answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
2 years ago
14

LAB: Miles to track laps. (PLEASE CODE IN PYTHON)

Computers and Technology
2 answers:
vagabundo [1.1K]2 years ago
4 0

Answer:

def miles_to_laps(miles):

  return miles / 0.25

miles = 5.2

num_of_lap = miles_to_laps(miles)

print("Number of laps for %0.2f miles is %0.2f lap(s)" % (miles, num_of_lap))

Explanation:

bekas [8.4K]2 years ago
3 0

Answer:

The program in python is as follows:

def miles_to_laps(user_miles):

     return (user_miles/0.25)

mile = float(input("Number of Miles: "))

print("Number of laps: ",end="")

print('{:.2f}'.format(miles_to_laps(mile)))

Explanation:

The first line defines the function miles_to_lap

def miles_to_laps(user_miles):

This line returns the equivalent number of laps

     return (user_miles/0.25)

The main method starts here

This line prompts user for input

mile = float(input("Number of Miles: "))

This line prints the string "Number of laps", without the quotes

print("Number of laps: ",end="")

This prints the equivalent number of laps to two decimal places

print('{:.2f}'.format(miles_to_laps(mile)))

You might be interested in
Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention
snow_lady [41]

Answer:

Explanation:

1. Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user. Authorization involves providing a user with permission, including access levels and abilities. For example file access, hours of access, and amount of allocated storage space.

2. Content filtering is a software organizations use that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Encryption scrambles information into an alternative form that requires a key or password to decrypt. In a security branch, an intruder is then unable to read encrypted information. A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.

3. Intrusion detection software (IDS) features full-time monitoring tools that search for patterns in network traffic to identify intruders.

4 0
2 years ago
Which option describes how to apply a left indent to a selected paragraph?
Leni [432]

Answer:

All the above options are correct.

Explanation:

In a Microsoft Word, to apply a left indent to a selected paragraph, a user can do any of the following:

1. Use the combination keys Ctrl+M on the keyboard to insert a left indent.

2. Use the mouse to pull the left indent marker on the ruler to create a left indent.

3. Another option is to go to the Paragraph dialogue box, place a positive value in the box labeled Left.

Hence, in this case, the correct answer is that: All the above options are correct.

8 0
2 years ago
Read 2 more answers
Michael has increased the contrast of the given picture. Which feature or menu option of a word processing program did he use?
Kitty [74]
Artistic effects under design?
8 0
2 years ago
What conclusion can be made about the state of the program when the while loop terminates? Assume answer is a declared and initi
stellarik [79]

<u>Answer:</u>

<em>1. The loop will run unless the value of answer equals to Capital N.</em> The method equals is “case-sensitive” that is lower case letter and upper case letters are considered different. That “a” and “A” means the same to us, but for the method equals it is different and equals method will return false if the case is not matching.

<em>2. a (int)(Math.random() * (upper − lower) ) + lower </em>

Since we need to consider the lower limit value together to get the desired results we need to add the value of lower limit to the multiplied answer.

<em>3. b while(userGuess != secretNumber || userGuess >= lowerLimit && userGuess <= upperLimit)</em>

Here the program is required to check the while loop and exit when user guess the number or we can say the loop should continue until the user guess the number, so that is why we have taken <em>userGuess!=secretNumber. </em>Next the loop should be exited if it is not within the range or we can say that the loop should run only if the guessed number is within the upper and lower limit.<em> That is why we have opted for the condition userGues>=lowerlimit && userGuess<=upperlimit.</em> Why we have taken && as the operator is that, it’s a range of values so && operator best suit for this kind of logical condition.

3 0
2 years ago
Which of the following in not part of the CIA triad that is one of the cornerstones of information security? a. Confidentiality
Nana76 [90]

Answer:I would need more information to help you ut, sorry

Explanation:

6 0
2 years ago
Other questions:
  • Steps in creating a folder
    12·1 answer
  • As an information user you should be skeptical of
    7·1 answer
  • The overall purpose of CSS is to modify the way web pages look without modifying the underlying HTML code. way tables render in
    12·2 answers
  • Which are examples of copyrighted online materials? Check all that apply.
    14·2 answers
  • What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
    11·1 answer
  • In the description of the Hack machine language in chapter 4, it is stated that in well-written programs a C-instruction that ma
    12·1 answer
  • Budget Analysis (use while loop) Write a program that asks the user to enter the amount that he or she has budgeted for a month.
    5·1 answer
  • Program MATH_SCORES: Your math instructor gives three tests worth 50 points each. You can drop one of the test scores. The final
    7·1 answer
  • Section 6.9 of your textbook ("Debugging") lists three possibilities to consider if a function is not working. Describe each pos
    14·1 answer
  • A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!