write a program to calculate the area of rectangle​

Answers

Answer 1

Answer:

program by LET statement

Explanation:

CLS

REM to find the area of rectangle

LET L=40

LET B=20

LET AOR=L*B

PRINT "AOR=";AOR

END

                                                                                         Press F5

output

AOR=800


Related Questions

You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used. Even though the monitor is made by a different manufacturer than the desktop computer, it still works with the computer. Which computer design concept makes this possible

Answers

Answer:

standardization

Explanation:

A problem can be defined as an issue or challenge encountered by a person, which typically requires a solution.

Generally, problems are considered to be either simple or complex depending on the individual, parameters, and factors involved.

This ultimately implies that, problems are relative in nature but always require that a solution be proffered.

In this scenario, a broken monitor on a desktop system needs to be replaced. You then decided to replace the monitor with a spare monitor that wasn't being used.

Although, the spare (replacement) monitor was manufactured by a different manufacturer than the desktop computer but it still worked with the computer. Thus, the computer design concept which makes this possible is referred to as standardization.

Standardization can be defined as a design concept which avails users the opportunity to use various components from different manufacturers interchangeably without any defect or compromise of the integrity of a system. The most important criteria to be considered is if the components meet set standards i.e specifications of the system.

"NOTE: write an algorithm, not a code" You are given a file called "std" and composed of "Number, Name, Address" fields. (You can define the type of fields by yourself) Write an algorithm that makes "insert, delete, update and retrieve", processes on the records in the file. "Number" field is the key of each record. Here is the template of report: Steps Actions 1 Name of the report and date 2 Author of report 3. Literature review 4. Your contribution 5 Explanation algorithm and sub algorithms 6 Summary 7. Future advice 8. References

Answers

Answer:

1. get the absolute path to the file

2. load the file as a table (dataframe in python)

3. to insert a row;

create a dataframe of the same field typeconcatenate the new dataframe horizontally with the same dataframe

4. to delete a row, select and drop the row where the 'Number' field matches a value.

5. to update the values in row, use the number field as a key to replace the existing values.

6. print of save to a variable the rows where the number field matches a given value.

Explanation:

Follow the report template to create a report for the algorithm.

The algorithm gets the absolute path to the file and loads the file as a tabular file from there the data can be queried without accessing the main file. The insert algorithm creates a new dataframe and appends it to the main dataframe.

The delete, update and retrieve all use the same subalgorithm, getting the rows with the number field as the key value.

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this

Answers

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

What can you do to help avoid or minimize accident while working at the farm?​

Answers

Answer:

safety first

Explanation:

avoid the narrow materials that cause an accident

Match each code snippet to its appropriate markup language name

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

Where is shoto from

Answers

Answer:

Shoto Todoroki is from "my hero academia" my dude

Explanation:

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Answers

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

Select the correct answer.
Dina created a database related to essential oils and their uses. For every oil, she wants to enter a unique code number. Which data type would be suitable for entering this data?

A.
Boolean
B.
autonumber
C.
BLOb
D.
memo
E.
null

Answers

Answer:

Autonumber

This is because Autonumber is the only option out of the four that accepts random unique code numbers

Feel free to mark as brainliest :D

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

What will be the results from running the following code?
print("Grades")
print(92)
print(80)
print("Total")
print(92 + 80)

Answers

Answer:

Grades

92

80

Total

172

Explanation:

Python is a very simple language, and has a very straightforward syntax. It encourages programmers to program without boilerplate (prepared) code. The simplest directive in Python is the "print" directive - it simply prints out a line (and also includes a newline, unlike in C).

Answer:

Grades

92

80

Total

172

Explanation:

What would be the purpose of grouping worksheets in a workbook?
All formatting would be done on all sheets at once.
All header rows would be shared on all sheets at once.
All data entered would be entered on all sheets at once.
All formulas entered would be entered on all sheets at once.

Answers

Answer: A

Explanation:

defination of Wi-Fi plz​

Answers

Answer:

A facility allowing computers,smartphones and other devices to connect to the internet or communicate with one another wirelessly.

Fill _________ skips the Saturday and Sunday dates in a date fill.
A. Weekends
B. Weekdays
C. Skip Weekends
D. Skip Saturday and Sunday

Answers

A. Weekends is the correct answer

How will future space flights be different for NASA?

Answers

Answer:

Explanation:

NASA's future will continue to be a story of human exploration, technology, and science. NASA will continue to be a global leader in scientific discovery, fostering opportunities to turn new knowledge into things that improve life here on Earth. ... Artist's concept, NASA's gateway in lunar orbit.

Answer:

NASA's future will continue to be a story of human exploration, technology, and ... changes on the global land surface at a scale where we can separate human ... Exploring deep space and three-year missions to Mars pose new challenges: ...

Explanation:

NASA's Artemis program aims to land another man and the first woman on the moon by 2024 and eventually establish sustainable space travel by 2028. The Artemis program is NASA's stepping stone to their ultimate goal of landing on Mars.

On the Print screen, which portion shows you a sample of how the publication will look when printed?

Printer

Settings

Number of Copies

Print Preview

Answers

Answer:

D. Print Preview

Explanation:

print preview allows you to view the layout of your paper before you print it hence the pre part of preview

Print preview allows you to view the layout of your paper before you print it hence the pre part of preview.

What is Print preview?

A feature called print preview shows what a printed copy would look like on the screen. By checking the layout using print preview before printing, you can detect any potential problems and prevent the need for multiple prints, saving ink or toner and paper.

You can examine a page in landscape mode by switching the page orientation in the print preview from portrait to landscape. Sadly, not all software supports this function.

You are unable to see how your page will print in landscape format if the program you are using lacks any settings or print preview features.

Therefore, Print preview allows you to view the layout of your paper before you print it hence the pre part of preview.

To learn more about Print preview, refer to the link:

https://brainly.com/question/17441291

#SPJ2

Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression

Answers

feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends

which site uses both social bookmarking as well as visual sharing features and is described as a virtual pinboard?

Answers

Answer: Redd-it

Explanation:

The site that make use of both social bookmarking and visual sharing features and is also described as a virtual pinboard is Redd-it.

Reddit refers to a discussion webiste and a web content rating where the members submit their contents like images, links, text posts and videos. These are then either voted up or voted down by the members based on their perception on the post.

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

Which avenue may utilize video streaming, audio narration, print designs and animation?

The (blank) may utilize video streaming, audio narration, print designs and animation.

Answers

Answer:

Multimedia avenue.

Explanation:

A file type is the standard used to store data such as pictures, texts, videos, and audios. All file types have unique file extension that determine which program to use to open a particular file and to access its data e.g pictures (jpeg, png), texts (txt, docx, rtf), videos (mp4, 3gp, avi), audios (mp3, acc).

Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.

Basically, all software applications are designed and developed for use with specific file extensions or formats and as such, when used to open a file it isn't developed for, it result in an error.

A multimedia avenue refers to a channel that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc. A common example of a multimedia avenue is Microsoft PowerPoint software.

Hence, the multimedia avenue may utilize video streaming, audio narration, print designs and animation.

What special signal is issued periodically from an Access Point and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP

Answers

Answer:

beacon frame  

Explanation:

Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the  information a station will require before it can rightly transmit a frame.  

When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services

Write a Scientific report modeling a written reasearch paper on big data applications.​

Answers

Big data applications is known to be the methods and ways that are often used to handle large amount of data.

What is  Scientific data modeling in big data?

Data modeling is known to be the ways of analyzing the “areas” of interest to one's organization and how these things is linked to each other.

Note that The data modeling helps us to know and also helps in documentation of the data resources needed for one's business.

Big data are often measured by terabytes and lots more and as such managing them is one that is  time-consuming,.

Learn more about Big data  from

https://brainly.com/question/19049345

#SPJ1

brain of the computer system is called​

Answers

Answer:

The CPU (Central Processing Unit) 

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.

Answers

Answer:

a) SELECT No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';

b) SELECT branchname, No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe'

GROUP BY branchname;

c) SELECT Name

FROM borrowers B

WHERE cardno NOT IN ( SELECT cardno FROM book_loan)

d) SELECT title, name, B.address

FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)

WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';

e) SELECT title, No_of_copies

FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)

WHERE authorname = 'Stephen King' AND branchname = 'Central';

g) SELECT DISTINCT title

FROM ((book JOIN book_copies) JOIN library_branch)

Explanation:

The SQL statements query's a book store database of seven relations using joins and subqueries to return results.

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

You suspect that your web server has been the target of a denial-of-service attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine

Answers

Answer:

Performance log

Explanation:

The Windows Performance Logs and Alerts, is a service that monitors and collects the performance data on resources, processes, threads, cache, memory, and processor, dependent on parameters which are preconfigured and scheduled, and logs the data or results in an alert

The service can be enabled from the file perfmon.exe

From the logs, troubleshooting the security of the system can be performed by monitoring file access, unusual or unauthorized activities, network connections, unusual system behavior, error messages and unusual network behavior

Select the correct answer.
How are cells in a spreadsheet named?

A.
based on the header of the row they are in
B.
based on the header of the column they are in
C.
based on the row and column they are in
D.
by right-clicking them and giving them a name

Answers

Answer: its C

Explanation:

Answer:

C: Based on the row and column they are in.

Explanation:

Sells have spreadsheet but only one main system of our body. thus. forum of inside to cupture the entire blood to spread and make other resources from our body.

HOPE IT HELPS!

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

I got a question in computer science I don't understand, can someone please help.​

Answers

Answer:

Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.

Please give brainliest, means alot!

Which elements most affect the voice of an academic paper? Check all that apply.

Answers

where are the options

Answer:

C

Explanation:

Other Questions
The value of the U.S. dollar compared to the currencies of major U.S. tradingpartners is known as the:A. global-reserve value of the U.S. dollar.B. free-market value of the U.S. dollar.C. inflation-adjusted value of the U.S. dollar.D. trade-weighted value of the U.S. dollar. given the figure below find the value of x and z If you have 500 mL of a 0.10 M solution of the acid, what mass of the corresponding sodium salt of the conjugate base do you need to make the buffer with a pH of 7.74 (assuming no change in volume) Signs and symptoms of:Depression-Anxiety-OCD-PTSD-Bipolar- True or Falsea. The cones in our eyes detect color, while the rods perceive brightness.b. In white light, white objects absorb all the colors.c. At night, when light is dim, our cones are not activated so objects will appear as their normal color.P.d. Violet has the longest wavelength which is why it gets refracted the most.Ve. The angle of incidence always equals the angle of reflection. write the equation for the circle graphed below. Alex is saving up to buy the newest version of Playstation. Alex earns $84 after 3 weeks of mowing lawns. How much money does Alex earn per week mowing lawns? which extremities is radius and ulna?i)lowerii)upper Define y desarrolla los siguientes trminos en tu libreta (escribe sus variantes)CLULASNUTRICINREPRODUCCINRESPIRACINADAPTACINElige un ser vivo y desarrolla sus caractersticas comunes con el resto de los seres vivos (formado por clulas, nutricin, reproduccin, respiracin, adaptacin) I need help please I dont get this 1. to a survey teens about their music preferences. you would question several teens: a: attending a classical choir recitalb: as they enter a music storechoose the sample that is more likely to be representative of the population. A sum of money is divided between A, B and C in the ratio 10:6:4. If B receives 515 morethan C , how much will A get and what is the total sum of money? If 4% of a number is 8, find 1% of that number. Why were businesses attracted to Atlanta after World War II? Identify at least four reasons and rank them from mostimportant to least important. Explain each of your four choices and rankings in two paragraph. wood burning cooking an egg making Kool Aid water boiling copper plating a nail melting sand to make glassare these chemical or physical changes A napkin is 18 inches long. A tablecloth is 6 times as long as the napkin.How much longer, in inches, is the tablecloth than the napkin?If d is the difference in the length of the tablecloth and the napkin,which pairs of equations can be used to solve the problem? Select all that apply. A. 6 18 = 108 and d 18 = 108 B. 6 18 = 108 and 108 18 = d C. 6 18 = 108 and d + 18 = 108 D. 6 18 = 108 and d + 108 = 18 E. 6 18 = 108 and 18 108 = d i need the answer to this question Kiara gets to spin the big prize wheel, which has a radius of 2 meters. What is the prize wheel's area? PLZ HELP me Look at the graph below.A graph is shown with Absolute magnitude shown on y axis and Surface temperature in degree Celsius shown on x axis. The Dwarf stars are shown along a slanting line from coordinates 30,000 and minus 3 to 10,000 and minus 4. The Main Sequence stars are shown along a slanting line from coordinates 20,000 and minus 2 to 2,000 and minus 6. The giants are shown along a line parallel to the x axis from coordinates 5,000 and 2 to 2,000 and 3. The supergiants are shown along a line parallel to the x axis from coordinates 7,500 and 4 to 2,500 and 4. Point A has coordinates 20,000 and minus 4. Point B has coordinates 2,500 and minus 4. Point C has coordinates 5,000 and 2. Point D has coordinates 7,000 and 4.Which statement is true about Star A? aIt is red in color. bIt is yellow in color. cIt is four times brighter than the sun. dIt is four times dimmer than the sun. What does the medulla control?your balancesensory recognitionvoluntary muscle movementsyour heartbeat and breathing