Which is a method used to determine database requirement?
A.
review business forms
B.
fill in online forms
C.
delete old data
D.
archive data

Answers

Answer 1

Answer:

A.

Explanation:

Just a wild guess. :)


Related Questions

given a computer running four types of instructions, named classes a through d, calculate the execution time of a program that has an instruction count per category as follows: class a: 9 millions of instructions, with an average cpi of 4.1, class b: ic of 5m and cpi of 3, class c: ic of 11m and cpi of 0.9, and class d: ic of 2m and cpi of 1. the cpu runs at 14 mhz. what is the compute time of this program in seconds

Answers

Answer:

Kindly check explanation

Explanation:

Calculate the execution Time of the following :

class a: 9 millions of instructions, with an average cpi of 4.1, class b: ic of 5m and cpi of 3, class c: ic of 11m and cpi of 0.9, and class d: ic of 2m and cpi of 1. the cpu runs at 14 mhz.

Clock rate = 14 mhz

1/clock rate = 1/14,000,000Hz = 0.00000007143

Execution time = instruction count × cycle per instruction × 1/ clock rate

A) 9 millions of instructions, with an average cpi of 4.1,

Execution time = 9000000 × 4.1 × 0.00000007143 = 2.635767s

B.) ic of 5m and cpi of 3,

Execution time = 5000000 × 3 × 0.00000007143 = 1.07145 s

class c: ic of 11m and cpi of 0.9,

Execution time = 11000000 × 0.9 × 0.00000007143 = 0.707157 s

class d: ic of 2m and cpi of 1

Execution time = 2000000 × 1 × 0.00000007143 = 1.071450. 14286 s

2 or more computers that are linked together are called which of the following ?

Answers

Explanation:

When two or more computers are connected together so they can communicate with one another, they form a Network

Consider the following 2 pseudocode options for implementing the Allocate-Node() functionality of the BTree in C++. How would each impact the runtime of the
B-Tree-Insert function? Consider both asymptotic analysis as well as real time impacts.
Allocate-Node()
x = Node()
x.leaf = true
x.n = 0
x.keys = new int[2*t-1] \\ member variable int* keys
x.c = new Node*[2*t] \\ member variable Node** c
Allocate-Node()
x = Node()
x.leaf = true
x.n = 0
x.keys = { } \\ member variable vector keys
x.c = { } \\ member variable vector c

Answers

Answer:

The first option, using new, has a worst-case runtime of O(n), where n is the number of elements in the B-Tree. This is because the new operator must allocate memory for the entire node, which can be a significant amount of time if the node is large. The second option, using a vector, has a worst-case runtime of O(1). This is because vectors are automatically resized as needed, so there is no need to allocate a new block of memory each time a node is created.

In practice, the difference in runtime between the two options is likely to be small. However, if the B-Tree is large, the first option could have a significant impact on performance.

Here is a more detailed analysis of the two options:

Option 1: new

The new operator allocates memory on the heap. This means that the operating system must find a free block of memory large enough to hold the node, and then update the memory allocation tables. This process can be relatively slow, especially if the node is large.

In addition, the new operator can be a source of memory leaks. If a node is created but never deleted, the memory it occupies will eventually be reclaimed by the garbage collector. However, this can take a long time, especially if the node is large or if there are many other objects in the heap.

Option 2: vector

Vectors are a type of data structure that automatically resizes as needed. This means that when a new node is created, the vector will automatically allocate enough memory to hold the node's data. This is much faster than using new, and it also eliminates the risk of memory leaks.

However, there is one downside to using vectors: they can be slower than arrays for accessing individual elements. This is because vectors must first check to see if the element is within bounds, which can add a small amount of overhead.

In general, the second option (using a vector) is the better choice for implementing Allocate-Node(). It is faster, it eliminates the risk of memory leaks, and it is just as efficient for most operations. However, if performance is critical, and the nodes in the B-Tree are large, the first option (using new) may be a better choice.

How does a computer go through technical stages when booting up and navigating to the sample website? Answer the question using Wireshark screenshots.

Answers

When a computer is turned on, it goes through several technical stages before it can navigate to a sample website. The following are the basic steps involved in booting up a computer and accessing a website:

How to explain the information

Power On Self Test (POST): When a computer is turned on, it undergoes a Power On Self Test (POST) process, which checks the hardware components such as RAM, hard drive, CPU, and other peripherals to ensure they are functioning properly.

Basic Input/Output System (BIOS) startup: Once the POST process is complete, the BIOS program stored in a chip on the motherboard is loaded. The BIOS program initializes the hardware components and prepares the system for booting.

Boot Loader: After the BIOS startup is complete, the boot loader program is loaded. This program is responsible for loading the operating system into the computer's memory.

Operating System (OS) startup: Once the boot loader program has loaded the operating system, the OS startup process begins. During this process, the OS initializes the hardware, loads device drivers, and starts system services.

Web browser launch: After the OS startup is complete, the user can launch a web browser. The web browser program is loaded into the memory, and the user can navigate to a sample website.

DNS Lookup: When the user types in the website address, the computer performs a Domain Name System (DNS) lookup to translate the website name into an IP address.

HTTP Request: After the IP address is obtained, the web browser sends an HTTP request to the web server that hosts the website.

Website content delivery: Once the web server receives the HTTP request, it sends back the website content to the web browser, and the website is displayed on the user's screen.

These are the basic technical stages involved in booting up a computer and navigating to a sample website.

Learn more about computer on;

https://brainly.com/question/24540334

#SPJ1

By definition, a computer
has a screen
helps solve problems
requires batteries
O uses the internet

Answers

Answer:

helps solve problems

Explanation:

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

PLEASE HELPFind five secure websites. For each site, include the following:the name of the sitea link

Select the correct answer from each drop-down menu.
A spreadsheet is the computerized form of the
that people traditionally used to
. brainlist to best

Answers

Answer:

A spreadsheet is a computer application for organization, analysis and storage of data in tabular form. Spreadsheets were developed as computerized analogs of paper accounting worksheets. The program operates on data entered in cells of a table.

How is LUA different from Python?
Give an example.

Answers

This is the answer I couldn't write it here since brainly said it contained some bad word whatever.

Answer:

good old brainly think stuff is bad word even tho it is not had to use txt file since brainly think code or rblx is bad word

A coworker just sent you a presentation to review. You noticed that she used different types of transitions on the same slide, and the animations and videos were distracting from the topic. Give your coworker advice about guidelines she can follow when using animation, transitions, and multimedia. Be sure to include at least four guidelines

Answers

Answer:

The transitions presented should either be different on each slide or the same type but only one on each slide shown. Pictures and videos shouldnt be included a lot. At least two photos or one on each slide, while videos should only be one on the very last slide.

Explanation:

BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are able to maximize their download rates.
True or False?

Answers

Answer:

yes. it is true. mark as brainlest

Write a short essay (roughly 300 words) about some topic related to computing and/or communication technology that interests you and has social or ethical implications. Describe the background; then identify the social or ethical issues, problems, or questions that you think are important. (Don't make your essay be just an argument for one point of view. You may express your views if you want to, but first explain what the issues are, why there is a problem or a controversy.) Remember to define the problem.

Answers

A topic related to computing and/or communication technology that interests you and has social or ethical implications is computer programming.

What is the role of computer programming in the society?

Information Communication Technology (ICT) is known to be one that has brought about a lot of new ethical concerns as regards the protection of personal privacy, and also that of of intellectual property. It also encompasses the user responsibility, acceptable access and use of information.

Note that Computer programming is vital today because a lot of our world is said to be automated in nature. Humans do need to be able to control the communication that exist between people and machines.

Note that Since computers and machines are said to have the ability to do things so well and accurately, we therefore need to use  computer programming to get that computing power.

Learn more about computer programming from

https://brainly.com/question/23275071

#SPJ1

need help with the second part of the problem. I did "userNum1". I just need help with 2nd part, "userNum2".

need help with the second part of the problem. I did "userNum1". I just need help with 2nd part, "userNum2".

Answers

The code is given below.

What do you mean by Python Programming?

Python is a high-level, interpreted programming language that was first released in 1991. It is named after the Monty Python comedy group and was created by Guido van Rossum. Python is known for its readability, simplicity, and ease of use. It supports multiple programming paradigms, including procedural, object-oriented, and functional programming.

Here is the sample Python code to accomplish the task:

userNum1 = int(input("Enter userNum1: "))

if userNum1 < 0:

   print("userNum1 is negative.")

userNum2 = int(input("Enter userNum2: "))

if userNum2 > 15:

   userNum2 = 2

else:

   print("userNum2 is less than or equal to 15.")

This code prompts the user to enter two integer values userNum1 and userNum2. Then, it checks if userNum1 is less than 0, and if it is, it prints "userNum1 is negative.". The code also checks if userNum2 is greater than 15, and if it is, it assigns userNum2 to 2. Otherwise, it prints "userNum2 is less than or equal to 15.".

To know more about integer visit:

https://brainly.com/question/13265645

#SPJ1

what portion of companies use social media to locate new employees?

A. About a third
B. About Half
C. About Two-Third
D. Nearly All

Answers

Most companies will CHECK over social media when hiring, but not all companies ADVERTISE or use social media to get employees. About a third of companies ADVERTISE over social media.

A chord 6.6cm long is 5.6cm from the centre of a circle, calculate the radius of the circle​

Answers

Answer:

chord 30cm long is 20cm from the centre of a circle calculate the length of a chord ... Find the length of an arc of a circle of radius 5.6cm which subtends an angle of 60°at the centre of the circle of the ...

Answer: radius = 6.5 cm

Explanation:

The distance from the center to the chord is measured at its perpendicular.

Therefore we can use Pythagorean Theorem to find the radius.

r² = 5.6² + 3.3²

r² = 31.36 + 10.89

r² = 42.25

\(\sqrt{r^2}=\sqrt{42.25}\)

r = 6.5

A chord 6.6cm long is 5.6cm from the centre of a circle, calculate the radius of the circle

Name:

Sup-R Game Desktop – Model EEXL
Inteel® Core i7
6GB Tri-Channel DDR3
500GB SATA-II (7200 rpm)
16x CD/DVD burner
21.5” HD widescreen monitor
NVIDIA® GeForce
Creative Sound Blaster® X-Fi Titanium
Altec Lansing speakers
Gigabit Ethernet port
3 – year limited warranty
Windows 10


1. Suppose you are reading a computer magazine and you come across the ad pictured above. By looking at the specs, you can see that: (2 Points)

The amount of RAM is ___________.

The microprocessor manufacturer is __________.

The amount of disk storage is _______________.

The amount of Solid State Drive storage is ______________

2. In the table below, list the hardware/peripheral components in the ad and check which function the component performs. (Add additional rows to the table if needed). (5 Points)

Component
Processor
Memory
Storage
Input
Output
Other












































3. In the table below, list 5 functions/features you would look for in purchasing a computer and explain why each is important to you. (3 Points)

Function/Feature
Explanation as to why and size, capacity, etc. you need this feature/function












5. List and describe the factors that affect the performance of a microprocessor. Name two manufacturers of central processing units (CPUs) and some for the different models of processors that they manufacture. (5 points)









6. At the beginning of an update for your smart phone, you notice a warning that says “Make sure your device is connected to a wall outlet and do not turn the device off until the update is complete.” You suspect that the update is going to _______________ the ROM boot loader to fix a security vulnerability. (2 Points)

7. You are working on a group project and you suggest to your team that they use a ______________ storage service where members can access a shared folder. (2 Points)

8. One of the ports on your laptop is rectangular and the inside of it is blue. It is a(n) _________ port. (2 Points)

9. You need an external keyboard for your Android device, and thankfully you can add a wireless one because it has ________________ capability. (2 Points)

10. You volunteer to produce a large quantity of black-and-white leaflets for a charity organization. It is fortunate that you have access to a(n) _____________________ printer with a high duty cycle and low operating costs.

Answers

1 6gb of ram
inteel
500gb
500gb

In the 1940s, computers were programmed using punch cards, or pieces of paper that had holes in them that represented binary code. If a mistake was made using this type of primitive programming, which of the following BEST describes what would need to be done to correct the problem?

A.
The entire program of punch cards had to be re-punched.

B.
The entire program of punch cards had to be loaded again and started over.

C.
The entire program needed to be rewritten and a different set of punch cards were used.

D.
The entire program could be fixed by adding or removing a card for the existing stack of papers.

Answers

Answer:

If a mistake was made using punch cards to program computers in the 1940s, the entire program of punch cards had to be re-punched to correct the problem. This was because punch cards were the primary means of input for the computer, and any changes or corrections to the program had to be physically made by punching new cards or modifying existing ones. Once the program was re-punched correctly, it could be loaded into the computer and executed.

Explanation:

onsider the below given table and write queries for
(i) & (ii) and output of
(iii) –(v):Table Name: Pet
i) Display name, owner and gender for all dogs.
ii) Display Name, owner and age of all pets whose age is more 2 years.
iii)select name, owner from pet where owner name like ‘%ya’;
iv) select name, age from pet where species = dog and age between 1 and 3;
v) select * from pets where species in (‘horse’,’parrot’)

Answers

Note that this is an SQL prompt. This is because we are asked to create queries. When you have information on tables are are asked to create queries that will result in a certain output, you are looking at a dataase query. Queries are created in SQL. Here are the queries below. The expected output are all attached.

(i) Display name, owner and gender for all dogs.

Query:
SELECT Name, Owner, Gender

FROM Pet

WHERE Species = 'Dog';

(ii) Display Name, owner and age of all pets whose age is more 2 years.

Query:

SELECT Name, Owner, Age

FROM Pet

WHERE Age > 2;


(iii) select name, owner from pet where owner name like ‘%ya’;

Query:


SELECT Name, Owner

FROM Pet

WHERE Owner LIKE '%ya';


(iv) select name, age from pet where species = dog and age between 1 and 3;

Query:
SELECT Name, Age

FROM Pet

WHERE Species = 'Dog' AND Age BETWEEN 1 AND 3;



(v) select * from pets where species in (‘horse’,’parrot’)

Query:
SELECT *

FROM Pet

WHERE Species IN ('Horse', 'Parrot');



What is an SQL Query and why is it important?

An SQL query is a command used to retrieve or manipulate data in a relational database. It is important because it allows users to extract specific data from large databases, make updates to existing data, and create new records.

SQL queries are essential in many industries that rely on large amounts of data, such as finance, healthcare, and e-commerce.

SQL queries are used to interact with data stored in relational databases, which are typically organized into tables. Queries allow users to extract, modify, and manage data within those tables.

See all output attached.

Learn more about SQL Query on:

https://brainly.com/question/30755095

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Assuming this is a database, consider the above given table and write queries for:

(i) & (ii) and output of

(iii) –(v):Table Name: Pet

i) Display name, owner and gender for all dogs.

ii) Display Name, owner and age of all pets whose age is more 2 years.

iii)select name, owner from pet where owner name like ‘%ya’;

iv) select name, age from pet where species = dog and age between 1 and 3;

v) select * from pets where species in (‘horse’,’parrot’)

onsider the below given table and write queries for (i) &amp; (ii) and output of(iii) (v):Table Name:

In which of the following situations must you stop for a school bus with flashing red lights?

None of the choices are correct.

on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus

you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

Answers

The correct answer is:

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

What happens when a school bus is flashing red lights

When a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.

It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.

Learn more about school bus at

https://brainly.com/question/30615345

#SPJ1

Why computer manufacturers constantly releasing faster computers ?

Answers

Answer:

do not copy word for word!!!!

Explanation:

The Computer manufacturers constantly releasing faster computers as in every month or in a year new technologies are discovered. ... By making the faster computers manufacturers want to earn much profit and they want to beat the competition. If the computer will be slow, it will take much time to open a file or to save a file.

Which of these are examples of a Single Sign-On (SSO) service?
A. Kerberos.
B. Relying Parties.
C. OpenID.
D. Tokens.

Answers

Kerberos and OpenID are SSO Services.

It should be noted that examples of a Single Sign-On (SSO) service are

Kerberos.OpenID.

According to the question, we are to discuss the examples of Single Sign-On (SSO) service and how it works in term of the user experience.

As a result if this , we can explain Single sign-on (SSO) as session that is required when authentication service  us been need by the user, it helps the user have one set of login credentials

Therefore, examples of a Single Sign-On (SSO) service is OpenID.

Learn more about Single Sign-On (SSO) service at;

https://brainly.com/question/13171394

What is an example of an absolute cell reference? 52% D2 $B$5 !90!

Answers

Answer:

$B$5 is an example of absolute cell reference

Explanation:

There are two types of referencing in MS Excel.

1. Relative

2. Absolute

Relative cell referencing changes according to the corresponding new cells when it is copied in other cells. MS Excel uses relative cell referencing by default.

Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.

From the given choices in question,

$B$5 is an example of absolute cell reference

An example of an absolute cell reference is "$B$5".

Thus, option (C) is correct.

Cell references can be either relative or absolute.

A relative cell reference changes when it is copied to another cell.

For example, if you have a formula in cell C2 that references cell A2 as "=A2+1", and you copy this formula to cell C3, it will automatically adjust to "=A3+1".

An absolute cell reference remains constant, regardless of where it is copied. When a cell reference is made absolute, the dollar sign ($) is used to indicate this.

For example, if you have a formula in cell C2 that references cell B5 as "=B$5+1", and you copy this formula to cell D3, it will still refer to cell B5 as "=B$5+1". The row and column references remain fixed.

Therefore, "$B$5" is an absolute cell reference.

Thus, option (C) is correct.

Learn more about Cell Reference here:

https://brainly.com/question/30714866

#SPJ6

Help me with this with the question in the image

Help me with this with the question in the image

Answers

Answer:

1. I see value and form in there, and I see unity in there.

2. It create a better image by using words it also could inform people.

3. Maybe the you could add some cold color in it not just warm color.

Select the best answer for the question.
5. To save time, Carlos is estimating the building as one large room for purposes of calculating heat loss. This is called
A. envelope.
B. full space.
C. design.
D. wall-less.

Answers

B is the answer I think

Code to be written in R language:

The Fibonacci numbers is a sequence of numbers {Fn} defined by the following recursive relationship:

Fn= Fn−1 + Fn−2, n > 3
with F1 = F2 = 1.

Write the code to determine the smallest n such
that Fn is larger than 5,000,000 (five million). Report the value of that Fn.

Answers

Here is the R code to determine the smallest n such that the Fibonacci number is larger than 5,000,000:

fib <- function(n) {

 if (n <= 2) {

   return(1)

 } else {

   return(fib(n - 1) + fib(n - 2))

 }

}

n <- 3

while (fib(n) <= 5000000) {

 n <- n + 1

}

fib_n <- fib(n)

cat("The smallest n such that Fibonacci number is larger than 5,000,000 is", n, "and the value of that Fibonacci number is", fib_n, "\n")

The output of this code will be:

The smallest n such that Fibonacci number is larger than 5,000,000 is 35 and the value of that Fibonacci number is 9227465.

Learn more about R language here: https://brainly.com/question/14522662

#SPJ1

An internet filter is firewall software used to block a users access to specific internet content. An internet filter can be installed on which three of the following

Answers

An internet filter can be installed on a variety of devices, including:Computers: Internet filters can be installed on individual computers, whether they are desktops, laptops, or tablets.

This allows users to control their own access to certain websites or types of content.Routers: Some routers have built-in internet filtering capabilities, which allow network administrators to control access to specific websites or types of content for all devices connected to the network.Mobile devices: Internet filters can also be installed on smartphones and other mobile devices, which can be particularly useful for parents who want to restrict their children's access to certain types of content while using their mobile devices. internet filters can be installed on a range of devices, depending on the specific needs of the user or organization. By blocking access to certain websites or types of content, internet filters can help to protect users from harmful or inappropriate content, and promote responsible internet use.

To learn more about laptops click the link below:

brainly.com/question/30551024

#SPJ1

What are the challenges associated with not being ‘tech savvy’ in 2023?

Answers

In 2023, not being 'tech-savvy' can present several challenges due to the increasing reliance on technology in various aspects of life.

Some challenges associated with not being tech-savvy

Digital Communication: Communication has largely shifted to digital platforms, such as email, messaging apps, and video conferencing. Not being tech-savvy can make it difficult to effectively communicate and connect with others, especially in professional settings where digital communication is prevalent.

Online Information and Resources: The internet is a primary source of information and resources for various purposes, including education, research, and everyday tasks. Not being tech-savvy may hinder the ability to navigate and access online information, limiting opportunities for learning, decision-making, and staying informed.

Digital Skills Gap: Many job roles and industries now require basic digital skills. Not being tech-savvy can create a skills gap, making it challenging to find employment or succeed in the workplace. Basic skills such as using productivity software, digital collaboration tools, and online research are increasingly expected in many job positions.

Learn more about tech savvy at

https://brainly.com/question/30419998

#SPJ1

Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False

Answers

Answer:

True

Explanation:

Imagine that you want to build a radio telescope and an optical telescope and that you want them to both have the same angular resolution, assume that both telescopes can reach the diffraction limit. Which telescope will have to have a larger diameter? Explain your reasoning.

Answers

Answer:

The radio telescope will have to have a larger diameter than the optical telescope in order to achieve the same angular resolution. This is because radio waves have a longer wavelength than optical waves, and the angular resolution of a telescope is inversely proportional to the wavelength of the radiation it is observing. Since the radio waves have a longer wavelength, the telescope observing them will need a larger diameter in order to achieve the same level of resolution as a telescope observing optical waves. Additionally, the diffraction limit for radio telescopes is greater than for optical telescopes, so the radio telescope will need to be larger to reach the diffraction limit.

Assuming the user types the sentence


Try to be a rainbow in someone's cloud.


and then pushes the ENTER key, what will the value of ch be after the following code executes?.


char ch = 'a';

cin >> ch >> ch >> ch >> ch;

(in c++)

Answers

The value of ch will be the character entered by the user after executing the code.

What is the value of ch after executing the code?

The code snippet cin >> ch >> ch >> ch >> ch; reads four characters from the user's input and assigns them to the variable ch. Since the user input is "Try to be a rainbow in someone's cloud." and the code reads four characters, the value of ch after the code executes will depend on the specific characters entered by the user.

In conclusion, without knowing the input, it is not possible to determine the exact value of ch. Therefore, the value of ch will be the character entered by the user after executing the code.

Read more about code execution

brainly.com/question/26134656

#SPJ1

A cookie recipe calls for the following ingredients:
• 1.5 cups of sugar
• 1 cup of butter
• 2.75 cups of flour
The recipe produces 48 cookies with this amount of ingredients. Write a program that asks the user how many cookies they want to make and then displays the number of cups of each ingredient needed for the specified number of cookies in the following format:

You need 5 cups of sugar, 3 cups of butter, and 7 cups of flour.

Note: Don’t worry about formatting the numbers in the output.

Answers

def cookie_Recipe(recipe):

   

   sugar=(0.03125*recipe)

   butter=(0.02083333333*recipe)

   flour=(0.05729166666*recipe)

   LF1=round(sugar, 2)

   LF2=round(butter,2)

   LF3=round(flour, 2)

   print("You will need:")

   print(LF1, "cups of sugar")

   print(LF2, "cups of butter")

   print(LF3, "cups of flour")

   print("To make", recipe, 'cookies')

recipe=int(input("How many cookies do you want to make?\n"))

cookie_Recipe(recipe)

The program is a sequential program and does not require loops, iterations, and conditions.

What is python?

Python is a general-purpose programming language.

The Python program that uses comments to clarify each line is as follows:

#This gets the number of cookies

cookies = float(input("Number of cookies: "))

#This calculates the amount of sugar

sugar = (1.5 * cookies) / 48.0

#This calculates the amount of butter

butter = cookies / 48

#This calculates the amount of flour

flour = (2.75 * cookies) / 48

#This prints the amount of sugar, butter and flour needed

print("You need ", format(sugar, '.2f'), " cups of sugar, ", format(butter, '.2f'), " cups of butter and ", format(flour, '.2f'), " cups of flour", sep='')

Therefore, the program is written above.

To learn more about python, refer to the link:

https://brainly.com/question/12867701

#SPJ2

Other Questions
a rectangular feild 70m long and 50m wide has a path of uniform width around it if the area of the path is 104m find the width of the path Imagine a friend tells you, "I heard that most peoples bodies are too acidic these days and we need to drink alkaline water to get ourselves back into balance."How would you respond? Include in your response information about our buffer system and information about the activity of either the lungs or kidneys. draw the lewis structure for the polyatomic nitrite no2 anion. be sure to include all resonance structures that satisfy the octet rule. emmanuel often monitors his thoughts and behaviors throughout the day to ensure that he is being respectful and appropriate. emmanuel is demonstrating help asap ill give brainliest Tyrell has selected a series of witnesses to examine which will attest to his clients innocence. which equation represents the problem When glucose stores are low during exercise, energy can be liberated from adipocytes via lipogenesis.a. Trueb. False Had she handed over the parcel? into passive Subtract the sum of (5^3 + 7^2 9) and (7 + 3^2 ) from the sum of (5^3 + 6) and (10^2 12) Can someone write a story for the slope: 10,1? Which symmetric matrices S are also orthogonal ? Then ST = S-1 (a) Show how symmetry and orthogonality lead to S2 = I. (b) What are the possible eigenvalues of this S? (c) What are the possible eigenv he last idea in this challenging concept is how chemiosmosis works in photosynthesis. Describe four ways that chemiosmosis is similar in photosynthesis and cellular respiratio An American worker can produce either 5 cars or 8 tons of grain a year. A Japanese worker can produce either 4 cars or 9 tons of grain a year. To keep things simple, assume that each country has 100 million workers.Complete the following table with the quantities of cars produced and consumed in each country if there is no trade. More _____ are killed from falls than in any other construction occupation. one minute after birth a nurse assesses a newborn and auscultates a heart rate of 90 beats/min. the newborn has a strong, loud cry, moves all extremities well, and has acrocyanosis but is otherwise pink. which is this neonate's apgar score? Can somebody give me an answer? ill give brainiest. Which of the following statements are true about the sentence "There are no black flies in Maine"? (Select all that apply)a This is a proposition.b This is not a proposition.c It's truth value is false, as anyone who has been to Maine knows.d It's truth value is true, as anyone who has been to Maine doesn't know.e It has no truth value. 4[1 2 -1 5]Someone help me with this bs f(x) = 2(x+4)2 - 6Vertex:Is the vertex a max or min?