I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.

My code:

b = float(input("Enter Temperature: "))

Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line

Answers

Answer 1

Answer:

The error is because you wrapped the input in float. First record the input and then modify it.

Explanation:

b =  input("enter temp:")

b = float(b)


Related Questions

plzz help me with this question.........

Write a program to input a number find the sum of digits and the number of digits. Display the output

sample input - 7359
sample digits - 24
number of digits - 4​

Answers

Answer:

str = input("Enter a number: ")

sum = 0

for c in str:

   sum = sum + int(c)

print("Sample input - {}".format(str))

print("Sum of digits - {}".format(sum))

print("Number of digits - {}".format(len(str)))

Explanation:

That's python. Was that what you were looking for?

Answer Using Java :-

import java.util.*;

public class Digit

{

public static void main(String args[ ] )

{

Scanner in=new Scanner (System.in)

System.out.print("Enter a number: ");

int n = in.nextInt();

int sum = 0, count = 0;

while (n!=0)

{

int d = n % 10;

sum + = d;

count++;

n /= 10;

}

System.out.println("Sum of digits=" +sum);

System.out.println("Number of digits=" +count);

}

}

put each sentence in the correct place please :)

Answers

the first image matches with the last sentence.

the second image (fireworks) match with the first sentence.

the third image (rocket) matches with sentence two.

and the last image matches the third sentence.

Answer:

sentence 1 -> picture in box 2

sentence 2 -> picture in box 3

sentence 3 -> picture in box 4

sentence 4 -> picture in box 1

please help, thank you

Answers

Answer:

radish spinach swiss chard

Explanation:

radish, swiss Chard, spinach

Match the terms with their definitions

Answers

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)

i need help, thank you

Answers

Answer:

uhh yes?

Explanation:

i think people can go on weeks without food, so a set of trays wit food should last them a day

Ohhh I’m here and I also say yes one set can be enough if used wisely

what is multimedia computer system​

Answers

A Multimedia can be defined as any application that combines text with graphics, animation, audio, video, and/or virtual reality. Multimedia systems are used for security to keep intruders out of a system and for the protection of stored documents

Which scenarios are examples of students managing their time well? Check all that apply. A student studies while watching her favorite television shows. A student sets aside time to study every afternoon at his desk. O A student writes down some goals that she hopes to achieve in school. A student drafts a study schedule that includes breaks. A student uses her desk calendar to record the due dates for her homework assignments. O A student rushes through his homework while sending text messages to friends. 3). Intro​

Answers

Answer:

b,c,d, and e

Explanation:

Hope this helps

Answer:

BCDE

Explanation:

EDG 2021

Imagine you're in charge of managing an annual fest at your school. You have to select students and assign them different tasks. Write a short essay on the qualities and traits you would be looking for while selecting students. Explain why you think these qualities and traits are important. Also, describe how the lack of such qualities and traits would affect the work.

Answers

Answer:

Quality traits are important in many ways. A persons traits identifies them of how they treat you or how you might treat them. It is important to find good working people for the job. For example if one student is good at a specific task I might put them in that task or if another is good at stocking shelves or finding books I might put them in the library to help students find books. It is important as a supervisor to find people that listen and follow instructions not people that mess around and are unorganized. These qualities and traits are important to see the real potential of the employees. Finding the right people for the job will help the school and you as the supervisor to manage these employees. Making a application or employment sheet will help to find the right people making a sheet with some questions and have the potential employees fill it out to find their traits and skills.

Explanation:

Sorry I didn't have much background information on what you wanted me to write hope this works you can edit and change stuff though.

Also run this through Grammarly's plagiarism tester to see if it is plagiarism!

What is the first thing animators need to determine when beginning a project?



a Editing locations



b Length of the film or project



c Setting



d Characters

Answers

Answer:c

Explanation:

Anyone know the logic notation of this following logic circuit?

Answers

Answer:

Concept: Logic Circuit

You have two variables A and B A and B go to the XOR logic command.B goes to the NOT operator Lastly the result of both XOR & NOT go to the OR operator Please rate positively and give brainlist

help plz i need help ASAP
bhgydhusjbhhuidjs

Answers

Answer:

id.k

Explanation:

good luck

PLS HELP BEING TIMED!!!
Complete the following sentence.
The basics of managing money such as balancing a checkbook and making a budget are _____
skills

Answers

Answer:

Bank Rate skills

Explanation:

because it is i believe

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Answers

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

what is wrong with this picture?????

Answers

“you got a tight little-“

uhm y’know everything is wrong with it terrifying really is uhm but yeah.

oh god that leg tho

Which sentence best describes how block-based code works?

Answers

Answer:

Block-based code is a simpler way to code.  

Explanation:

Block-based coding is a form of programming language where the developer issues instructions by dragging and dropping blocks.

What are the two negative impacts of computer technology to the society?​

Answers

One negative is that people are getting very impatient. This is because people are getting used to things instantly coming up onto their screens. Another negative is that people are being manipulated more easily. Nowadays anyone can be an expert if they sound smart enough. Then they can spread their lies quickly to millions of people.

What are specific and relevant terms that will help you locate information using an internet search engine?

A: Keywords

B: Search Words

C: Smart Words

D: Unusual Words

please help me!!​

Answers

I would say A:keywords

Hope this helps

I’m sorry if this is wrong

Have a great day/night

Answer:

keyword

Explanation:

i got it right

What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network

Answers

Answer:

RIP

Explanation:

RIP is a routing protocol that stands for Routing Information Protocol. It is a distance-vector routing algorithm which uses a hop count for routing its metric. RIP is the most popular and frequently used on internet. RIP uses hop count, which means it goes from low hop count to high hop count.

Therefore, it is the Routing Infomation Protocol which is the most popular distance-vector routing algorithm used to determine the best routes within a network.

Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase words should take precedence over lowercase words. For example, 'Z' comes before 'a'. I am stuck on this python assignment. Don't need the answer asap, just some explaining of how to write code to do that. I know about the built in sort function

Answers

Answer:

Read the file and save it to a variable as a string, split the string variable and cast it to a set object using the set function to get the unique words in the file. Then use the max function with the key attribute to use regular expression module "re" to compare the first letter of each item to return in a list comprehension or append to a list.

Explanation:

The open function is used to import a file in python, the split string method splits the string to a list of items and the set function removes any duplicates of a word or item.

Using the for loop statement, iterate over the items and compare and return the items in alphabetical order with the 're' search method getting the item with uppercase letters with higher precedence than lowercase.

How do I create a videogame

Answers

Answer:

-Learn how to code

-Make Character

-Design

-Go to classes

-Go on video game platforms and make an video game(rblx is the best in my opinion)

-Play video games and see the scripts

-Decide what type of video game your making(horror, family game, battle game, etc.)

Explanation:

Answer:

By using programming languages such as Lua And JavaScript because they are the best for programming videogames

Define watcher block

Answers

Answer:

Happens when you are watching a series / film / drama / etc. but can not retain the attention span to watch for long periods of time. As well as the shortened viewing time, the ability to retain what has been viewed is impaired.

Explanation:

The Block Watcher puts the power of a microprocessor to work analyzing the current feed to the rails. This detector has been designed to eliminate many of the installation problems associated with the installation of signal systems. ... Then connect the detector output switch to your signal system.

Sharing contacts is different from sharing a calendar. Use the drop-down menus to explain how.
1. You can share contacts with
outside the organization without publishing online.
2. You are not able to that somebody share their contacts with you.
3. Both calendars and contacts are shared in emails. For the latter, the recipient clicks
and selects from a list.

Answers

Answer:

anyone

request

open shared contacts

Explanation:

edge 2020

Answer:

anyone

request

open shared contacts

Explanation:

choose the type of error described. can you help me bc i don’t know??

Answers

Answer:

logic error occurs when the result is wrong...

syntax error occurs when you use the wrong punctuation...

runtime error occurs when the program starts running...

Answer:

Logic error: When the computer outputs an undesirable value due to the wrong use of operations.

Syntax error: Occurs when syntax is not used correctly in code.

Zero division error: Occurs when a value is divided by zero.

Hope this helps :)

A common error by beginning programmers is to forget that array subscripts start with ________.
a. 0
b. the number of elements in the array
c. spaces
d. 1

Answers

Answer:.

Explanation:

what class are you in?
can you help me in connection?

Answers

Answer:personal computer:)

Explanation:

Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to reduce the amount of e-mail she receives?

Carefully read and complete subscription forms.

Read e-mail messages every hour.

Stop using the Internet.

Forward spam to spam at uce.gov.

Stop posting her e-mail address on newsgroups.

Answers

Answer:

I think that carefully reading and completing subscription forms is important and could possibly lower the amount of emails.

Reading them every hour will only hurt her work ethic.

Stop using the internet won't help at all.

Forwarding the spam to spam at uce.gov could work because that's what the site was made to do.

Stop posting her e-mail address on newsgroups could definitely help.

I'm stuck between the 1st, 4th, and 5th one but its one of them.

How many answer choices are you allowed?

It is steps plural.

Answer:2,3,5

Explanation:

state the functions of all the parts of the computer​

Answers

Answer:

Parts of a computer with their functions

The computer case. This is the part that holds all of the internal components to make up the computer itself. ...

Motherboard. ...

CPU: Central Processing Unit. ...

RAM: Random Access Memory. ...

Graphics Card. ...

Sound Card. ...

Hard Drive. ...

SSD: Solid State Drive.

Explanation:

Which of the following identifies the most appropriate courses to take in high school for someone interested in becoming a mechanical engineer?
drafting- and math-related courses
math- and science-related courses
computer- and design-related courses
science- and computer-related courses

Answers

Answer: New questions in Health

Which member of the multidisciplinary team would help a patient improve his flexibility in the joints after a knee-replacement surgery? A. a physiot…

What are two advantages of a multidisciplinary team approach? better diagnosis in complex cases shared responsibility for decisions more opportunit…

MARKING PEOPLE AS BRAINLIST PLEASEEE HELP Where is the carbon dioxide picked up and the oxygen unloaded in the body? A:Arteries B:Veins C:Capillar…

Which healthcare professional would be primarily responsible for treating a patient for his anxiety disorder after a surgery? A. a nurse B. a nutr…

Do Now: What might be a situation where it might be important to identify 3 points somebody? What are different strategies that scientists could use …

Explanation:

which of the following types of correspondence is used to inform the reader of new information such as a policy change

Answers

Answer: Memo

Explanation: Have a good day, pls mark me brainliest <3

Which part of project management considers if employees will work at home or in the office?

Analysis
Resources
Scope
Time

Answers

Answer:

i think its time

Explanation: you have to manage your time for the project and you wouldnt think of all the other things.

Answer: It might be resources because not everyone at home will have the same books, etc that is used in a project while making it.

Explanation:

Other Questions
Which is a minor theme in The Land?O education versus learning a tradeO Everyone should be educated.O Education can counter inequality.O not educating versus educating a book falls off a 1-meter tall table. how long will it take for the book to hit the floor ? Should I eat some junk food while I stay up until 4:00 am pls help ill give brainly A soup can is 2 in. tall and has a diameter of 8 in.What is the amount of metal used to make the can?16 in24 in48 in160 in Read the excerpt from Barrio Boy by Ernesto Galarza.Gustavo's forwarding address was puzzling. The best we could make out it was a General Delibri. It sounded as ifgenerals were in charge of the mail in the United States, nothing like our lista del correo in Acaponeta.This excerpt provides textual evidence that Barrio Boy is told fromO Jos's point of view.O Gustavo's point of view.o the point of view of a person new to America.O the point of view of a person new to Mexico. Which of the following is true of both Islam and Christianity? A. Both are monotheistic. B. Both groups worship in a Mosque. C. Both believe Jesus is the son of God. D. Both practice the ideas in The Five Pillars. Why did the bear flag revolt happen ? What system includes the core, mantle, and crust of the Earth?a.geosphereb.hydrospherec.atmosphered.biosphereThe Answer is D. BiosphereI just did the assignment band assignment pls help me complete it Which of the following is a characteristic of a free market company?A. Individual choice B. Centralized planningC. Government influence in the private sector D. Community ownership of resources True or false libel and slander do not occur in healthcare settings What is the equation, in point intercept form, for a line that goes through (2, -6) and has a slope of -3/4The answers are in the photo.Oh and ignore the highlighted answer I mistakenly hit it.I will give Brainlyist!!! Help me pleaseeee (10 points ) Which of the following describes an effect of the war that Americans experienced on the home front? The middle section of a personal narrative needs to includestrong examples that highlight the subjects qualities.background information that introduces the subject.effects that the subject has had on the narrators life.information about characters other than the subject.I can't pick between A and D, they both seem right. Help! anyone know the answer The air is an example of a gas in a gas solution. True or false Carol observes that all of the juniors are taking physics this year. She concludes that when she is a junior, she will take physics for her science class. What kind of reasoning is Carol using to from her conjecture?A.) Deductive Reasoning B.) Inductive Reasoning PLEASE HELP!!!!!!!Which of the following functions represent exponential decay? y = -2 x y =(1/2)^ x 7 = 2^ 0.5x y = 2^x In 2007, Linda purchased a house for $120,000. In 2017, the house was worth $245,000. Find the average annual rate of change in dollars per year in the value of the house