write a program to input a number and display it's square root and cube root​

Answers

Answer 1

Answer: Here you go, change it however you like :)

Explanation:

x = int(input("Enter number: "))

print(f"\nSquare root: {x**(1./2.)}")

print(f"\nCube root: {x**(1./3.)}")


Related Questions

Keith would like to compare data he has collected from research. The data includes the electrical output
current from five different chips. Which type of graph should he use?
a line graph
a bar graph
a pie graph
an area graph

Answers

Answer: my test says line graph soooo….

Explanation: if its what the test says

A frequency distribution is a tabulation of n data values into k classes called bins. true. or false

Answers

It's true what is said here. In a frequency distribution, the bin widths are typically equal.

What do bins and classes mean?

When displaying numerical data, a histogram divides the data into "bins" of equal width. Each bin is represented graphically by a bar whose height reflects the number of data points it contains. Intervals, classes, and buckets are other names for bins.

What do data bins mean?

When grouping values in a chart, bins are single continuous value ranges. Binning data makes data visualisations easier to understand so that users can quickly identify outliers and gain a sense of the distribution of their data.

Learn more about bins here:

https://brainly.com/question/29381794

#SPJ1

Did you get it practica de gramatica level 2 pp 204 205 answer key

Answers

The word "valiente" corresponds to the description "A very brave person who is not afraid of anything."

How can this be used in a sentence?

The word "valiente" can be used in a sentence like this -

"She is a valiente warrior who fearlessly faces any challenge that comes her way."

In this sentence, "valiente" describes the person as brave and fearless, emphasizing their courage and lack of fear.

Hence, the correct answer is Option B - Valiente - Brave.

Learn more about brave:
https://brainly.com/question/1393446
#SPJ1

Full Question

A very brave person who is not afraid of anything.

hermosa

valiente

guerrero

What type(s) of media can be pre-recorded (read only), recordable (write once), or re-recordable (read and write multiple times)? (2 points) Enter your answer​

Answers

Answer:

An optical disc.

Explanation:

An optical disc is a small and flat digital-optical disc that is usually circular and used to store computer data by using a laser beam.

The optical disc is able to store digital data because it is made up of a polycarbonate (a tough-brittle plastic) with one (1) or more metal layers.

Additionally, the data stored in an optical disc cannot be scrambled by a magnet because it isn't made of a magnet or doesn't have a magnetic field. There are different types of optical disc and these are; CD-ROM, CD-R, CD-RW, DVD-RAM, DVD-ROM, DVD+/-RW, BD-RE, DVD+/-R, BD-R, BD-ROM.

Where; CD is an acronym for compact disc.

DVD is an acronym for digital video disc.

BD is an acronym for Blu-ray disc.

R represents read only.

RW represents read and write.

RE represents read, write and erasable.

Hence, an optical disc is a type of media that can be pre-recorded (read only), recordable (write once), or re-recordable (read and write multiple times).

What is best for a busy student to do for better results in school?

increase extracurricular activities
transfer to a new school
manage time and stress
manage and budget money

Answers

Answer:

Manage time and stress

Explanation:

This is obvious

Answer:

manage time and stress

Explanation:

the person above or below me was correct.

Select the correct word to complete the sentence.
_______connections tend to be more reliable, secure, and faster than______
connections.
______connections tend to be more convenient than_______
allowing users to be more mobile.

Answers

Answer:

Wired, Wireless, Wireless, Wired

Explanation:

Answer:

Wired connections tend to be more reliable, secure, and faster than wireless connections. While wireless connections tend to be more convenient, allowing users to be mobile. Many businesses and homes use a combination of wired and wireless.

Explanation:

Edge 2022

Select the correct word to complete the sentence._______connections tend to be more reliable, secure,

Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that calculations. What could she use instead?

Answers

The cube root is a number multiplied by itself three times to get another number

The code to use is y = x**(1/3)

How to determine the code to use

Assume the variable is x, and the cube root of x is y.

So, we have the following equation

\(y = x^\frac13\)

In Python, the code to use is y = x**(1/3)

Hence, the code that Rachelle can use in her calculation is x**(1/3)

Read more about cube roots at:

https://brainly.com/question/365670

Answer:

The code that Rachelle can use is x**(1/3).

Explanation:

#BrainliestBunch

2. List at least three signal words the professor uses in the video. How did he use the signal

words?

Answers

Answer:

cherry

van

red

George

gold

which of the following is an open-source intrusion detection system that provides search and analysis tools to help index collected data?

Answers

The answer is OSSEC, which stands for Open Source Security. OSSEC is an open-source Intrusion Detection System (IDS) that provides search and analysis tools to help index collected data. It is designed to detect and prevent cyber attacks on both local and remote systems and networks, while also providing security log analysis and file integrity checking.

What Is An Intrusion Detection System:The Intrusion detection system is the one that works on detection and prevention systems and determines whether the activity is present that is contrary to organization policy.A monitoring system called an intrusion detection system (IDS) looks for abnormal activity and sends out alarms when it does.a(n) reprsents the intrusion.

More About Intrusion Detection System: https://brainly.com/question/28962475

#SPJ11

15 points and brainliest if correct! :D

Complete the following sentence.
______ is an essential skill in order to decipher the massive amount of new information for any job dealing with data.

Answers

Technology I think (this is so I can answer this)
Technology I think it is

upon complete the step-3, type a tcp command (?) to show how many ips and their corresponding mac addresses of other nodes are fond at your pc?

Answers

An effective way to check the IP and MAC addresses of other devices connected to your network is by utilizing the "arp" command in TCP/IP.

What happens to the PC after the command is entered?

By entering "arp -a" in a command prompt or terminal, you can access the ARP (Address Resolution Protocol) table that documents the IP addresses and correlated MAC addresses of all devices which have exchanged data with your computer.

It should be noted that the exact command and outcome may differ based on your network setting and the operating system you are using.

Read more about network configuration here:

https://brainly.com/question/29765414

#SPJ1

Write a C program mywho whose behavior that closely resembles the system command who . To decide what information in what format mywho should display, run the standard who command on your computer:
​$ who
stan console Sep 17 08:59
stan ttys000 Sep 24 09:21
mywho is not expected to accept any command line arguments.

Answers

In order to create a C program called mywho that behaves similarly to the system command who, we will need to first understand what information and format the who command displays. Running the who command on our computer shows us a list of users currently logged in, along with their terminal/console and the time they logged in.

To create our mywho program, we will need to use system calls to access this information and display it in the same format as the who command. Specifically, we will use the getutent() function to access the utmpx database, which contains information about current users and their login sessions.

Our mywho program will need to loop through the entries in the utmpx database and print out the relevant information for each user in the same format as the who command. This includes the user's name, terminal/console, and login time.

Since the mywho program is not expected to accept any command line arguments, we will need to hardcode the functionality to access the utmpx database and display the information in the correct format.

Overall, the behavior of our mywho program will closely resemble the system command who by displaying information about current users and their login sessions in the same format.

Learn more about C program here:

https://brainly.com/question/30905580

#SPJ11

What are a few ways to format the text in a mail message in Outlook? Check all that apply.
Attach a file to the message to be opened separately.
Open the Font dialog box to access more detailed options.
Increase or decrease the indent.
Copy and paste text from a Word document
Use the Mini Toolbar to change the font appearance.
Click the Format Painter to paste a saved font format.

Answers

Answer:

The answers are b,c,d,e,f

Explanation:

List six characteristics you would typically find
in each block of a 3D mine planning
block model.

Answers

Answer:

Explanation:

In a 3D mine planning block model, six characteristics typically found in each block are:

Block Coordinates: Each block in the model is assigned specific coordinates that define its position in the three-dimensional space. These coordinates help locate and identify the block within the mine planning model.

Block Dimensions: The size and shape of each block are specified in terms of its length, width, and height. These dimensions determine the volume of the block and are essential for calculating its physical properties and resource estimates.

Geological Attributes: Each block is assigned geological attributes such as rock type, mineral content, grade, or other relevant geological information. These attributes help characterize the composition and quality of the material within the block.

Geotechnical Properties: Geotechnical properties include characteristics related to the stability and behavior of the block, such as rock strength, structural features, and stability indicators. These properties are important for mine planning, designing appropriate mining methods, and ensuring safety.

Resource Estimates: Each block may have estimates of various resources, such as mineral reserves, ore tonnage, or grade. These estimates are based on geological data, drilling information, and resource modeling techniques. Resource estimates assist in determining the economic viability and potential value of the mine.

Mining Parameters: Mining parameters specific to each block include factors like mining method, extraction sequence, dilution, and recovery rates. These parameters influence the extraction and production planning for the block, optimizing resource utilization and maximizing operational efficiency.

These characteristics help define the properties, geological context, and operational considerations associated with each block in a 3D mine planning block model. They form the basis for decision-making in mine planning, production scheduling, and resource management.

Write a program that:

stores your name in one variable called name
stores your age in another variable called age
prints a one-line greeting that includes your name and your age.
Your program should output something like this:

Hi! My name is Arthur and I am 62 years old.

Hint: Do not get user input for the values of name and age but instead simply save these values inside your program as static variables, or variables that do not change value.

Answers

Answer:

#include<iostream>

#include<string>

using namespace std;

int main() {

   const string name = "Arthur";

   const int age = 68;

   cout<<"Hey my name is "<<name<<" and my age is "<<age;

   return 0;

}

Explanation:

Above is the c++ program for printing one line greeting that includes your name and your age.

String library is used to save name in constant string variable "name"

and age is stored in constant integer type age variable then both of them are printed using cout (ostream object) build in iostream library.

Program output has been attached below.

Write a program that:stores your name in one variable called namestores your age in another variable

Linux is a powerful and free OS®️
-True
-False

Answers

Answer:

TRUEE

Explanation:

It’s is true that Linux is powerful and free

"Caller ID" is the feature that displays the telephone number of the caller on the telephone of the person he or she calls. With Caller ID now routine and widely used, it might be surprising that when the service was first available, it was very controversial because of privacy implications. (a) What aspect of privacy (in the sense of Section 2.1.1) does Caller ID protect for the recipient of the call? What aspect of privacy does Caller ID violate for the caller? (b) What are some good reasons why a nonbusiness, noncriminal caller might not want his or her number displayed?

Answers

Answer: Provided in the explanation section

Explanation:

please follow this explanation for proper guiding.

(a)

i. What aspect of privacy does Caller ID protect for the recipient of the call?

* The beneficiary of the call utilizing the Caller ID highlight becomes more acquainted with who precisely the guest is, independent of the guest being a decent/terrible individual or authentic/ill-conceived call.  

* Depending on how the call went or wound up, i.e., the discussion, business, messages passed on, the beneficiary would have the option to act in like manner and suitably dependent on the guest and his message's respectability, habits, morals, demonstrable skill, or telephone decorums, and so forth.  

* Also, the beneficiary gets the alternative to choose how to manage the call even before him/her picking the call, when he/she comes to know who the guest is through Caller ID include, the beneficiary gets security by either separating the call, sending or diverting the call, recording the call, not noting the call, or in any event, blocking or announcing the number in any case. Along these lines, the beneficiary's security is ensured from various perspectives.

ii. What aspect of privacy does Caller ID violate for the caller?

* Even however as it were, in fact it distinguishes, confirms, and validates the guest demonstrating he/she is who he/she professes to be. In any case, the guest ID highlight or innovation unveils numerous information and data about the guest, for example, his accurate phone number or PDA number, nation code, the specific phone or versatile transporter organize he/she is utilizing, and so on., as this data may make dangers the guest's security, (for example, character burglaries or just assailants caricaturing others utilizing this current guest's data), classification, it might cause accessibility issue for the guest as when the guest is besieged with ill-conceived calls, spam, and undesirable calls, there are chances their telephone numbers could and would be imparted to many advertising and selling organizations or industry without the guest's assent, there are chances somebody focusing on the guest may tap or wire his/her significant, basic business, social, expert, individual, or private calls for touchy data to assault them and abuse the bantered data. The guest certainly loses his/her secrecy, opportunity, directly for discourse, security, and wellbeing when passing on messages over the call when they know there could be somebody tapping or recording the call, or even the beneficiary may abuse the guest's character and his/her passed on data.  

* Hence, the guest doesn't get the opportunity from reconnaissance i.e., from being followed, followed, watched, and spying upon by trouble makers.  

* The guest would lose the control of their data on how it would be put away or utilized.  

* The guest probably won't get opportunity from interruptions.

(b).  What are some good reasons why a non-business, non-criminal caller might not want his or her number displayed?

* A non-business and a noncriminal guest would need to enjoy typical, common, and regular exercises; mingle and do his/her own day by day close to home, private, and public activities' assignments, occupations, occasions, social occasions, correspondences, individuals organizing, and so on., without making any whine about things, exposure stunts, without causing anyone to notice tail, screen, follow, question, or explore the guest superfluously except if the guest has enjoyed, asked, stated, discussed, or passed on any message that is unlawful, exploitative, wrongdoing, and culpable.  

* Such a guest would need total or most extreme namelessness, as to them, guest ID innovation just uncovers their own and private life exercises, correspondences, and so forth., to others to pass judgment on them, question them, and later cross examine and research them on their interchanges.  

* Such guests for the most part search for security in general.  

* Specifically, such guests need classification of their calls, discussions, messages, call logs, and so forth.  

* The beneficiary on occasion may get the guest's private unlisted number without the guest's assent or authorization.  

* The beneficiary may utilize the guest's telephone number and name to get a lot other data about him/her, which the beneficiary should, that would incorporate the guest's location (area) through an opposite catalog or just turning upward in any phone registry.  

* The beneficiary might not have any desire to talk, mingle, or work with the guest in view of the area (address), ethnicity (from the name), race, or district the guest is from.  

*What do ISO 27002 entail?*

Answers

ISO 27002 is an internationally recognized standard that provides guidelines and best practices for information security management. It is a comprehensive framework that outlines the policies and procedures necessary to establish, implement, maintain, and continually improve an organization's information security management system.

The standard covers a wide range of security-related topics, including access control, asset management, business continuity, cryptography, human resource security, information security incident management, physical security, security governance, and risk management.
ISO 27002 is designed to help organizations protect their valuable information assets by providing a structured approach to managing security risks.

By implementing the standard's guidelines, organizations can ensure that they are effectively managing their information security risks, complying with relevant laws and regulations, and meeting the expectations of stakeholders.
The standard is regularly updated to reflect the latest trends and best practices in the field of information security management. It is widely used by organizations of all sizes and types, including government agencies, financial institutions, healthcare providers, and businesses in various industries.
For more questions on ISO 27002

https://brainly.com/question/29974825

#SPJ11

______ is a machine learning technique that helps in detecting the outliers in data

Answers

Outlier Detection is a machine learning technique that helps in detecting the outliers in data. It is used to identify data points that are significantly different from the majority of the data.

Finding and analysing data points that differ considerably from the bulk of the other data points in a dataset is the process of outlier detection. Outliers are data points that are significantly larger or smaller than the other data points in the dataset. They can significantly affect machine learning models and statistical analysis.

It can be used to detect anomalies in financial data, medical data, manufacturing data, or any other type of data.

For such more question on Detection:

https://brainly.com/question/12854520

#SPJ11

What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible by ten: " + counter); counter++; } else { System.out.println("Counter is not divisible by ten: " + counter); counter++; } Move the duplicated code outside of the if statement Shorten variable names Move the brackets to save several lines of code Add semicolons after the if condition and the else reserved word

Answers

Answer:

Move the duplicated code outside of the if statement

7. Rewrite this "for" loop into a while loop:
for (int i = 0; i < 6; i = (i + 2)/2) {
System.out.print(i + " ");
}
+

Answers

Answer:

int i = 0;

while (i<6) {

   System.out.print(i + " ");

   i = (i+2)/2;

}

Explanation:

Ch9: Apply Yourself Quiz
Answer the following questions after watching the video
"Fulfilling a Subpoena for the Record of a Deceased Patient."

Answers

The Subpoena of the deceased patient will contain all the details regarding the cause of death. It will also contain details on disease and pathology. The subpoena will be: Pathology is the study of disease. It functions as a bridge between science and medicine.  Medical experts who specialized in disease and suffering are called pathologists.

The American Osteopathic Board of Pathology also recognizes the four main subfields of anatomical pathology, cutaneous pathology, forensic pathology, and laboratory medicine.

Pathologists are in charge of making medical diagnosis. Anatomical pathology is one more of them. organs, tumors, and other tissues are examined. They examine the consequences of the disease by autopsy and microscopic investigation.

A subpoena, also known as a witness summons, is a writ issued by a government body, most frequently a court, to force the production of evidence or the testimony of a witness with a penalty for noncompliance.

To learn more on Subpoena, here:

https://brainly.com/question/28234638

#SPJ4

What is one step taken when solving a computer software problem?

Answers

scanning the computer and deleting any viruses

[ if this helped you please give brainliest :) ]

Answer:

B. scanning the computer and deleting any viruses

Explanation:

edge 2020

Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx

Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx

Answers

Answer:

I'm doing my best to send you my answer,

Explanation:

The coding will be below

Yuri is preparing for a certification exam in his industry and needs to study.However,he has a long commute for work each day where he's driving in crowded traffic.What form of digital communication would best help Yuri put this time to good use?

A) Online conferencing
B) Podcasts
C) Voice-to-text
D) Email

Answers

To best utilize Yuri's time during his long commute for studying, the most suitable form of digital communication would be option B) Podcasts.


A) Online conferencing is not feasible while driving in crowded traffic, as it would require visual attention and could lead to accidents.

C) Voice-to-text might be helpful for sending messages but not for studying during a commute.

D) Email is also not ideal for studying while driving, as reading and responding to emails would be a distraction. Moreover, it is used by professionals for communication.

Podcasts, on the other hand, allow Yuri to listen to audio content related to his certification exam while driving, without taking his attention away from the road. He can easily find podcasts on various topics in his industry, and listen to them during his commute. This way, he can effectively use his time and prepare for the exam without compromising his safety.

Therefore option B is correct.

Learn more about Podcasts:

https://brainly.com/question/16693974

#SPJ11

PLS HELP FOR ACSL What Does This Program Do - Arrays Problem. Pls give the correct answer!! ASAP!!!!!!

LOOK AT IMAGE PLS

PLS HELP FOR ACSL What Does This Program Do - Arrays Problem. Pls give the correct answer!! ASAP!!!!!!LOOK

Answers

After the following program is executed, 3 elements in the array are not zero.

What  is array?

An array is a data structure used for storing and organizing elements of the same data type. Arrays are typically used to store collections of numbers, strings, or objects. Arrays allow for fast access and manipulation of data, as elements can be retrieved and updated quickly. Arrays are also used in some programming languages for passing parameters to functions and for defining and accessing multidimensional data structures, such as matrices and tables. Arrays are usually created using the array constructor of the language, which specifies the data type of the array, the number of elements it can store, and the initial values of the elements. Arrays are dynamic in nature, meaning they can be resized and changed as needed. Arrays can also be used to store objects, allowing the programmer to create complex data structures.

To learn more about array

https://brainly.com/question/30510492

#SPJ1


Keegan has a hard drive that he wants to connect externally to his laptop. Which two ports can he connect the external hard drive to?
O Graphics Port
DisplayPort
0 0 0 0 0
USB-C
Thunderbolt
HDMI
Reset
Next

Answers

Answer:

,홀로 ㅛㅍㅍ 내 ㅍ. 냐 ㅑㅇㄹ ㅑ 덮고 ㅇ ㅗㅗ묙 ㅗㄴ ㄴ

Explanation:

소 묘 뉴 ㅕㅁ ㅣ 홈 ㅛ ㅑㅍㄴ. ㅕ 이 ㅕㅁ ㅛ ㅁ 포 ㅛ ㄴ ㅕ 여 あか

Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.

Answers

In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.

It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.

Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.

Learn more about slideshow on:

https://brainly.com/question/25327617

Answer:

"True"

Explanation:

I took the test!

what utility should always be used in order to delete checkpoints?

Answers

In order to delete checkpoints, we should always use Remove-VMSnapshot utility. This utility is used to delete a checkpoint, which is also known as a snapshot in Hyper-V virtual machines. When a snapshot is created, the VM state is captured in a single file on the host system and can be used to revert the VM to a previous state if needed.

However, it is not recommended to use snapshots as a backup solution, as it can lead to performance degradation and disk space usage. Instead, it is recommended to use a proper backup solution to backup virtual machines. In order to use the Remove-VM Snapshot utility.

Open Power Shell with Administrator privileges. Type the following command to list all snapshots for a particular virtual machine :Get-VM Snapshot -VM Name "Virtual Machine Name"3. Once you have identified the snapshot you want to remove, use the following command to delete the snapshot.

To know more about checkpoints visit:

https://brainly.com/question/2110439

#SPJ11

write a matlab program in a script file that finds a positive integer n such that the sum of all the integers 1 2 3 n is a number between 100 and 1,000 whose three digits are identical. as output, the program displays the integer n and the corresponding sum.

Answers

Answer:

%% Positive Integer between 100 and 1,000 with Identical Digits

% Initialize variables

n = 0;

sum = 0;

% Loop until an integer is found that meets the requirements

while sum < 100 || sum > 1000 || length(unique(num2str(sum))) ~= 1

   n = n + 1;

   sum = sum + n;

end

% Print the integer and corresponding sum

fprintf('The integer is %d and the sum is %d.\n', n, sum);

Other Questions
A car travels at a constant speed around a circular track whose radiu is 2.6 km. The goes once arond the track in 360s . What is the magnitude Classify the percentages based on their value.25% of 8010% of 20020% of 15050% of 4012% of 25060% of 50 A stadium has 64 sections. Each section has 872 seats. which is the total number of seats in the stadium? Which of the following represents happiness for Katie?Group of answer choiceslattesParischerry blossomsfault lines company manufactures x units of one item and y units of another. The total cost in dollars, C, of producing these two items is approximated by the function C = 5x2 + 4xy + 5y2 + 1000.a. If the production quota for the total number of items (both types combined) is 24, find the minimum production cost.b. Estimate the additional production cost or savings if the production quota is raised to 25 or lowered to 23. multiply mentally to find the product if the average density of e. coli (mostly water) is 1.1 103 g/l, what is the mass of a single cell? Jenna took an open bowl of leftover mashed potatoes from the refrigerator and noticed a difference in smell. She determined that chemical changes occurred since the potatoes were first placed there. Which observations most likely led to Jennas conclusion?a change of odora decrease in temperaturea change in moisture contenta decrease in mass If the government initiates an expansionary monetary policy at the same time that its budget deficit decreases, then the interest rate will ______________________. A leader is applying the principles of emotional intelligence. What outcome indicates the successful application of these principles? Question 5 Joy is a 52-year-old nurse who earns a salary of R286 500 per annum. She contributes 7% of her annua salary to a pension fund. She only has her 2 daughters listed as a dependents on her medical aid. Sh is concerned that the R4000 monthly income tax deduction is too much. Where are skeletal muscles used? Are they voluntary? the external acoustic meatus ends at the the external acoustic meatus ends at the tympanic membrane. vestibule. cochlea. auditory ossicles. pinna. Analysing the working principles of stepper motor, explain the operation mode of a two-phase, 5-rotor poles hybrid stepper motor with the aid of a truth table. Consider that each of the phases are energised. (14 marks) (b) A stepper motor has a resolution of 500 steps/rev in the 1-phase-ON mode of operation. Analysing the operation of the stepper motor in half-step mode, calculate: (i) Resolution (2 marks) (ii) Step angle (2 marks) (iii) Pulse rate required to obtain a rotor speed of 300rpm (4 marks) (iv) Number of steps required to turn the rotor through 72 (3 marks) What is the equation for an arithmetic sequence with a first term of 5 and a second term of 2? (5 points) an = 5 2(n 1) an = 5 + 2(n 1) an = 5 3(n 1) an = 5 + 3(n 1) What does 2.67+8.52 equal 3. How does your business fulfill corporate social responsibility? 1) Why was the Middle Passage so brutal? i am inclined to get to school early because? 1.Explain six techniques of promoting community participation in community development activities