Warm up-variables-input and type conversion

Assignment Help Basic Computer Science
Reference no: EM131994320

Warm up: Variables, input, and type conversion (Python 3)

(1) Prompt the user to input an integer between 0 and 155, a float, a character, and a string, storing each into separate variables. Then, output those four values on a single line separated by a space. (Submit for 2 points).

Enter integer (0 - 155): 99
Enter float: 3.77
Enter character: z
Enter string: Howdy
99 3.77 z Howdy

(2) Extend to also output in reverse. (Submit for 1 point, so 3 points total).

Enter integer (0 - 155): 99
Enter float: 3.77
Enter character: z
Enter string: Howdy
99 3.77 z Howdy
Howdy z 3.77 99

(3) Extend to convert the integer to a character by using the 'chr()' function, and output that character. (Submit for 2 points, so 5 points total).

Enter integer (0 - 155): 99
Enter float: 3.77
Enter character: z
Enter string: Howdy
99 3.77 z Howdy
Howdy z 3.77 99
99 converted to a character is c

Reference no: EM131994320

Questions Cloud

What key aspects of the profession will you focus on : Imagine that you are scheduled to interview a practicing psychologist about what his/her job is like. This is known as an "information interview."
Briefly describe and explain any three problems : Briefly describe and explain any three problems that a decision maker has when encountered with a large amount of data.
Assess the key elements of richard bransons leadership style : Assess the key elements of Richard Branson's leadership style and the impact that those elements have had on his business success.
Distinguish between a 2-tier and a 3-tier data warehouse : Distinguish between a 2-tier and a 3-tier data warehouse. When would you prefer to use a 3-tier data warehouse?
Warm up-variables-input and type conversion : Prompt the user to input an integer between 0 and 155, a float, a character, and a string, storing each into separate variables.
Discuss systems theories and major models of family : In addition, describe a systems perspective that provides an understanding of family and other systems theories and major models of family.
Briefly describe the ethical dilemma or issue : Briefly describe the ethical dilemma or issue. Explain why you think this is particularly critical and poses a danger to Uber's sustainability.
Multiple of ebitda and multiple of refining capacity : A common way to value midstream and downstream energy assets is by using a multiple of EBITDA and a multiple of refining capacity.
Distributed applications and cloud computing : Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Starbucks social media campaign

For example, using the search terms "Starbucks social media campaign" in an internet search engine such as Google.com, Yahoo.com, or Bing.com will return results of several articles discussing Starbucks 'use of social media.

  Design a database for a small video rental store

Describe the two phases in designing databases that arise from the development of new information systems.

  Attributes from a normalized relation including

Please see direction below for the following homework assignment. Choose Oracle datatypes for the following attributes from a normalized relation including:

  Using both printed material and online resource

Using both printed material and online resource

  Artistic applications are typically considered distinct

Artistic applications are typically considered distinct from technical applications of graphics.

  Create a java gui business application

Create a Java GUI business application. This program may be any business application of your choice.

  Draw the front view of the bar separator

Use the MIRROR command to make half of the object; then use it again to create the other half.

  What is a constructor

What is a constructor? Give its properties. How do we declare/ define it? Can they be overloaded?

  Use symmetric cryptography in current applications

As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some properties (such as nonrepudiation) which are not offered by secret key cryptography. So why do we still use symmetric c..

  Myth of mac devices being more secure

Explain whether or not you believe that the myth of Mac devices being more secure than Windows devices is becoming history, and justify your answer. Further, indicate one (1) main reason why you believe this myth still exists in the minds of end u..

  Calculate the current price ufa

Calculate the current price Ufa $1,!)DD par value band that has a coup-on rate of El percent, pays coupon interest annually

  Write a sinusoidal function to model this data

Find the number of daylight hours for the middle of each month or the average monthly temperature for your community. Write a sinusoidal function to model this data.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd