The Duffy Design Group from Minneapolis, Minnesota demonstrated the effectiveness of graphic design using a vernacular design vocabulary in its label design for this product (still sold in grocery stores). The design is credited with dramatically increasing:______.

Answers

Answer 1

Answer:

sales in spite of a small advertising budget.

Explanation:

The Duffy Design Group was able to apply vernacular design in its label design for Classico Spaghetti Sauce. Vernacular design refers to the incorporation of the indigenous attributes of a people, be it their vocabulary, history, or any other aspect of their culture in an artistic form.

The success recorded by this group was that despite the fact that this product was not widely advertised, it still received high patronage because the people were able to relate to the design. This highlights the importance of recognizing and applying local culture in design.


Related Questions

what is a good wall adapter for your house?​

Answers

Answer:

RAVPower Dual-Port*

Explanation:

You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edits directly in the doc. Is this a best practice for a content editing process?

Answers

Explanation:

This question can have both answers that is yes as well as no.

1.Yes, it can serve as an editor who completes your content and ensures it will read well to others.

2. No, the editor should have tracked changes which would have shown you where they would apply recommended edits.

What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information? a. LDAP poisoning b. LDAP injection c. Kerberos injection d. DAP hijacking

Answers

Answer:   b. LDAP injection

Explanation:

LDAP (Lightweight Directory Access Protocol ) Injection is defined as

an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input. It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.

So, LDAP injection is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.

Hence, the correct option is b. LDAP injection.

Answer:

dap

Explanation:

you suck 1v1 me epic Jayden rock star

What is the best offline route navigation app for Android?

Answers

Answer:

Google Maps

Explanation:

Answer:

Sygic GPS Navigation & Maps

Explanation:

William plans to write a paper about computers. He wants to compare desktop and laptop computers. He is trying to decide how to use cubing to refine his topic. Which is an example of how cubing can be used to refine William’s topic? It can be used to write a thesis statement explaining the computer types being compared. It can be used to write a list of the levels and sublevels of the features of a laptop computer. It can be used to analyze and describe possible uses of each type of computer. It can be used to make a map showing all of the types of desktop computers.

Answers

Answer:

c) It can be used to analyze and describe possible uses of each type of computer.

Explanation:

I just did it on edge 100%

good luck

Answer:

c) It can be used to analyze and describe possible uses of each type of computer.

Explanation:

just did dis on edge hope dat helpssssssssss :)

Which statement is false?It's necessary to include names of pointer arguments in function prototypes.A function receiving an address as an argument must define a pointer parameter to receive the address.The compiler does not distinguish between a function that receives a pointer and a function that receives a single-subscripted array.The function must â knowâ whether it is receiving a sin-gle-subscripted array or simply a single variable for which it is to perform simulated call by reference.

Answers

Answer:

The answer is "It's necessary to include names of pointer arguments in function prototypes".

Explanation:  

In method prototype, the declaration of the method specifics name and type of methods like arity, parameter type, and return type, but omits the method body, and the correct choices can be defined as follows:

A method which gets an address of the parameter must fix a pointer parameter for all the address to be received. The code compiler doesn't differentiate the received method and a  single subscribe array reference or function. Its function should "know" how a single sub-scripted array has been received for which simulated references are required.

Which of the following is true? a. Pseudocode is used to describe an algorithm. b. Pseudocode is not an actual computer programming language. c. Pseudocode is used to describe executable statements that will eventually be translated by the programmer into a program. d. All of the above.

Answers

Answer:

Correct answer is:

d. All of the above

Explanation:

First of all, let us learn about a pseudo code:

Pseudo code: It is an implementation of any algorithm written with the help of annotations and text using in simple English. (So, point a. is true)

It is written in English so its syntax is not like any actual programming language. (So, point b. is true)

Pseudo code describes what each line of pseudo code will do so the code writing becomes easier simply by translating the pseudo code to actual programming language syntax i.e. point c. is true.

Hence, point "d. All of the above" is true.

Advantages of Pseudo code :

It makes the readability of the program idea/approach better.Code writing becomes easier for the programmer.

Correct answer is:

d. All of the above

As important as it is to plan ahead, sometimes you _____. A. Need to throw all the rules of the road out the window B. Can't stop things from going wrong C. Have a higher priority than driving safely D. Will regret having made plans

Answers

Answer:

B

Explanation:

This seems the most appropriate..

Escribe todas las posibles combinaciones que pueden haber entre 4 bits.

Answers

Answer:

The answer is "[tex]\bold{2^n\ \ _{where} \ \ \ n \ is\ bit }[/tex]"

Explanation:

The Combinations could be produced by using n-bits [tex]2^n[/tex] . It s enables you to generate the 4-bit numbers that are:

[tex]\to 2^4 = 16[/tex] combinations.

for the 4-bit, the combination of 2 = 16, which are its possible combination and for the   10 variations  appropriate 16 combinations are used,  As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.

A technician is troubleshooting a Windows computer experiencing slow startup. Which of the following steps should the technician take first to determine whether startup processes are responsible for the slow startup?
A. The technician should permanently disable all startup processes in System Configuration.
B. The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot.
C. The technician should back up user data and reinstall Windows and all applications.
D. The technician should disable all scheduled tasks in Task Scheduler and reboot the system.

Answers

Answer:

The correct option is;

The technician should measure the time it takes to start the system using a normal boot and compare that time against the time for the system to perform a clean boot.

Explanation:

Clean boot is the process of starting the Windows operating system where the number of drivers as well as startup programs enabled are minimal in order to ascertain if the cause of a slow system startup is due startup interfering programs or drivers

A clean boot operating system startup and a startup in Safe Mode are similar with the difference being the higher level of control on what to run during start up offered by clean boot to aid troubleshooting startup issues.

A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protocol (LDAP). The directory needs to be able to make changes to directory objects securely. Which of these common operations supports these requirements?

Answers

The options available are:

Search, modify.

StartTLS, delete.

Bind, modify.

Bind, add.

Answer:

StartTLS, delete

Explanation:

StartTLS is a computer networking term for email protocol command, in which a system administrator buses it to command an email server that an email client running in a web browser, wants to turn an existing insecure connection into a secure one. Thus, during this process, StartTLS permits a client to communicate securely using LDAPv3 over TLS.

On the other hand, the DELETE operation can make a change to a directory object.

According to the given question, the common operations that supports requirements where directory needs to be able to make changes to directory objects securely are;

Bind, addSearch, modifyBind, modifyStartTLS, delet

According to the question, we are to discuss the common operations that supports some requirements as regards the changing of directory objects securely.

As a result of this we can see that making use of  StartTLS, delete can serve this purpose and other function as well.

Therefore, common operations that supports requirements where directory needs to be able to make changes to directory objects securely is Search and modify.

Learn more about directory architecture at:

https://brainly.com/question/13171394

Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single integer value, assign the resulting pointer to ip, and initialize the integer value to 27.

Answers

Answer:

In C++:

int *ip;

ip = new int;

*ip = 27;

Explanation:

First of all, let us have a look at the methods of memory allocation to a variable.

1. Compile Time: The memory gets allocated to the variable at the time of compilation of code only. It is also called static allocation of memory.

Code example:

int a = 5;

2. Run Time: The memory is allocated to the variable on the fly i.e. during the execution of the program. It is also called dynamic allocation of memory.

Now, we have to write code for a variable ip, which is an integer pointer to dynamically allocate memory for a single integer value and then initialize the integer value 27 to it.

Initializing a variable means assigning a value to variable for the first time.

Writing the code in C++ programming language:

int *ip;      // Declaring the variable ip as a pointer to an integer

ip = new int;    // Dynamically allocating memory for a single integer value

*ip = 27;   // Initializing the integer value to 27.

Gregor installed a third stick of known-good RAM into his Core i7 system, bringing the total amount of RAM up to 3 GB. Within a few days, though, he started having random lockups and reboots, especially when doing memory intensive tasks such as gaming. What is most likely the problem

Answers

Answer:

The speed or quality was different.

Explanation:

The new ram that he installed most likely had a different rate, or was a different quality than the old ram.

Justify the statement "The same job title can have different job roles and different qualification criteria in different organizations." Compare job titles and their respective roles and qualifications from at least two organizations in different industries, and write a short essay explaining your reasoning.

Answers

Answer:

Below is an executive summary of this particular issue.

Explanation:

Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses. Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.

Answer:

In the classified section of a local newspaper, I came across job openings for the post of a network engineer in two different companies. One was from the airline industry, while the other was from the food and beverage industry.

The airline company required an applicant to have a bachelor's degree in network administration. The job posting specified that applicants with supporting CCENT or CompTIA Security+ certifications would be preferred. The company was willing to consider candidates with no prior experience. The job responsibilities included: maintaining security, DNS, IP routing, firewalls, and troubleshooting IT-related problems. The role also required skills to manage multi-site network operations, operating systems, and other software applications in public as well as private facilities. Another responsibility was to complete the time logs in the company's records to facilitate timely and accurate billing.

For the role of a network engineer in the food and beverage industry, the required qualification was any bachelor's degree in computer science with a minimum of one year of relevant experience. Certifications were an added advantage, but they were not a necessity. The job role required skills to troubleshoot network glitches, monitor network usage, install software and hardware infrastructure, provide technical assistance to users, and suggest improvements in the system.

Explanation:

Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos

Answers

Answer: clip art

Explanation:

The clip arts are graphic images that are pre-made illustrations for the purpose of creating any medium (designs or art). It has no restrictions to use them, it can be used by anyone, hence its copyright-free.It comes in both electronic and printed form.But mostly they are designed and distributed and used by a person in an electronic form.

Hence, the complete statement is "Pre-made, copyright-free illustrations are called clip art".

Answer:

B) clip art

Explanation:

I got this question correct

Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.

Answers

Answer:

Creates innovation

Takes and makes decision

Organizing resources

Takes and bears risks

Answer:

FOUR THINGS ARE DOWN

Explanation:

● Creates innovation

● Takes and makes decision

● Organizing resources

● Takes and bears risks

Write the steps to create labels in OpenOffice writer

Answers

1. Start up Open Office.Org.

2. Click on File >> New >> Labels.

3. In the label dialog box, click on the brand box. This will allow you to choose the type of paper that you use.

4. Select the type of document that you want. The usual standard is Avery, but feel free to explore and discover what you like.

5. Select if you want a single label, a document, and any other options. Some of the things you might want to do are:

- Create a variety of labels for folders or drawers

- Create a sheet of address labels

-  Create decorative labels

6. Click New Document. Here, you see a sheet of blank labels.

7. Create the type of format/placement that you want for your labels. Once you are happy with it, copy it to the rest of the labels.

8. Fill your labels with necessary information.

9. Print them out.

What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible by ten: " + counter); counter++; } else { System.out.println("Counter is not divisible by ten: " + counter); counter++; } Move the duplicated code outside of the if statement Shorten variable names Move the brackets to save several lines of code Add semicolons after the if condition and the else reserved word

Answers

Answer:

Move the duplicated code outside of the if statement

Eliza needs to share contact information with another user, but she wants to include only certain information in the

contact. What is the easiest way for her to achieve this?


A. Use the Edit Business Card dialog box to control the information included.

B. Export only select fields from the contact.

C. Save the contact as a VCF file.

D. Share your contacts foler with other user.

Answers

Answer:

A. Use the Edit Business Card dialog box to control the information included.

Explanation:

b was incorrect but A is correct on edge 2020 I did the unit test review

Using the Edit Business Card dialog box to control the information included is the easiest way for her to achieve this. Thus option A is correct.

What is information?

Knowledge acquired by study, discussion, research, or education is referred to as information. Data is, in essence, the outcome of the data analysis and interpretation process. Info is the interpretation of those elements of knowledge, whereas data is the particular measurements, figures, or diagrams.

She can do this most easily while using the Edit Business Card Combobox to modify the material included. When you get a new email, a meeting submission, or a task plea, a notification called a pc alert flashes up on your computer. Desktop Alerts are on by default.

Depending on the product on the content you get in your Outlook, a Desktop Alert may or may not display certain information. Therefore, option A is the correct option.

Learn more about information, Here:

https://brainly.com/question/13629038

#SPJ5

HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical controls D. Administrative, technical, and physical controls

Answers

Answer:

D

Explanation:

Based on HIPAA Privacy Rule requires that covered entities apply appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information, in any form.

You are on a committee tasked with researching and recommending a service that will allow employees the opportunity to save files from their mobile phones, laptop computers, and workstation computers to cloud file storage services.
Which of the following will need to be researched and considered in order to make a comprehensive recommendation?
a. Virtualization application streaming
b. Off-site email applications
c. Type 2 hypervisor application
d. Type 1 hypervisor
e. Synchronization apps

Answers

Answer:

e. Synchronization apps

Explanation:

The synchronization refers to the process in which a user keeps his or her data in a multiple-way i.e in different applications so that the chances of loss of data could be minimized. And at the same time,  it also maintains the data integrity

It can be done by entering your credentials so that it appears as displayed before

Therefore according to the question, for saving the files from mobile phones, laptop computers, etc for cloud storage services the best and appropriate option is synchronization applications.

You use a cisco 2900 router in your network. you are considering purchasing and implementing the Unifield communications feature set on this router. however, you would like to evaluatie this feature set for a period of time prior to pruchasing it whcih command activate the evaluation right to use license for this feature set?

Answers

Explanation:

License boot module c2900, technology-package uck9

ment best describes the relationship between superclass and subclass types? a. A subclass reference cannot be assigned to a superclass variable and a superclass reference cannot be assigned to a subclass variable. b. A subclass reference can be assigned to a superclass variable and a superclass reference can be assigned to a subclass variable. c. A superclass reference can be assigned to a subclass variable, but a subclass reference cannot be assigned to a superclass variable. d. A subclass reference can be assigned to a superclass variable, but a superclass reference cannot be assigned to a subclass variable.

Answers

Answer:

d. A subclass reference can be assigned to a superclass variable, but a superclass reference cannot be assigned to a subclass variable.

Explanation:

A subclass is a class which is derived from another class. A subclass will have the characteristics of its ancestor class. A superclass is a class which is class direct ancestor. A superclass is an existing class from which new classes are derived whereas subclass is a class which is derived from superclass. The correct statement is that a subclass can be assigned to a superclass variable.

urgent ..algorithm and flowchart to check weather a number is odd or even ???​

Answers

Answer:

if it's 0 then the number is even.else number is odd

Explanation:

if it's divisible by 2.then the reminder will be 0,

then the number is even.

thanks

Answer:

Hello!!!

I'm not sure about first one but second is correct one.

no. means number (i didnt had place so)

so, i hope it helps you a little....

why is know app downloading in my android phone even if I have 900 MB ???

Answers

Answer:

May be you have not signed in with Google

Perhaps you are stopping the downloading without knowing

Consider the following code snippet. File hoursFile = new File("hoursWorked.txt"); Your program must read the contents of this file using a Scanner object. Which of the following is the correct syntax for doing this? Scanner in = new Scanner("hoursWorked.txt"); Scanner in = new Scanner(hoursFile); Scanner in = Scanner.open(hoursFile); Scanner in = Scanner("hoursWorked.txt");

Answers

Answer:

Scanner in = new Scanner(hoursFile);

Explanation:

The syntax to read the content of a file after the file has been created/initialized is as follows;

Scanner [variable-name] = new Scanner([object-name]);

From the question above, the [object-name] is hoursFile

Substitute [object-name] with hoursFile, the syntax becomes

Scanner [variable-name] = new Scanner(hoursFile);

[variable-name] can be anything as long as it follows variable naming convention;

From the list of given options, the option that answers the question is: Scanner in = new Scanner(hoursFile);

if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next 10 seconds then he has Dash velocity​

Answers

Answer:

[tex]\frac{1}{3}\ m/s[/tex]

Explanation:

The computation of the velocity by using the following formula is

As we know that

[tex]Velocity = \frac{Displacement}{Total\ time\ taken}[/tex]

where,

Displacement is 10 meters

Total time taken is 30 seconds

Now placing these values to the above formula

So, the velocity of Dash is

[tex]= \frac{10\ meters}{30\ seconds}[/tex]

[tex]= \frac{1}{3}\ m/s[/tex]

We simply applied the above formula so that we can get the velocity and the same is to be considered

RSA is a public-key cryptosystem developed by MIT professors Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman in 1977 in an effort to help ensure Internet security. RSA uses modular arithmetic and elementary number theory to do computations using two very large prime numbers. Identify the statement which is true for RC6 algorithm:________.
a) Is a variable key-size stream cipher with byte-oriented operations and is based on the use of a random permutation
b) Includes integer multiplication and the use of four 4-bit working registers
c) Is a parameterized algorithm with a variable block size, key size, and a variable number of rounds
d) Is a 64 bit block cipher that uses a key length that can vary between 32 and 448 bits

Answers

The answer is B) includes integer multiplication and the use of four 4-but working registers

Which of the following is a valid constructor header for the Player class that accepts the player name as a parameter? public void Player(String playerName) private Player(playerName) private void Player(playerName) public Player(String playerName)

Answers

Answer: Player(String playerName)

Explanation:

A constructor is a code block of a class. It is always witnessed when a new instance of the class is created

In JAVA , a valid constructor header is given as " CLASS (parameter)"

here, Class  → Player

parameter →  player name  (which is a string)

So, a valid constructor header for the Player class that accepts the player name as a parameter: Player(String playerName)

The ___________ button represents the start of a hyperlink in Table of contents.

Answers

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the white field to the right of the E button (Recall that the E button represent the entry test).

Other Questions
Evaluate each limit. Give exact answers. If 400 joules of heat are added to a gas in an isochoric process, what is thechange in its internal energy?O A. 400 JO B.-400 JO C. 100 JOD. 200 Retired utility workers are suing their former employer for knowingly exposing them to asbestos without warning them of the health risks. The retired workers did not learn of the prolonged exposure until long after their retirement because the company engaged in a systematic cover up of the exposure. The retired workers' cause of action is for which of the following?a. Assaultb. Batteryc. Injurious falsehoodd. Tortious interference Question 2 of 9Enter the correct answer in the box.What is the factored form of this expression?x2 + 6x - 16Substitute numerical values into the expression for p and q.(x + p) (x +9) analyze the risks and benefits of a drug replacement such as methadone. when would the benefits outweigh the risks? with a y-intercept 10, x-intercept 2, and equation of axis of symmetry x-3=0 what special division of the navy JAG corps does comeder jo galloway work for? The endosymbiosis or endosymbiont theory is meant to explain the origin of two specific organelles found in eukaryotic cells.1. Name the two organelles.2. Provide two pieces of evidence that support this theory. If the text that introduces a quote is not a complete sentence, which punctuation mark should you use between that text and your quotation? Draw the BST where the data value at each node is an integer and the values are entered in the following order 36,22,10,44,42,16,25,3,23,24 solution Jen plans to tile the kitchen floor. Each time covers 3 square meters. The kitchen is 4 5/6 meters wide and 5 meters long. How many times does Jen need to cover the kitchen floor? 19. When Pip and Estella reunite at Miss Havisham's house, Pip is hurt thatYO A. Miss Havisham has invited Orlick to her house.O B. Estella has no interest in loving him.OC. Miss Havisham encourages him to love Estella.O D. Estella doesn't remember making him cry. Suppose a company owns a fancy 3D printer which cost $1500 to buy. The printer depreciates $200 per year. (a) If the interest rate is 3 percent, what is the implicit rental price of the printer per year? (b) Does your answer to part (a) depend on whether the company used its own money to buy the printer, or if it took out a loan? Why? Suppose a newer edition of the 3D printer comes out for $2000. Because better technology is used, there is less depreciation; it only depreciates by $150 a year. (c) Calculate the implicit rental price for the new edition of the printer. Which edition of the printer - old or new - has a larger implicit rental price? (d) Suppose the interest rate was instead 5 percent, rather than 3 percent. Which edition of the printer - old or new - has a larger implicit rental price? Compare your answer with part (c), and comment on any difference. Hi I really need help on this problem. Thank you! Consider the following information for Maynor Company, which uses a periodic inventory system:Transaction Units Unit Cost Total CostJanuary 1 Beginning Inventory 29 $ 79 $ 2,291 March 28 Purchase 39 85 3,315 August 22 Purchase 58 89 5,162 October 14 Purchase 63 95 5,985 Goods Available for Sale 189 $ 16,753 The company sold 63 units on May 1 and 58 units on October 28.Required:Calculate the company's ending inventory and cost of goods sold using the each of following inventory costing methods. (Round the per unit cost to two decimal places and then round your answer to the nearest whole dollar.)a. FIFO:b. LIFO:c. Weighted Average Read this passage taken from "How the Spaniards Came to Shung-opovi, How They Built a Mission, and How the Hopi Destroyed the Mission": Well, about this time the Strap Clan were ruling at Shung-opovi, and they were the ones that gave permission to establish the mission. The Spaniards, whom they called Castillia, told the people that they had much more power than all their chiefs and a whole lot more power than the witches. The people were very much afraid of them, particularly if they had much more power than the witches. They were so scared that they could do nothing but allow themselves to be made slaves. Whatever the Spaniards wanted done must be done. Any man in power who was in this position the Hopi called To-ta-achi, which means a grouchy person who will not do anything himself, like a child. They couldn't refuse, or they would be slashed to death or punished in some way. There were two To-ta-achi. The missionary did not like the ceremonies. He did not like the Kachinas, and he destroyed the altars and the customs. He called it idol worship and burned up all the ceremonial things in the plaza. Which two of these elements are found in the Hopi story? Find the word from the paragraph which means same as ' essential\ . Read the passage given below and answer the questions that follow: 1. The film industry is facing the challenge of the television screen which, because of its ready availability and nearness to entertainment seekers, is becoming very popular, particularly in the West where television programmes are as indispensable to people as newspaper material. Sustained entertainment for multitudes lasting two or three hours is possible only in big cinema halls. Scenic beauty, background effects and colour techniques which have made the products of cinema industry so attractive and delightful may not be reproduced by television programme organisers, and therefore, this important invention in the field of wireless communication, in spite of having become a big rival of the cinema, may not succeed in replacing it. 2. The motion picture has also stepped into the international sphere as an agent of goodwill and co-operation among nations. Cultural contacts which tend to reduce tension in the world and bring harmony in international relations have been established through the medium of films. The more people understand and appreciate the past history, present aims, customs, habits and beliefs of men and women in foreign lands, the more will they realise that their interests can best be served by establishing friendly relations with them and by removing those irritants which breed distrust, lack of co-operation and the desire to punish those whose views and attitudes are such as they do not like. As cultural agents movies can cement ties of love and brotherhood among nations and teach them to confer on each other the benefits of all the rich and glorious achievements of the present enlightened age. In recent years, artists of the film world have been visiting foreign lands with a view to presenting before audience in those countries e best products of their cultural heritage. Film festivals which many European and Asian countries have been organising from time to time have also proved to be of immense value in reducing social barriers, colour prejudices and other causes of friction between nations. and for sure the first one to anwser will get brainlest Two companies report the same cost of goods available for sale but each employs a different inventory costing method. If the price of goods has increased during the period then the company using:______ a. LIFO will have the highest ending inventory b. FIFO will have the highest cost of good sold c. FIFO will have the highest ending inventory d. LIFO will have the lowest cost of goods sold please help. create five word expressions that will need to be translated into an algebraic expression also provide a value for the variable mentioned in the expression. Description:Create a program that converts the number of miles that you walked on a hike to the number of feet that you walked.Console:Hike CalculatorHow many miles did you walk?: 4.5You walked 23760 feet.Continue? (y/n): yHow many miles did you walk?: 2.5You walked 13200 feet.Continue? (y/n): nBye!Specifications:The program should accept a float value for the number of miles.Store the code that gets user input and displays output in the main function.There are 5280 feet in a mile.Store the code that converts miles to feet in a separate function. This function should return an int value for the number of feet.Assume that the user will enter a valid number of miles.