In python:
age = float(input("How old are you? "))
weight = float(input("How much do you weigh? "))
heart_rate = float(input("What's your heart rate? "))
time = float(input("What's the time? "))
print("The calories burned for men is {}, and the calories burned for women is {}.".format(
((age * 0.2017) - (weight * 0.09036) + (heart_rate * 0.6309) - 55.0969) * (time / 4.184),
((age * 0.074) - (weight * 0.05741) + (heart_rate * 0.4472) - 20.4022) * (time / 4.184)))
This is the program.
When you enter 49 155 148 60, the output is:
The calories burned for men is 489.77724665391963, and the calories burned for women is 580.939531548757.
Round to whatever you desire.
The answer & explanation for this question is given in the attachment below.
Computer-aided engineering (CAE) and finite element analysis (FEA) Computer-aided manufacturing (CAM) including instructions to computer numerical control (CNC) machines. Photorealistic rendering and motion simulation. Document management and revision control using product data management (PDM).
Answer:
- RFID tags in shopping mall.
- Browsing the internet.
- Mobile phone calls
Explanation:
Radio frequency identification tag (RFID) in a device that holds personal information of a user electromagnetically. it is used in shopping mall, installed in the shopper's phone or a card, in which all payments are done automatically.
The internet is a global network of devices. With a subscription to a internet service provider, a user can surf the internet at any time of the day.
Mobile phones are portable devices, procured by a user for on-the-go calls. This cell phones have databases with information of cell tower connections, for easy switching for flexible but quality call adaptation.
Answer:
Analyze network traffic
Identify the method of execution
Explanation:
Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.
Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.
Hence, in this case, the system engineer should carry out the following steps:
1. Analyze network traffic
2. Identify the method of execution