float(input("Enter height: "))

v=3.14*r**2*h

print(r)

print(h)

print(v)

This is the answer, hope it helped!

aleksley [76]3 years ago
6 0

Answer:

Surface Area of a Cylinder = 2πr² + 2πrh (Where r is radius and h is the height of the cylinder).

You might be interested in
Which of the following might be a job or task of an IT worker who manages networks?
Vladimir79 [104]
We need the options to be able to help.
7 0
4 years ago
Read 2 more answers
Can someone please tell me how to divide 2 columns in Ms excel and put the values in one column.
frozen [14]
Your best bet is to research about it online or watch tutorials on YouTube for a better understanding :) <span />
7 0
4 years ago
What would you enter at the command prompt to start a new bourne again shell session?
butalik [34]

The answer is bash . The bash command opens a Bourne-again sheel (bash) session. It is the standard shell used in most Linux computers and it uses commands similar to a UNIX shell. Bash includes features such as:

1) Command completion when pressing the tab key.

2) Command history.

3) Improved arithmetic functions.

6 0
3 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
What is an example of constructive criticism for an employee who is shy during meetings?
rewona [7]
<span>Speak up more so people don't think you're rude</span>
8 0
4 years ago
Read 2 more answers
Other questions:
  • Any method of determining whether an event or object is older or younger than others
    13·2 answers
  • What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times.
    10·1 answer
  • Computer communications describes a process in which two or more computers or devices transfer ____.
    10·1 answer
  • Being technologically literate requires being able to ______.
    11·2 answers
  • Which option will automatically update copied data?
    12·2 answers
  • Careers in information technology deal with
    12·2 answers
  • An invisible path determining the way of travel from one place to another.
    10·1 answer
  • What is the purpose of a poster frame?
    5·2 answers
  • D Question 9 What is output by the following?
    5·1 answer
  • Who would benefit from using self-driving cars
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!