Write a Python program in Python-IDLE(in Script mode), save and upload in the
classroom for the following. 1) To calculate addition, subtraction, multiplication
of any 2 values which you will input while running the program. 2) To input 5
values, calculate total and average of those five values.
Your answer​

Answers

Answer 1
num1 = int(input(“Enter First Number: “)
num2 = int(input(“Enter Second Number: “)
add_num = num1 + num2
sub_num = num1 - num2
mult_num = num1 * num2
div_num = num1 / num2
print(“Results”)
print(“Addition: “ + add_num)
print(“Subtraction: “ + sub_num)
print(“Multiplication: “ + mult_num)
print(“Division: “ + div_num)

Related Questions

PLEASEEEE HELPPPP
Which key navigates a user out of Read View to the previous view?​

Answers

Answer:
Esc/Escape
explanation:

If an IT auditor wants to check the performance of a company's employees, which security framework should the auditor use?

Answers

Answer:

A project audit framework is the set of processes and guidelines for conducting a project audit, which can include risk assessments along with governance and controls oversight at various points of different projects.

An apple cake recipe calls for 454 grams of apples and 50 grams of raisins. How many kilograms of fruit are needed to make 12 cakes?

Answers

Answer:

9.08

Explanation:

Because 454 divided by 50 is 9.08

Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.

Answers

Answer:

NIST SP 800 30

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.

This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

jorge has asked you to explain to him how a touch pen can work with his android tablet. which of the following are true statements about touch pens? (choose all that apply.) a. a touch pen might use a bluetooth connection to write on a tablet. b. a touch pen is made of material that can touch the screen without damaging it. c. a touch pen might need charging. d. a touch pen does not use a wi-fi connection.

Answers

A touch pen might use a bluetooth connection to write on a tablet. This statement is true about touch pens. Therefore, the correct option is option A.

Thus was born the touch screen pen, best known as the stylus. Today, resistive touch screens are thought of as archaic technologies - inferior to their capacitive sister screens. With this shift, the very existence of the stylus has teetered in limbo. A touch pen might use a bluetooth connection to write on a tablet. This statement is true about touch pens.

Therefore, the correct option is option A.

To learn more about touch pen, here:

https://brainly.com/question/30328196

#SPJ4

Security Technology Incorporated (STI) is a manufacturer of an electronic control system used in the manufacture of certain special-duty auto transmissions used primarily for police and military applications. The part sells for $61 per unit and STI had sales of 24,300 units in the current year, 2021. STI had no inventory on hand at the beginning of 2021 and is projecting sales of 26,900 units in 2022. STI is planning the same production level for 2022 as in 2021, 25,600 units. The variable manufacturing costs for STI are $22, and the variable selling costs are only $0.40 per unit. The fixed manufacturing costs are $128,000 per year, and the fixed selling costs are $560 per year.
Required:
1. Prepare an income statement for each year using full costing.
2. Prepare an income statement for each year using variable costing.

Answers

1. Under full costing, STI's income statement for the current year shows sales revenue of $1,486,300, cost of goods sold of $779,500, and a net income of $259,800. For the projected year, sales revenue is estimated to be $1,641,400, cost of goods sold to be $812,800, and a net income of $328,800.

2. Under variable costing, STI's income statement for the current year shows sales revenue of $1,486,300, variable expenses of $657,900, and a net income of $294,200. For the projected year, sales revenue is estimated to be $1,641,400, variable expenses to be $712,600, and a net income of $342,800.

Under full costing, all manufacturing costs, both variable and fixed, are included in the cost of goods sold. This means that the income statement reflects the complete cost of producing each unit, including the allocation of fixed costs. In the current year, STI had sales of 24,300 units, which generated sales revenue of $1,486,300 (24,300 units x $61 per unit). The cost of goods sold was $779,500, calculated as (24,300 units x $22 variable manufacturing cost) + $128,000 fixed manufacturing costs. Subtracting the cost of goods sold from sales revenue gives a net income of $259,800.

For the projected year, STI estimates sales of 26,900 units, which would generate sales revenue of $1,641,400 (26,900 units x $61 per unit). The cost of goods sold is estimated to be $812,800, calculated as (26,900 units x $22 variable manufacturing cost) + $128,000 fixed manufacturing costs. Subtracting the cost of goods sold from sales revenue gives a projected net income of $328,800.

Under variable costing, only the variable manufacturing costs are included in the cost of goods sold, while fixed manufacturing costs are treated as period costs and are not allocated to the units produced. In the current year, the variable expenses amounted to $657,900, calculated as 24,300 units x $22 variable manufacturing cost. Subtracting the variable expenses from sales revenue gives a net income of $294,200.

For the projected year, the variable expenses are estimated to be $712,600, calculated as 26,900 units x $22 variable manufacturing cost. Subtracting the variable expenses from sales revenue gives a projected net income of $342,800.

Learn more about income statement

brainly.com/question/14890247

#SPJ11

The enhanced for loop _______________. Group of answer choices is only used for arrays of integers is convenient for traversing elements in a partially filled array is convenient for traversing all elements in an array

Answers

The enhanced for loop is convenient for traversing all elements in an array. Also known as the "for-each" loop, this loop is used for iterating over arrays and collections. Its syntax is concise and easy to read, making it a popular choice for looping through arrays.

The enhanced for loop is not restricted to just arrays of integers, but can be used with any array or collection. It is especially useful for traversing through a partially filled array since it automatically skips over any null elements.

The syntax for the enhanced for loop is as follows:

```
for (dataType variable : array/collection) {
 // code to be executed
}
```

In this loop, the dataType represents the type of element in the array or collection, the variable represents the temporary variable used for storing each element during iteration, and the array/collection is the name of the array or collection being iterated over.

For example, if we have an array of integers called `numbers`, we can use the enhanced for loop to print out each element in the array as follows:

```
int[] numbers = {1, 2, 3, 4, 5};

for (int num : numbers) {
 System.out.println(num);
}
```

This will output the following:

```
1
2
3
4
5
```

Overall, the enhanced for loop is a convenient and easy-to-use way of iterating over arrays and collections in Java.

To know more about looping visit :

https://brainly.com/question/14390367

#SPJ11

Populate a stack with ten random integers and empty it by showing that the order of the elements is reversed, from last to first.

CODE IN JAVA.

Thanks a Lot!

Answers

Answer:

class Main {  

 public static void main(String args[]) {

   Deque<Integer> stack = new ArrayDeque<Integer>();

   Random rand = new Random();

   for(int i=0; i<10; i++) {

       int n = rand.nextInt(100);

       System.out.printf("%02d ", n);

       stack.push(n);

   }

   

   System.out.println();

   

   while(stack.size() > 0) {

       System.out.printf("%02d ", stack.removeFirst());

   }

 }

}

Explanation:

example output:

31 18 11 42 24 44 84 51 03 17  

17 03 51 84 44 24 42 11 18 31

which access control model is based on assigning attributes to objects and using boolean logic to grant access based on the attributes of the subject?answerrule-based access controlmandatory access control (mac)role-based access control (rbac)attribute-based access control (abac)

Answers

Attribute-Based Access Control (ABAC) is the access control model that uses attributes and Boolean logic to grant access based on the attributes of the subject and the object. This model provides more flexibility and adaptability than other access control models, such as Rule-Based Access Control, Mandatory Access Control (MAC), and Role-Based Access Control (RBAC).

The access control model you are referring to is Attribute-Based Access Control (ABAC). ABAC is an advanced method for managing access rights by using a set of attributes, policies, and relationships to grant access based on the subject's attributes, the object's attributes, and the required actions.

This model allows for a flexible and dynamic way to manage access control, as it can adapt to changing requirements and environments.

In ABAC, access decisions are made using Boolean logic, taking into account multiple attributes of the subject, object, and environment. This allows for a more granular and context-aware control over access, as opposed to other models such as Rule-Based Access Control, Mandatory Access Control (MAC), and Role-Based Access Control (RBAC).

Rule-Based Access Control is a more static model where access is determined by predefined rules, while Mandatory Access Control (MAC) focuses on the classification of data and the clearance level of users. Role-Based Access Control (RBAC) assigns permissions based on predefined roles within an organization.

In summary, Attribute-Based Access Control (ABAC) is the access control model that uses attributes and Boolean logic to grant access based on the attributes of the subject and the object. This model provides more flexibility and adaptability than other access control models, such as Rule-Based Access Control, Mandatory Access Control (MAC), and Role-Based Access Control (RBAC).

To Learn More About Boolean

https://brainly.com/question/179886

SPJ11

histograms are used for numerical data while bar charts are suitable for categorical data. T/F

Answers

True. histograms are suitable for numerical data while bar charts are suitable for categorical data.

Histograms are used to display the distribution of numerical data, specifically continuous data, by dividing the data into intervals called bins. The height of each bar in a histogram represents the number of data points that fall into that bin. On the other hand, bar charts are used to display categorical data,

The height of each bar represents the count or frequency of each category. Bar charts are often used to compare different categories or groups, while histograms are used to show the distribution and shape of the numerical data.

To know more about data visit:

https://brainly.com/question/30051017

#SPJ11

You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and zero. What does the function return if the user enters a negative three? def factorial(number): product = 1 while number > 0: product = product * number number = number - 1 return product strNum = input("Enter a positive integer: ") num = int(strNum) print(factorial(num))
-6
1
-3
There is no output due to a runtime error.

Answers

Answer: well it’s not “There is no output due to a runtime error”

Explanation: Put that and I got it wrong

The Answer Is 1.

Edge 2020.

write a code fragment that sets y to 0 if x is negative and x is less than y. it should set y to 1 otherwise.

Answers

The code checks the given condition and sets the value of y accordingly.

To write a code fragment that sets y to 0 if x is negative and x is less than y, and sets y to 1 otherwise, follow these steps:
1. Use an if-else statement to check if x is negative and x is less than y.
2. If the condition is true, set y to 0.
3. If the condition is false, set y to 1.
Here's a sample code fragment in Python:
python
if x < 0 and x < y:
   y = 0
else:
   y = 1
This code checks the given condition and sets the value of y accordingly.

Learn more about if-else visit:

https://brainly.com/question/21937163

#SPJ11

1. An isosceles triangle is a triangle that has at least two equal sides. Write a pseudocode algorithm that determines whether a triangle is an isosceles triangle. • The user inputs the lengths of the three sides as Length 1, Length2, Length3 • If any two sides have the same length the program outputs "Isosceles". • Otherwise the program outputs "Not Isosceles". [6]​

Answers

The pseudocode algorithm that  tends to tell whether a given triangle is seen as an isosceles triangle is known to be given in the image attached

What is the program?

In the image algorithm, we need to read all of the lengths of the various three sides of the triangle that has been given from the user.

Thereafter, one need to check if there is found to be any of the two sides that is said to have the same length via the use of the term the OR logical operator.

In all, the algorithm is one that looks if any two sides of the given triangle is said to have the same length.

Learn more about program from

https://brainly.com/question/23275071

#SPJ1

How is HTTP related to World Wide web ( WWW)?​

Answers

Answer:

HTTP is the protocol that enables communication online, transferring data from one machine to another.

Explanation:

WWW is the set of linked hypertext documents that can be viewed on web browsers.

The resources of the Web are transferred via the Hypertext Transfer Protocol (HTTP), may be accessed by users by a software application called a web browser, and are published by a software application called a web server. ... English scientist Tim Berners-Lee invented the World Wide Web in 1989.

If the value is set to equals to current entry then
a) the argument remains unchanged
b) the argument always changed
c) the argument will be deleted
d) the argument can be ignored
I will definitely mark you Brainliest for answering the correct answer!​

Answers

Answer:

this is a fallacy

a is the answer

Which of these is a common problem with data transmission? a.File format b.Network Speed c.File size d.Data routing

Answers

Answer:

Answer is b

Explanation:

a. File format had nothing to do with the data transmission

c. File size matters only if the network speed is low, so, it again a fault of network speed.

d. Data routing has noting to do with data transfer, only network routing is required.

List out the wrap to options.​

Answers

It appears that you are requesting to know the Wrap Text Options in Microsoft word. Note that the options are indicated and explained below.

In Line with TextSquareTightThroughTop and BottomBehind TextIn Front of Text

What are the Wrap Text options in Microsoft Word?

In Microsoft Word, there are several options for wrapping text around an object or graphic. The wrap text options are as follows:

In Line with Text: This option inserts the object in the line of text, making the text wrap around the object.

Square: This option creates a square-shaped border around the object and wraps the text around the sides of the square.

Tight: This option wraps the text tightly around the contours of the object.

Through: This option allows the text to wrap around the object and appear in front of or behind the object as well.

Top and Bottom: This option creates a rectangular border around the object and wraps the text around the top and bottom edges of the rectangle.

Behind Text: This option places the object behind the text, with the text in front of the object and no wrapping.

In Front of Text: This option places the object in front of the text, with the text behind the object and no wrapping.

These options can be accessed by selecting an object or graphic in Microsoft Word and clicking on the "Wrap Text" button in the "Format" tab of the ribbon menu.

Learn more about Wrap Text Options:
https://brainly.com/question/30160011
#SPJ1

Full Question:

List out the Wrap Text Options in Microsoft Word

Why is it important for an app developer to work closely with the client and end users to understand what their users want and need?

Answers

if the app developer doesn't meet the clients needs within the app the client may be dissatisfied, and not use the app. The client could also spread the word that this app developer dosen't listen to their customers and this could jeopardize future clients wanting to work with the app developer.

Select the correct answer.
Which control segment communicates with the satellites?
A. master stations
B. monitoring stations
C. ground antennas
D. control towers ​

Answers

Explanation:

I think

D.Control towers

hope this helps you

have a great day:)

The control segment communicates with the satellites is control towers. The correct option is D.

What is control tower?

A supply chain control tower is defined by Gartner as a concept that combines people, process, data, organization, and technology.

Control towers gather and utilise operational data that is nearly real-time from the whole company ecosystem to increase visibility and facilitate decision-making.

A supply chain control tower is a cloud-based solution that uses cutting-edge technologies to manage supply chains in a proactive manner.

These technologies include artificial intelligence (AI), machine learning, and the Internet of Things (IoT).

A supply chain control tower enables businesses to better identify, classify, and address urgent problems in real time.

Control towers are the portion of the network that interacts with the satellites.

Thus, the correct option is D.

For more details regarding control tower, visit:

https://brainly.com/question/12060951

#SPJ2

Which type of computer is used microprocessor​

Answers

Assuming you mean which type of computer uses a microprocessor the answer would be: A pc and/or microcomputer which use a single chip which is a microprocessor for their CPU (central processing unit)

Besides a backup technician, who else would have encrypted backup passwords?

CEO

IT administrator

Data analyst

programmer ​

Answers

Answer:

CEO

Explanation:

why does a wooden spoon not get hot when used in stirring hot liquids​

Answers

Answer:

Explanation:

A wooden spoon does not get hot when used in stirring hot liquids​ is because its an insulator.

Please help! Here is the question and the answer choices.

Please help! Here is the question and the answer choices.
Please help! Here is the question and the answer choices.

Answers

It should be Line 06

Answer:

It is line 3. Line 3 is supposed to be hasNegative >- true.

Explanation:

It is line 3 because the hasNegative <- true doesn't make any sense. It is supposed to change into hasNegative >- true because if the list contains a negative number, it should return as true. But hasNegative <- true means the opposite.

Hope it helped!

If the _____ is a pathway for information, the _____ is one type of content that travels along that path.
Select one:
a. Internet; web
b. web; text
c. web; Internet
d. hardware; software

Answers

Answer:

The answer is A. Internet; web.

Explanation:

The Internet is a global network of interconnected computer networks, which allows for the exchange of information between devices across the world. The Internet is like a highway or pathway that allows data to travel between computers and other devices.

__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

Answers

According to security evaluation, Penetration testing is a level beyond vulnerability testing, a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

Penetration testing is often considered or described as ethical hacking. It involves the process of securing a firm or organization's cyber defenses.

The process of penetration testing or security testing includes assessing for exploitable vulnerabilities in networks, web apps, and user security.

Hence, in this case, it is concluded that the correct answer is Penetration testing.

Learn more about penetration testing here: https://brainly.com/question/13137421

Determine whether the compound condition is True or False.
7<12 or 50!=10

7<12 and 50<50

not (8==3)

Answers

The  compound condition are:

7<12 or 50!=10 is false7<12 and 50<50 is falsenot (8==3) is true

What is compound condition?

A compound statement is known to be one that shows up as the body of another statement, e.g. as in if statement.

The  compound condition are:

7<12 or 50!=10 is false7<12 and 50<50 is falsenot (8==3) is true

Learn more about compound condition  from

https://brainly.com/question/18450679

#SPJ1

A server creates a port that it uses to receive requests from clients. discuss the design issues concerning the relationship between the name of this port and the names used by clients

Answers

The issues raised by the name of the port and the name used by clients are service, efficiency and the local identifiers.

What is a server created port?

A server created port is the login endpoint assigned with the specific number, that mediates the delivering exchange of the information in between the server and the client.

The design issues that may rise with the name of the port and the name used by the clients includes:

Unaware to learn the port and the IP address used by the client in order to reach the service.

The problem with different servers offering services at the same time.

Efficiency problem with the port access and the local identifiers.

Learn more about server port, here:

https://brainly.com/question/13105604

#SPJ1

use this number for the following exercises: 121,981.2298001 1.a. convert the number into a string. 1.b. convert the number into an integer. 1.c. round this number to 3 decimals. 1.d. round this number to the nearest thousa

Answers

Answer:

C.) Round the number

Explanation:

Hope this helps.

Why is saltatory conduction along a myelinated axon faster than continuous conduction along an unmyelinated axon?

a. Since there are many more voltage-gated channels located along a myelinated axon, the conduction rate all along the axon is more rapid than along an unmyelinated axon (which has fewer channels).

b. Since the bioelectric current travels very fast along the membrane surfaces surrounded by myelin (under the Schwann cells) the overall impulse conduction rate is very rapid.

c. Since action potentials do not occur at the axonal membrane surrounded by myelin, less membrane surface (only at nodes of Ranvier) has to conduct the impulse

d. The lack of myelin around unmyelinated axons causes them to be unable to conduct impulses; therefore the myelinated axons will have a faster impulse conduction rate.

Answers

The correct answer is (c): Since action potentials do not occur at the axonal membrane surrounded by myelin, less membrane surface (only at nodes of Ranvier) has to conduct the impulse.

Myelin is an insulating material that surrounds some axons, forming a myelin sheath. In myelinated axons, the myelin sheath acts as an electrical insulator, preventing the flow of ions across the membrane and slowing down the spread of the action potential. However, at regular intervals along the axon, there are small gaps in the myelin sheath called the nodes of Ranvier, where the axon membrane is exposed to the extracellular fluid. This is where the action potential is generated and regenerated, allowing it to "jump" from node to node in a process called saltatory conduction.

To know more about axon visit:

https://brainly.com/question/30462668

#SPJ4

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors.

Answers

Answer:

D. The method for retrieval is dependent on the specific app or device’s operating system.

Other Questions
Since broad product-markets can have many submarkets, target marketers have ______. [tex]\sqrt{49}[/tex] cells taken from henrietta lacks have been used for experiments leading to _____. A young girl decides to toss a biased coin with P (heads) = 0.3 repeatedly until she gets a head. She will make at most 6 tosses. Let the random variable Y denote the number of heads. Find the variance of Y. there should be safeguards against excessive personal data collection is called? Rathke, inc has a defined-benefit pension plan covering its 50 employees. Rathke agrees to amend its pension benefits. As a result, the projected benefit obligation increased by 51,500,000. Rathke determined that all its employees are expected to recelve benefits under the plan over the next 5 years. In addition, 20% are expected to retire or quit each year. Assuming that Rathke uses the years. of-service method of amortization for prior service cost, the amount reported as amortization of prior service cost in year one after the amendment is $300,000 $500,000$150,0005400,000. explain the connection between lennies mouse and what happen in weed People are most likely to negatively view ______ as being a condition that could be controlled but is not due to lack of self-discipline. the challenge with cloud service providers is that they cannot provide a secure environment. Opps, forget to add picture. 6 minutes left. Pls help, thank you! Johanna ha a cell phone plan that ha a monthly charge plu a per text fee. In October, he ent 45 text and her bill wa $37. 25. In November, he ent 118 text and her bill wa $40. 90. Part ADetermine the y-intercept and write it in coordinate form. ( , )Part BExplain what the y-intercept repreent in the problem ituation. What is reflexive closure example? a train starting from a distance of velocity of 90 km.h -1 in 10 minutes assuming that the acceleration is uniform find the acceleration and the distance travelled by the train for attending the velocity Apnea is a symptom of any number of different etiologies.TrueFalse In a converter, 9.33 kg of SO3 is fed and allowed to come into contact with a certain amount of 91.34% H2SO4 to produce 4.71% oleum. How much oleum was produced in kg? Use the following molecular weights: 80 kg/kmol SO3, 98 kg/kmol H2SO4. If an apple experiences a constant net force, it will have a constant Michael Jackson's "Thriller" album has sold 29,000,000 copies. This number can be written as n x 107.What is the value of n? What as a direct result of the Atlantic slave trade on West Africa? Consider an electric field that is uniform in direction throughout a certain volume. Can it be uniform in magnitude? Must it be uniform in magnitude? Answer these questions (b) assuming the volume is empty space. State reasoning to prove your answers. An archery video game has an auto-aim feature.An archer wants to hit point T but his bow is aimed at point A, which is 15 m away from T as shown. Theauto-aim feature also knows that the archer is 60 m away from T and 50 m away from AHow many degrees will the auto-aim feature adjust the shot?Do not round during your calculations. Round your final answer to the nearest degree