Write a program that user should type a number between 1 and 50, tripled it and print out to the screen.

Answers

Answer 1

Answer:

Here's an example Java program that asks the user for a number between 1 and 50, triples it, and prints the result to the screen:

import java.util.Scanner;

public class TripleNumber {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       // Ask the user for a number between 1 and 50

       System.out.print("Enter a number between 1 and 50: ");

       int number = input.nextInt();

       // Check if the number is valid, then triple it and print the result

       if (number >= 1 && number <= 50) {

           int tripled = number * 3;

           System.out.printf("%d tripled is %d\n", number, tripled);

       } else {

           System.out.println("Invalid number entered.");

       }

   }

}

In this program, we first create a new Scanner object to read input from the console. We then prompt the user to enter a number between 1 and 50 using the nextInt() method of the Scanner object.

We then use an if statement to check if the number entered is valid. If the number is between 1 and 50 (inclusive), we triple it using the * operator and store the result in a variable called tripled. We then use the printf() method to display the original number and the tripled value in the format "x tripled is y", where x is the original number and y is the tripled value.

If the number entered is not valid (i.e. less than 1 or greater than 50), we display an error message using the println() method.

Answer 2

To write a program that prompts the user to input a number between 1 and 50, triples it, and prints the result, you can use a programming language like Python.

Here's a simple implementation:

```python
# Get user input
num = int(input("Enter a number between 1 and 50: "))

# Check if the number is in the valid range
if 1 <= num <= 50:
   # Triple the number
   tripled_num = num * 3

   # Print the result
   print("The tripled number is:", tripled_num)
else:
   print("Invalid input. Please enter a number between 1 and 50.")
```

This program starts by getting user input with the `input()` function, and converts the input to an integer using `int()`. It then checks if the number is within the specified range (1 to 50) using a conditional `if` statement.

As a result, If the number is valid, it calculates the tripled value by multiplying the number by 3 and prints the result using the `print()` function. If the number is not within the valid range, the program prints an error message prompting the user to enter a valid number.

You can learn more about Python at: brainly.com/question/30427047

#SPJ11


Related Questions

When there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition is referred to as __________.

Answers

When there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition, it is referred to as internal fragmentation.

Internal fragmentation can occur when a file or program is stored in a partition that is larger than the amount of data it contains. This results in unused space within the partition,

which is a waste of valuable storage capacity. Internal fragmentation can also occur when memory allocation algorithms divide available memory into fixed-sized blocks, resulting in small unusable spaces between allocated blocks.

The phenomenon is more prevalent in file systems that allocate disk space in fixed block sizes. In order to reduce internal fragmentation, it is important to allocate partition sizes based on the size of the data being stored and use memory allocation algorithms that minimize wasted space.

To learn more about : partition

https://brainly.com/question/31356414

#SPJ11

how to put two games together in java code

Answers

Answer:

Use the output and Put doc1 on five documents.

Explanation:

most computers have temporary holding areas called __________.

Answers

Answer:

Random Access Memory (RAM)

RAM (Random access memory)

The ____ view displays the worksheet the way it will look when it prints.

A) Normal

B) Page layout

C) Break

D) Page settings

Answers

I think you are looking for page layout. You can typically see it before printing out a page
page layout should be correct

1. Visual design and font/background are both essential and considered vital for the success of a web. If you are the developer, which of the two will you be focused on?

Answers

Answer:

As a developer, I'd be focused on the two starting with the front end.

Explanation:

A front-end developer simply is a user-end or client-side developer. A front-end person in web design is responsible for how a website looks and feels like, essentially, the websites' users first impression.

This is a huge task and can be very daunting even for the best developers. Whilst the back-end or the engine of a website is critical and indispensable, it is important for a developer to master the principles of front-end development first as that gives him a better perspective as to how they can better create and configure a matching or suitable back end.

Most if not all are designed to achieve a particular purpose e.g.

Increase salescommunicate informationtrainingelicit information etc

The ease with which the user is able to interact with the website will determine the extent to which the purpose of the website is achieved.

Some of the qualities of a great user interface the front end developer must keep in mind are:

Clarity Conciseness Familiarity  EfficiencyConsistency Attractiveness

Back-end has to do with the part of the website called the server.

In addition to the server, there are two other critical components of the back-end of the website:

Application and Database.

Together, these three contribute to ensuring that you have a functional website. The server, application and database, all control what happens on the front end and results in what the user will see via the browser.

There are many high-functioning websites today that have very poor interfaces.  A poor interface is a guarantee that people will spend less time on the website.

Conclusively, both ends are indispensable, as with most things, however, one should seek to understand how the user thinks and feels in relation to how they like to use a website before doing into the back-end to make that possible.

Cheers

There are different kinds of designs. As a developer, my Visual design would focus more on background.

Visual design is known to be a kind of design that strike equality between unity and variety. The use of design elements to work on the background and when done properly, gives users a nice experience.

Visual design is one that act to improve the design's or the product's aesthetic feeling.

Learn more about Visual design from

https://brainly.com/question/1332211

What is output by the following code? Select all that apply. c = 0 while (c < 11): c = c + 6 print (c)

Answers

The code's result is: 12. C is set to 0 at the beginning of the loop.

Is the output statement printf () correct?

In order to show formatted output on screens, a library function named printf() is used. The function prints the string enclosed in quotation marks. In order to use printf() in our application, we must include the stdio.h header file using the #include stdio.h> declaration.

What will the C programming code produce as a result?

The presentation of data in a file, on the screen, or on a printer is referred to as "output." There are several built-in C programming routines that can output data to the computer screen or save it to text or binary files.

To know more about code's visit:-

https://brainly.com/question/30479363

#SPJ1

Which of the following BEST describes a front-end developer?

Answers

Answer:

plz give me BRAINLIEST answer

Explanation:

Definition: Front end development manages everything that users visually see first in their browser or application. Front end developers are responsible for the look and feel of a site. ... As a front end developer you are responsible for the look, feel and ultimately design of the site.

A front-end developer is a type of software developer who specializes in creating the user interface (UI) and user experience (UX) of a website or application. They are responsible for translating design mock-ups and wireframes into functional code using programming languages such as HTML, CSS, and JavaScript.

Front-end developers work on the client-side of web development, focusing on the visual aspects and interactions that users see and experience directly. They ensure that the website or application is visually appealing, responsive, and user-friendly across different devices and browsers.

In addition to coding, front-end developers collaborate closely with designers and back-end developers to integrate the UI with the back-end systems and databases. They may also be involved in optimizing the performance and accessibility of the front-end code, as well as testing and debugging to ensure smooth functionality.

Learn more about databases on:

https://brainly.com/question/30163202

#SPJ6

Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later date?

Waiting on someone else
In Progress
Not started
Deferred

Answers

Answer:

in progress

Explanation:

it is being answered by the person

Question: What Kinds Of Changes Do You Think We'll Need To Make So The App Will Be Well Received In Other Countries? You: Well, There Are Some Obvious Factors To Consider: Currency Variations And Selectlanguage Diversitymobile Computingnetwork Infrastructureforeign CompetitionItem 1 . However, Some Of The More Subtle Variations Will Affect Interface Design,
What kinds of changes do you think we'll need to make so the app will be well received in other countries?

You:

Well, there are some obvious factors to consider: currency variations and Selectlanguage diversitymobile computingnetwork infrastructureforeign competitionItem 1 . However, some of the more subtle variations will affect interface design, possible bandwidth limitations, and the overall feel of the user experience.

Answers

In order for the app to be well-received in other countries, there are several changes that will need to be made. These changes include:

1. Currency Variations: Different countries have different currencies, so the app will need to support multiple currencies. This will allow users in different countries to make purchases within the app without having to worry about currency conversion.2. Language Diversity: The app will need to support multiple languages so that users in different countries can use the app in their native language. This will require translating all the text within the app into multiple languages.3. Mobile Computing: The app will need to be optimized for mobile devices. This is because many users in other countries may not have access to desktop computers and will be using the app on their mobile devices.4. Network Infrastructure: The app will need to be able to work with different network infrastructures. This is because network speeds and data caps can vary widely between different countries.5. Foreign Competition: The app will need to be able to compete with other similar apps that are already popular in different countries. This may require some changes to the app's functionality and features.6. Interface Design: The app's interface will need to be designed to be intuitive and easy to use for users in different countries. This may require different layout and design choices based on cultural differences.7. Bandwidth Limitations: The app will need to be designed to work with limited bandwidth. This is because many users in other countries may have slower internet speeds than users in the US.8. User Experience: The app will need to provide a positive user experience. This may require different features and functionality based on cultural differences. These changes will need to be carefully considered and implemented in order to ensure that the app is well-received in other countries.

To know more about  Language Diversity visit:-

https://brainly.com/question/29602436

#SPJ11

You don't have to answer them all, just give me 2 or 3. Thanks

1. What is the definition of a computer system?

2. What are the basic components of a computer system?

3. What is a Microprocessor?

4. Name some of the latest Computer Processors?

5. What is an operating system? Name some of the popular OS.

6. What are primary memory and secondary memory?

7. What is a chipset?

8. What do you know about the OSI Model?

9. What is the difference between system software and application software?

10. Difference between a router, modem, and switch?

11. What is a framework?

12. What is cryptography?

Answers

Answer:

5. iOS and Android are some popular OS’.

Explanation:

You can use artificial lighting when rendering a view. When the dimming value of a light fitting is set to 1, what does that do within the render?

Answers

When rendering a view, artificial lighting can be used to achieve a specific look or mood. The dimming value of a light fitting determines the brightness of the light, with 1 being the highest level of brightness.

When the dimming value is set to 1, the light fitting will emit its maximum brightness in the render, creating a brighter and more illuminated scene. This can be useful for highlighting certain features or objects within the view, or simply for creating a well-lit and visually appealing scene. Overall, understanding how to manipulate artificial lighting and dimming values is crucial for achieving the desired look and feel in a rendered view.

learn more about rendering a view here:

https://brainly.com/question/17405314

#SPJ11

A virtual function is a member function that expects to be ________ in a derived class.

A. called frequently

B. overridden

C. ignored

D. private

E. None of these

Answers

A member function that anticipates being overridden in a derived class is known as a virtual function.

What is meant by overridden?

To prevent or stop a process from happening, a process is said to be overridden. For instance, if a file copy is taking too long, you can override the procedure. Software terms: Abort, Overwrite, etc.

A method that has already been specified and/or implemented in a parent class or one of its parents can have a different implementation provided by a child class by utilizing the object-oriented programming concept known as overriding.

Only if an instance method is inherited by the subclass can it be overridden. A method that has been marked final cannot be modified. A static method cannot be modified once it has been defined, although it can be re-declared. A method cannot be overridden if it cannot be inherited.

To learn more about overridden refer to :

https://brainly.com/question/29409734

#SPJ4

difference between electrical and electronic devices

Answers

Answer:

The differences between electrical and electronic devices is that electrical uses as energy for necessary purposes, while electronic devices are being manipulated by the electrons that are inside of the device's battery :3

Explanation:

:3

the difference between electrical and electronic devices is that the electrical devices convert the electrical energy into the other form of energy like heat. light etc where as electronic devices control the flow of electrons for performing the particular task

The ? bar gives you information related to the document such as slide number, theme and whether or not the computer has found an error in the text

Answers

Answer:

Status bar

Explanation:

The status bar is a horizontal bar usually located at the bottom of the screen or window, showing information related to a document being edited such as slide number, current theme template, spelling and grammar, language, zoom, notes, comments, permissions, signatures e.t.c.

It can be used to group information by dividing into sections and also provides several View options.

an operating system manages system resources including ram.

Answers

A system's resources, including RAM, are managed by the operating system.

What is an operating system's primary function?

All of the hardware and software are under the direction of the computer's operating system (OS). It performs core tasks such handling input and output, controlling files, memory, and processes, and controlling peripheral devices like disk drives and printers.

What kind of computer program controls memory?

Operating systems are the most significant subset of system software. A computer's operating system is a piece of software that controls the hardware, software, operations, and memory of the device. It governs how your hardware operates.

To know more about operating system visit:-

https://brainly.com/question/6689423

#SPJ1

Which of the following statements are true about the growth of technology? Select 3 options. A. Individuals in the United States currently own an average of three connected devices. B. The general public began connecting to the Internet when the World Wide Web was introduced in 1991. C. By 1995, almost half of the world’s population was connected to the Internet. D. Currently, 67% of people on earth use at least one mobile device. E. The number of devices connected to the Internet of Things is expected to triple between 2018 and 2023.

Answers

Answer:

b

Explanation:

the general public began connecting to the internet when the world wide web was introduced

Answer:

The general public began connecting to the Internet when the World Wide Web was introduced in 1991.

By 1995, almost half of the world’s population was connected to the Internet.

Currently, 67% of people on earth use at least one mobile device.

Explanation:

Which of the following operating systems would be best suited for running a server?
- MacOS
- Ubuntu
- Windows 10
- Ubuntu server

Answers

Ubuntu server is the best one

Resolved -The United States Federal Government should ban the collection of personal data through biometric recognition technology.
I need to write a public forum debate case negating this resolution

Answers

Sure, here's a possible case negating the resolution:

Introduction:

Thank you, Mr./Madam Chair, and esteemed opponents. We, the negating team, believe that the United States Federal Government should not ban the collection of personal data through biometric recognition technology. While we acknowledge the concerns raised by the affirming team, we argue that biometric recognition technology has several benefits that outweigh its potential drawbacks.

Contention 1: Biometric recognition technology enhances security and public safety.

Biometric recognition technology enables law enforcement agencies to identify and track criminals, terrorists, and other threats more accurately and efficiently. For instance, facial recognition technology has helped the police to identify suspects in cases of kidnapping, robbery, and terrorism. A study by the National Institute of Standards and Technology (NIST) found that some facial recognition algorithms have a high accuracy rate of up to 99%, especially for high-quality images. Biometric recognition technology can also enhance security in sensitive areas such as airports, government buildings, and military installations, by verifying the identity of individuals before granting access.

Contention 2: Biometric recognition technology facilitates convenience and efficiency.

Biometric recognition technology can also facilitate convenient and efficient transactions and services, both in the public and private sectors. For example, many smartphones, laptops, and other devices now have fingerprint or face recognition features that allow users to unlock their devices, make payments, and access apps without having to remember passwords. This technology can also streamline and speed up processes such as voting, banking, and healthcare by eliminating the need for paper-based forms and identity verification procedures.

Contention 3: Biometric recognition technology is subject to regulation and oversight.

Contrary to the affirming team's claims, biometric recognition technology is not a lawless Wild West. The technology is already subject to several regulations and oversight mechanisms, such as the Privacy Act, the Electronic Communications Privacy Act, and the Fair Information Practice Principles. Additionally, several states, including Illinois and Texas, have passed biometric privacy laws that impose restrictions on how private entities can collect and use biometric data. The federal government can build on these existing regulations and frameworks to ensure that biometric recognition technology is used ethically and responsibly.

Conclusion:

In conclusion, we urge the judges and the audience to consider the benefits of biometric recognition technology, such as enhancing security, convenience, and efficiency, and the existing regulations and oversight mechanisms that can mitigate its potential risks. We believe that a balanced approach that recognizes both the benefits and challenges of this technology is the way forward, rather than an outright ban that would deprive society of its potential benefits. Thank you.

The public forum debate case negating the resolution has been stated below.

What is the federal government?

The national government of the United States is represented by the federal government. The public forum debate case negating the resolution is mentioned as follows:

Introduction:

The United States Federal Government, in our opinion, shouldn't outlaw the collection of personal information using biometric recognition technology, according to the opposing camp. We appreciate the issues stated by the affirmation team, but we contend that there are significant advantages to biometric recognition technology that exceed any possible disadvantages.

First claim: biometric identification technology improves safety and security.

Law enforcement organizations can more precisely and effectively identify and trace criminals, terrorists, and other dangers thanks to biometric identification technology. For example, face recognition technology has assisted law enforcement in locating suspects in kidnapping, robbery, and terrorist situations.

Second claim: Biometric recognition technology promotes efficiency and convenience.

Both in the public and private sectors, biometric recognition technology can enable simple and effective transactions and services. For instance, many modern smartphones, laptops, and other gadgets include face or fingerprint recognition capabilities that let users access apps, pay for items, and unlock their devices without having to remember a password.

Second claim: The use of biometric identification technology is governed and supervised.

The biometric identification technology is not a lawless Wild West, despite what the affirming team asserts. A number of laws and regulatory frameworks, including the Fair Information Practise Principles, the Electronic Communications Privacy Act, and the Privacy Act, already apply to the technology.

Conclusion:

Finally, we implore the judges and the audience to take into account the advantages of biometric recognition technology, such as improving security, ease, and effectiveness, as well as the current legislation and supervision frameworks that can reduce its potential threats.

Learn more about Federal Government here:

https://brainly.com/question/371257

#SPJ2

True or False: Nested elements must be indented with respect to parent elements in
order for the code to be properly displayed in a browser

Answers

Answer:

true

Explanation:

See if you can figure out what these tricky brain teasers are trying to say. *
THAN life

Answers

“THAN life”,, I’m pretty sure it means Bigger than Life. But If i’m wrong.. I’m sorry!

what type of activities are performed with the help of the software used in hospitals?

Answers

Answer:

Xrays, Ultrasounds, managing patient records, communicating with colleagues, etc.

xrays ultrasounds lasers

Sharon wants to include her name on each slide in her science presentation. Where in the Header and Footer dialog box would she type her name?

Answers

Answer:

She will type her name in the Footer

Explanation:

To answer this question, I will assume Sharon is using the Microsoft Office PowerPoint package to handle her presentation.

In PowerPoint, the footer helps users to add names or any other details on every slide.

To do this:

Go to INSERT in the menu barThen, go to Text menuSelect Header & Footer to open the boxCheck the Footer optionEnter the text in the provided text box(This is where Sharon will enter her name)Lastly, click Apply to All to effect the changes

list two use of a word processor software.

Answers

Explanation:

the Word processor is used to for

* Editing of documents

*Formatting of documents

*Creation of documents

*Saving documents

How was the addition of an improvement over early web design?
Webpages could finally incorporate tables into the design.
Webpage layout could finally format content blocks separately.
Webpage layouts were finally designed using HTML code.
Webpages could finally incorporate images as layout elements.

Answers

Answer- B: Webpage layout could finally format content blocks separately.

Explanation: Found it on Quizlet.

Answer:

Webpage layout could finally format content blocks separately.

Explanation: this the answer on edge.

Which is a screen that shows information from a computer​

Answers

computer monitor is an output device that displays information in pictorial form. A monitor usually comprises the visual display, circuitry, casing, and power supply.

Convert the following into binary system
and vice versa.
106​

Answers

It would be 1101010 in binary
It would be 1101010, I think

ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ​

Answers

Answer:

ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ​

Explanation:

Answer:

Plzzzzzzzzzzzzzzzz tell me what is your question I will try to solve it

juan, a cybersecurity expert, has been hired by an organization whose networks have been compromised by a malware attack. after analyzing the network systems, juan submits a report to the company mentioning that the devices are infected with malware that uses a split infection technique on files. which malware attack is juan reporting?

Answers

Juan sends a report to the business saying that the computers have malware on them that uses the split infection method to attack files. He reported a virus attack.

What is the most common usage of malware that can conceal its goals inside other processes and remain undetected?

Rootkit is a type of malware that modifies the operating system's processes by accessing undocumented functionalities or the operating system's lower layers.

What exactly is cybersecurity, and how can you prevent cybercrime?

Layers of defense are included in a solid cybersecurity plan to combat cybercrime, such as attempts to access, modify, or delete data; demand money from users or the organization; or obstruct regular business activities.

To learn more about cybersecurity visit:

brainly.com/question/24856293

#SPJ4

What is the difference between electrical and electronic devices?

Answers

Answer:

A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.

Answer:

the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.

Explanation:

i hope it helps ;)

Which type of computer is used microprocessor​

Answers

Assuming you mean which type of computer uses a microprocessor the answer would be: A pc and/or microcomputer which use a single chip which is a microprocessor for their CPU (central processing unit)
Other Questions
Unpolarized light with intensity 370W/m2 passes first through a polarizing filter with its axis vertical, then through a second polarizing filter. It emerges from the second filter with intensity 121W/m2 . What is the angle from vertical of the axis of the second polarizing filter? Express your answer to two significant figures and include the appropriate units when and where does "The Birthmark" by Nathaniel Hawthorne take place?will give brainliest!!! need help quick!25 points Why did Robin cut him?O in self defenseO because he was hurting the teamshe did not mean to Jack prepared two glasses half full of room temperature water. He added a whole Alka-Seltzer antacid tablet to glass #1 and a crushed Alka-Seltzer antacid tablet to glass #2. He stirred the mixtures in both glasses at the same time. After one minute, he observed that there was still some antacid at the bottom of glass #1 while all the antacid in glass #2 disappeared.Why does increasing the surface area of antacid affect its rate of dissolving in water? It decreases the size of the water particles and the amount of water that are in contact with the antacid particles. It decreases the surface area of water that is in contact with the antacid, making the antacid less soluble in water.A. It increases the area of the antacid that is in contact with water, allowing water to B.get to the particles more easily.C. It increases the size of the antacid particles and makes them spread more easily among the water particles. magbigay ng halimbawa na nagpapakita ng pagkakaisa ng mga Pilipino at paano ito nakatulong sa bansa at sa mga mamamayang Pilipino?Need na po.. 7.4x+3-9= 6 + 7.4xwith solution please Type your response in the box.Heres an interesting way to discover a texts main idea. This image is a collection of words from an article, placed in alphabetical order. The size of each word indicates how frequently it appears in the text. Based on this image, what do you think the text might be about? Identify the main idea and explain how you arrived at that conclusion. What is the attitude of most consequentialists toward rule consequentialism? a. It is an improvement over other versions of consequentialism. b. Other versions of consequentialism are preferable to it. c. It is an equal contender in the debate among consequentialists. d. It turns out to be equivalent to ethical egoism. retail inventory that is unaccounted for between receipt and time of sale is known as shrinkage. group of answer choices true false bibliography of the ipact of pseudoscientific Ideas of race on the Jewish nation during the period 1933 to 1946 Sketch on the axes on the right the force exerted by a tennis racket on a ball and the force exerted by the ball Force of on the racket during a collision. Ex- racket 0 on ball plain the shapes of your graphs. Force of ball on 0 racket Time Name Aind Picture Paint dragim agraph at some content might be missing or displayed in tele 2) A tennis player hits a ball with her racket Compare the force cented by the racket on the ball to that exerted by the ball on the racher during the colision between the ball and racket is one force larger than the other or are they in magnitude to each other? 3) A bowing ball roils down anley and his apn Compare the force rated by the ball on the pin to the force exerted by the pin on the ball during the collision is one force larger than the other or are they equal in magnade to each other? I 4) An automobile of mass 1500 imoving at 250 ml codes with a mass 4500 kg trest. The bumbers of the two vehicle or during the crash Compare the force exerted by the car on the way the truck on the car during the collision is one for the are they equal in magnitude to each other BIBLICAL HISTORY: Place the judges in the order they served.GideonOthnielDeborahShamgarSamsonEhud What is the Columbian Exchange? Which parachute has a slower decent: a orange parachute that falls at 12 feet in 5 seconds or a green parachute that falls at 14 feet in 7 seconds? * you have just upgraded the memory in one of your network servers by adding two 4-gb ecc memory cards. before purchasing the new memory, you made sure that the modules fit in the memory slots (packaging) and the speed (memory frequency) was supported by the memory controller. what did you forget to check that would significantly impact the memory checking of your new ecc memory cards? Uso _____________ para lavar la ropa. Mike, Roy, and Leen are eating sweets. Mike eats 2 less than Roy. Leen eats three times more than Mike and Roy combined. Altogether they ate 24 sweets. How many sweets did Roy eat? Some power plants can abate large amounts of pollution at low cost, whereas others may find even small reductions very expensive. True False HELP BRAINLY TEAM the steps below to complete the assignment.Topic: A Pet for GrandmaTask: Write an essay persuading your grandmother (or other relative/friend) to adopt a rescue pet.Step 1: Research pet adoptions through a local agency (e.g., humane society, etc.)Step 2: Make a list of the reasons your grandma should adopt this pet.Step 3: Write an essay persuading your grandma to adopt this pet.Your essay should contain the following:a. Introductory paragraphb. Three (3) supporting paragraphs (one paragraph for each supporting detail)c. Concluding paragraph to summarize each point and make final 'plea' to adopt petGrading RubricIntroductory paragraph3 points3 supporting paragraphs3 points(1 point each)Concluding paragraph Can someone help me with number 13 I need the equation fast