Read the following code used to calculate the total cost of an item with tax: price = input("What is the item price? ") tax = price * 0.065 totalPrice = price + tax There is an error in the code. What type of function needs to be used? (5 points) float() int() print() str()

Answers

Answer 1

Answer: float()

Explanation: The code used to calculate total price = tax + price.

price = input("What is the item price? ")

tax = price * 0.065

totalPrice = price + tax

Since the input required from the user will be numerical, that is the price of an item, then it has to be stated explicitly, instead the code throws an error as it will read in a string if not stated explicitly.

Also, Given that the total price calculation will require decimal or fractional calculations, using the float() function will allow the program to read in the user input as a numerical value which can be used in further calculation as the float () function provides flexibity when working with fractional values.


Related Questions

Which of the following is an object-oriented programming language?
- Ada
- COBOL
- Pascal
- Python

Answers

Explanation:

This is the correct answer

python

Answer:

[D] Python

Explanation:

With the exception of control flow, everything in Python is an object.

Thus, python is an object-oriented programming language.

~Learn with Lenvy~

The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to the object.
a. True
b. False

Answers

Answer:

True

Explanation:

The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to the object. True.

Which of these is an opinion about cloud computing?

Businesses use the cloud to streamline operations

Resources on the cloud can be accessed by multiple users

Cloud storage is safer than storing it in local servers

Some have concerns about security and privacy in the cloud

Answers

"Some have concerns about security and privacy in the cloud" is an opinion about cloud computing.

The statement "Some have concerns about security and privacy in the cloud" is an opinion because it expresses a personal belief or judgement about the safety and privacy of cloud computing. While it is true that there are concerns about security and privacy in the cloud, it is not a fact that applies universally to all users and situations. Some users may find cloud storage to be just as safe or even safer than storing data in local servers, while others may have experienced security breaches or data loss in the cloud. Therefore, it is important to weigh the pros and cons of cloud computing and make an informed decision based on individual needs and circumstances.

Learn more about cloud computing: https://brainly.com/question/29846688

#SPJ11

What are the different types of topology?​ in details

Answers

Answer:

NETWORK TOPOLOGY .

This tefers to how nodes are connected to the network.

Types of topology.

Physical topology.Logical topology.

In physical topology,nodes are connected physically using wires(cables).

Types of physical topology include:

Bus topologyTree topologyHybrid topologyStar topologyRing topology.

Hope it helps you,any question so far...comment !!!

\(\huge\mathcal{♨ANSWER♥}\)

Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology.

They are,

Bus topologyRing topologyStar topologyMesh topologyTree topology

♻Bus topology

Bus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.

♻Ring topology

Ring topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring.

♻Star topology

Star topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star topology is one of the most common computer network topologies.

♻Mesh topology

A mesh topology is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

♻Tree topology

A tree topology is a special type of structure where many connected elements are arranged like the branches of a tree. For example, tree topologies are frequently used to organize the computers in a corporate network, or the information in a database.

...hope this helps...

_♡_mashi_♡_

7 materials we use in technology and raw material​

Answers

Answer:

natural re-sources chromium, tin, copper, platinum metals, germanium, indium, tantalum, niobium, antimony, cobalt and industrially utilized rare earths.

Explanation:

can I have brainliest

Compute series multiplier resistors RM = 100Ω:
· volt range ________
· 0-10 volt range ________
· 0-100 volt range ________

Answers

Answer:

for 0-1 volt range - 900Ω

for 0-10 volt range - 9900Ω

for 0-100 volt range - 99900Ω

Explanation:

P.S - The exact question is as follows -

As ,Rm = 100Ω , Im = 0.001A

⇒Vm = 100×0.001 = 0.1 V

Now,

for 0-1 volt range :

Rse = Rm(\(\frac{V'}{Vm} - 1\) )  = 100(\(\frac{1}{0.1} - 1\))  = 900Ω

Now,

for 0-10 volt range :

Rse = Rm(\(\frac{V'}{Vm} - 1\) )  = 100(\(\frac{10}{0.1} - 1\))  = 9900Ω

Now,

for 0-100 volt range :

Rse = Rm(\(\frac{V'}{Vm} - 1\) )  = 100(\(\frac{100}{0.1} - 1\))  = 99900Ω

Compute series multiplier resistors RM = 100: volt range ________ 0-10 volt range ________ 0-100 volt

What do biometrics use to perform authentication of identity?
Ability to perform tasks
Biological attributes
Possession of a device
Knowledge of passwords

Answers

Biological attributes
Just as the suffix bio suggest living things.

Given the following function, what is the parameter name for the function's parameter?
func delete(file path: String) -> Bool {
// code
}
Group of answer choices
delete
file
path
filePath
String
Bool

Answers

The parameter name for the function's parameter is "path" and not the filepath.

func delete(filepath: String) -> Bool {

   // code

}

the parameter name for the function's parameter is "path".

The function is called delete(file:path:), indicating that it takes one parameter labeled "file" externally, and "path" internally.

When calling the function, the caller would use the external parameter name "file" to pass in an argument for the "path" parameter, like so:

let result = delete(file: "/path/to/file")

Inside the function body, the parameter can be referred to using its internal name "path", like so:

func delete(filepath: String) -> Bool {

   // use the `path` parameter here

   // code

}

Therefore, "path" is the parameter name for the function's parameter in this case.

Learn more about string in c++ with example?:https://brainly.com/question/30392694

#SPJ11

Explain why Austin takes close-up pictures of whales and displays them in life-size?

Answers

Austin takes close - up pictures of whales so that he that he can provide viewers with an indelible impression of what a whale really looks like.

Why was Austin interested in the picture?

He so interested because, he might not be able to see Whale any time soon.

And the picture will give a platform to evoke unexplored thought and emotion for him.

Learn more about picture at;

https://brainly.com/question/25938417

Using the drop-down menu, identify characteristics of IDEs.
IDE refers to
for writing computer programs.
IDEs are a coordinated
IDEs provide developers with

Answers

Answer:

An integrated development environment

Computer software program-writing package

Interactive programming tools

Explanation:just took it on edge

Answer:

An integrated development environment

Computer software program-writing package

Interactive programming tools

Explanation:

you are configuring power options on your windows 10 computer. you decide to use the high performance power plan. which of the following statements are true regarding this power plan?

Answers

Regular computing uses standard user credentials. The most powerful accounts, known as administrator accounts, should only be utilized when absolutely necessary.

What decide to use the high performance power plan?

Guest accounts should be used by people who just need momentary access to a computer.

Apply Group Policy settings to a particular user or group of users without changing how your account behaves. If many users share a Windows 10 computer, it is possible to build a User-Specific Local Group Policy (LGPO) snap-in (which can be saved as a file).

Therefore, Both the share permissions and the NTFS permissions will be considered by the system, and whichever set is more restrictive will be applied to the folder.

Learn more about Performance here:

https://brainly.com/question/26958029

#SPJ1

What are common considerations businesses
need to make before purchasing new computers?
Check all of the boxes that apply.
total cost of all computer hardware, software,
and peripherals
current computer purchasing trends
which operating system to use
laptops, desktops, or a mix of both
extra features such as games and language
learning programs

Answers

Answer:

laptops, desktops, or a mix of both

which operating system to use

total cost of all computer hardware, software, and peripherals

Explanation:

Answer:

the first three

Explanation:

edgen. yea bby

Why is the ISPM 15 Code/Marking used?

Answers

The ISPM 15 (International Standards for Phytosanitary Measures No. 15) code/markings are used for a specific purpose related to international trade and the movement of wood packaging materials (WPM). The primary objective of ISPM 15 is to prevent the spread of pests and diseases that can be carried by wood packaging materials.

Wood packaging materials, such as pallets, crates, and dunnage, can harbor harmful insects and pathogens. When these materials are transported across international borders, there is a risk of introducing pests or diseases to new regions, which can have devastating consequences for agriculture, forestry, and ecosystems.

To address this risk, the ISPM 15 code/markings set out guidelines for treating WPM through approved methods such as heat treatment or fumigation. Treated WPM is then marked with a specific stamp or branding that certifies its compliance with ISPM 15 standards. This marking serves as evidence that the wood packaging has undergone appropriate treatment, reducing the risk of pest or disease transmission.

The use of ISPM 15 code/markings promotes phytosanitary measures and helps ensure that international trade involving wood packaging materials is conducted in a manner that protects plant health and minimizes the spread of pests and diseases across borders.

To learn more about phytosanitary, visit:

https://brainly.com/question/33281097

#SPJ11

of the following, which is a valid c identifier? group of answer choices june1997 employee number myextralongvariablename all of the above are valid identifiers. department

Answers

department_name is a valid c identifier

What is a identifier
A identifier is a name given to an item in a computer program. It is used to refer to the item by the program and to identify it from other items. It can be a variable, constant, function, class or namespace. Identifiers are usually made up of a combination of letters, numbers and symbols. They are case-sensitive and must follow the specific rules of the programming language they are used in. Identifiers can be used to store data, access data, and to control the flow of a program. Identifiers are used by the computer to distinguish between different items in the program and to interpret instructions.

To know more about identifier
https://brainly.com/question/28822900
#SPJ4

The beneficiary must continue to pay the Medicare Part B premium in order to be eligible for the HMO plan.

Answers

Yes, the beneficiary must continue to pay the Medicare Part B premium in order to be eligible for the HMO plan. Medical insurance provides financial coverage for medical expenses, including hospitalization, medications, and treatments, helping individuals manage healthcare costs.

1. Medicare Part B is a medical insurance program that covers certain medical services and supplies. It helps pay for doctor visits, outpatient care, preventive services, and durable medical equipment.
2. The HMO (Health Maintenance Organization) plan is a type of Medicare Advantage plan offered by private insurance companies approved by Medicare. It provides all of the benefits of Medicare Part A and Part B, along with additional coverage options.
3. In order to enroll in an HMO plan, you must first be enrolled in Medicare Part A and Part B. Part A is typically provided automatically when you turn 65, while Part B requires enrollment and payment of a monthly premium.
4. The Medicare Part B premium is set by the federal government and can change each year. It is usually deducted from your Social Security or Railroad Retirement Board benefits. If you're not receiving these benefits, you'll receive a bill to pay the premium.
5. To remain eligible for the HMO plan, you must continue to pay your Medicare Part B premium. Failure to pay this premium may result in losing your HMO plan coverage.

In summary, in order to be eligible for the HMO plan, you must continue to pay the Medicare Part B premium. This ensures that you maintain your Medicare coverage and the additional benefits provided by the HMO plan.

To know more about Medical insurance visit:

https://brainly.com/question/28319915

#SPJ11

Reagan is working on her homework on a touchscreen laptop which has Windows® 10 operating system. Reagan wants to zoom in on the screen to see the text of a document better. Which of the following touch screen gestures should she use to zoom in on the screen? Stretch Stretch Pinch Pinch Drag and slide Drag and slide Press and hold Press and hold

Answers

Reagan should use the pinch gesture to zoom in on the screen. Reagan is working on her homework on a touchscreen laptop which has Windows® 10 operating system.

Reagan wants to zoom in on the screen to see the text of a document better. To zoom in on the screen, Reagan can use the pinch gesture. Pinch is a touch screen gesture used to zoom in or out of a page, an image, or to minimize or maximize a window. The pinch gesture is made by placing two fingers on the screen and then moving them closer together or farther apart. For instance, to zoom in, Reagan should place her thumb and forefinger on the screen and then move them apart.

On the other hand, to zoom out, Reagan can place her thumb and forefinger on the screen and then move them closer together. Stretch is a similar gesture to the pinch but is made by moving the fingers apart from each other, thereby making the page or image bigger. This gesture is often used in conjunction with drag and slide to move the screen in different directions.

Drag and slide involves moving one or more fingers on the screen in any direction to move a page or an image in the same direction. Lastly, Press and hold is a gesture that is made by placing a finger on the screen and holding it there for a few seconds. It can be used to access a menu or activate an app. In conclusion, Reagan should use the pinch gesture to zoom in on the screen.

Learn more about operating system :

https://brainly.com/question/31551584

#SPJ11

The fan in a 450-WAtt power supply is malfunctioning. What action should you take

Answers

Answer:

Someone with electrical knowledge could replace it. However, because it can cause the power supply to overheat, overload and damage other parts. Its better to replace the power supply.

A customer bought a goods for Rs.9,000 after getting 10% discount. Calculate the marked price of the goods.Write in Qbasic.​

Answers

Answer:

Rs. 10,000

Explanation:

10% discount means,

customer bought the things at 100% - 10% = 90%

so if 90% --> 9000

1% --> 100

total price = marked price which is 100%

100% ---> 100*100 = Rs. 10,000

What came first, the internet or WIFI?

Answers

Answer: wifi

Explanation:

because you can't have the internet if you don't have wifi to power it up

Question #5
Multiple Choice
Suppose this is your user-defined data type.
class player:
life = 3
magic = False
name = "
Which statement creates an instance of your data type?
O myPlayer = player()
O myPlayer.player()
O myPlayer = new player()
O myPlayer = player

Answers

Answer:  myPlayer = player()

Explanation: correct edge answer 2020

Answer: myPlayer = player()

Explanation: got it right on edgen

As more and more computing devices move into the home environment, there's a need for a centralized storage space, called a _______________.A.network attached storage deviceB.server stationC.RAID driveD.gigabit NIC

Answers

As more and more computing devices move into the home environment, there's a need for a centralized storage space, called a network attached storage (NAS) device.

A NAS device is a type of file-level storage that provides a centralized location for storing and sharing data across a network. It connects to a local network and allows multiple devices to access files and data stored on it, such as photos, videos, and music. NAS devices typically have their own operating system and software, and can be configured to support different types of file systems, security settings, and backup and recovery options. They may also offer additional features such as media streaming, remote access, and mobile device support. A NAS device can be a convenient and cost-effective way to manage and share data in a home or small business environment.

Learn more about  computing devices  here;

https://brainly.com/question/15875519

#SPJ11

I REALLY Need help on this.

I REALLY Need help on this.

Answers

Make a deposit talk to A representative transfer money and Check account balance

What factors might influence how effective a vaccine is when it’s widely released?​

Answers

Answer:

alot of people might get sick off it and some people might die bec they don't know how to use and everybody acts differnt and has differnt opinions

Explanation:

If the fluid level in a battery is below the separators
should be added but never add

Answers

Never add tap water to your battery. ... Battery electrolyte levels should be just below the bottom of the vent well, about ½ - ¾ inch above the tops of the separators. Never let the electrolyte level to drop below the top of the plates.

Machine precision (eps = 2-52) can be computed by the following program (at- tributed to Cleve Moler): # Machine precision a=4/3 b=a-1 c=b+b+b eps(=abs(c-1) Run the program and prove its validity.

Answers

The program is valid and accurately computes the machine precision. To prove the validity of the program, we can simply run it and examine its output.

Here is the program in Python:

a = 4/3

b = a - 1

c = b + b + b

eps = abs(c - 1)

print(eps)

The program computes the machine precision by first assigning the value of 4/3 to the variable a. It then subtracts 1 from a and stores the result in the variable b. Next, it adds b to itself three times and stores the result in the variable c. Finally, it subtracts 1 from c, takes the absolute value of the result, and stores it in the variable eps. The value of eps represents the difference between 1 and the next representable number in the machine's floating-point format.

When we run the program, we get the output:

2.220446049250313e-16

This output represents the machine precision of the computer, which is approximately equal to 2^-52. Therefore, the program is valid and accurately computes the machine precision

Learn more about precision here:

https://brainly.com/question/28336863

#SPJ11

A set of instructions written in a computer language.
(technical term) ​

Answers

Answer:

A function?

Explanation:

When I was in IT class we called them Functions

Observe the following table with sample data about employees working in various projects. The underlined is the primary key. Each project has a unique project id and a project name. Each employee has a unique employee id, a name, and a job class. Each job class has a pay rate per hour. Each employee can work in a number of projects. A number of employees can work in the same project. Each employee only has one job class.

Answers

Below is the solution of the given question in which the ample data about employees working in various projects. The underlined is the primary key. Each project has a unique project id and a project name.

Explanation in Detail:

As projID empID is candidate key so there exist partial functional dependency and transitive dependency.

partial dependency= ProjID-->projName ,emplID--> emailName jobClass Hourly rate.

transitive dependdncy= jobclass,-->hourlyrate.

Yes given table is in 1NF as no multivalued attribute exists there .

As can be seen in the Q3 when table is normalised to 3NF, it gets normalised to 3NF and further in BCNF too. So futher normalisation from BCNF to higher froms is not possible

To know more about Primary Key, visit: https://brainly.com/question/29351110

#SPJ4

Pedro needs to write a block of code that will repeat a loop six times. Which type of loop should he use?
O for
O else
O else if
O while

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Petro needs to write a block of code that repeats six times. The given options in this question that what should he use to implement the six times a block of code are:

for  else else if while

The correct option to this question is: 1 -for-loop.

So, Pedro needs to use for-loop to write a block of code that will repeat a loop six times. Because when you use for-loop, you know how many iterations are in a loop to execute a block of code. So in this case, the number of iteration is known. Therefore, Pedro needs to use for-loop.

While other options are not correct because:

Else and else are used to make decisions, these are not used to repeat a block of code. These are code branching statements in simple words. While while-loop is used to iterate/loop a block of code but when you don't know the exact number of repetitions.

Answer:

for loop

Explanation:

sorry im late

If you were asked to make a presentation to your class that requires you to show pictures, text and video, which program would be the best choice? A. Internet explorer B. Photoshop C. Microsoft word D. Microsoft PowerPoint

Answers

Answer:

D

Explanation:

Microsoft PowerPoint is a presentation program.

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display
Other Questions
Suppose $f(3) = 4$. Name a point that must be on the graph of $y=f(x)+4.$Enter your answer as an ordered pair. how are the high holy days of rosh hashanah and yom kipper similar? 2.2.1 A loss-free generator supplies 50 MW to an infinite bus, the steady-state limit of the system been 100 MW. Determine whether the generator willremain in synchronism if the prime mover input is abruptly increased by30 Mw. Strong contrasts in texture have what effect on a monochromatic design? john is considering the purchase of a lot. he can buy the lot today and expects the price to rise to $16,700 at the end of 10 years. he believes that he should earn an investment yield of 8 percent compounded annually on his investment. the asking price for the lot is $8,000. required: a. what is the internal rate of return compounded annually on the investment if john purchases the property for $8,000 and is able to sell it 10 years later for $16,700? note: do not round your intermediate calculations and round your final answer to 2 decimal places. b. should he buy the lot? Failure to conduct a _______ opens an organization to the possibility of a negligent hiring suit. a request for proposal is required for projects that are completed by an external contractor to an organization. group of answer choices true false Read the sentence.compared with the computer-basedThe card catalog in our public library sits in its original location, and naturally seemssystem that has since come into use.Which word, derived from the base word arch, belongs in the blank?1. archaicarchitectural3. architecture4. archive Peter suffers from recurrent episodes of dizziness. What condition does Peter have?A. glaucomaB. barotraumaC. exotropiaD. vertigoE. myopia if a patient is having a class iii restoration on the maxillary central incisor, which type of matrix system would be used? I NEED AN ANSWER ASAP GIVING 20 POINTS FOR IT!! A childs sandbox is 4 ft wide, 6 ft long, and 2 1/2 ft deep. What is the volume of the sandbox? calculate the size of a cube an item not subtracted in determining accumulated taxable income for the accumulated earnings tax is dividends paid. net long-term capital gains reduced by the attributable taxes. net capital losses. a net operating loss deduction from a prior year. what is commutation? how can a commutator convert ac voltages on a machines armature to dc voltages at its terminals? PLEASE HELP IM FAILING!!!!!!!!!!! 30 POINTS! To capture New Orleans, the Union . The North successfully took over the city into the war. After New Orleans, the Union focused on and captured that city after a major battle. With the efforts of Admiral , the Union navy had made major gains in Louisiana by 1863.thank you very much!!!! If A is the angle between the vectors u = (5, 0, 48 ) and v = (0, 0, 1). What is the value of cosine of A ? Fronthouse Corp. issues 10,000 shares of no-par value preferred stock for cash at $60 per share. The journal entry to record the transaction will consist of a debit to Cash for $600,000 and a credit (or credits) to:__________.Preferred Stock for $20,000 and Retained Earnings for $580,000.Retained Earnings for $600,000.Preferred Stock for $20,000 and Additional Paid-in Capital for $580,000.Preferred Stock for $600,000. The ENTHALPY of vacancy formation accounts for ___ and acts to ___ the concentration of vacancies in a material while the ENTROPY of vacancy formation accounts for the ___ and acts to ___ the concentration of vacancies in a material. 24. Regarding MM 1958 proposition, all of the following is correct EXCEPTa. Shareholders should care about the firm's debt policy.b. Firm value is unaffected by the firm's capital structure.c. After a change in capital structure, the firm's value should be the same as it was prior to the chance in capital structure.d. The proposition is also called the debt-irrelevance proposition. which of the following are characteristics of tacacs ? (select two.) answer allows three different servers (one each for authentication, authorization, and accounting). allows two different servers (one for authentication and authorization and another for accounting). uses udp. uses tcp. can be vulnerable to buffer overflow attacks.