Answer:
1 Start
2 Read the value of radius r of Circle
3. Give Pi = 3.14
4 Calculate area of Circle = Pi x r x r
5. Calculate Circumference of circle
( You can use either C= 2 X Pi X r Or Area (A) = Pi X r X r Circumference (C) = 2 X Pi X r A/r = Pi X r A/r = C/2 So C = 2 x ( A/r ) 5. Print area and Circumference
6. End.
_____ is the dynamic storage allocation algorithm that results in the largest leftover hole in memory.
Answer: Worst fit
Explanation:
What is the interface of an app?
a storyboard software
the part the user sees
a sketch of your idea
a testing environment
Explanation:
An application interface or user interface ,is the set of features an application provides so that user may supply input to and recieve output from,the program.
can’t be opened because apple cannot check it for malicious software.
Answer:
try to reset your computer.
Explanation:
Please define processor
List three (3) features of first generation computer
Answer:
features are
the first generation computer were based on vacuum tube technology
they were very large in size,very slow in speed and very low in capacity
they used to get heat very soon
Write a function float Average(int, int) that finds the mean, and then write a main program that inputs two numbers from the user repeatedly until the user enter “0”. You need to call the function and display the mean of two numbers in the main. C++ language only.
The program illustrates the use of functions.
Functions are used to group related code segments that act as one, when called.
The program in C++ where comments are used to explain each line is as follows:
#include <iostream>
using namespace std;
//This defines the Average function
float Average(int num1, int num2){
//This returns the average of the numbers
return (num1+num2)/2.0;
}
//The main method begins here
int main(){
//This declares the numbers as integer
int num1, num2;
//This gets input for both numbers
cin>>num1; cin>>num2;
//This is repeated until the user enters 0
while(num1!=0 || num2 !=0){
//This calls the average function, and prints the average
cout<<Average(num1,num2)<<'\n';
//This gets input for both numbers, again
cin>>num1; cin>>num2;
}
return 0;
}
Read more about similar programs at:
https://brainly.com/question/17378192
Why is experience in their own factory setting
crucial for a manager in the manufacturing
business?
Answer:
How to Manage Manufacturing Operations Effectively
Ensure High-Quality Products. ...
Ensure High-Quality Equipment. ...
Know How To Maximize Resources. ...
Look Into Technological Advancements. ...
Check Your Customer Service. ...
Consider Reducing Waste. ...
Conclusion.
Explanation:
Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage device would be best for this purpose?
A. Optical disc
B. Cell phone
C. Flash drive
D. HDD
Answer:
C
Explanation:
Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.
Hope this helped, and sorry if I didn't answer in time.
Which of the following is true regarding computer science careers?
A. There are a limited number of jobs in this field.
B. There are not different job types in this field.
C. The number will increase over the next several years.
D. You must be a programmer to work in this field.
(WILL MARK BRANLIEST IF CORRECT)
Answer: There are several different job types in this field.
Explanation: did the test and got it right
Answer:
A or C!
Explanation:
Im pretty sure its one of those answers. I think its C though! If I'm wrong, please tell me! I just did the test and I forgot if I got it right or not. It wont let me go back in-
- A FLVS student with a 99.91 percent in computer science (Totally not bragging!)
Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authentication.
Answer:
is a security that needs two types of identification to access what your trying to enter.
Explanation:
Ex= to enter email, you first need to put in password, then verify by phone call that u need to enter.
difference between boot disk and booting in 5 points
In computing, booting is the process of starting a computer. It can be initiated by hardware such as a button press, or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.
A boot disk is a removable digital data storage medium from which a computer can load and run an operating system or utility program. The computer must have a built-in program which will load and execute a program from a boot disk meeting certain standards.
How does a cell phone change the
incoming signals from a caller into sound that
you can hear
Answer:
they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.
Explanation:
Answer: Cell phone or any electric device you can say changes the electric signal to radio waves at transmitting end which is converted back to electric signal and perceived as sound waves at receiving end
Explanation:
What software type is software that is distributed free of charge, but the source code is not available
Answer:
Closed Source software programs
A ____ is a rectangular object you can click; when you do, its appearance usually changes to look pressed.
Answer:
button
Explanation:
____________________ are protocols used by routers to make path determination choices and to share those choices with other routers.
Answer: Routing protocols
Explanation:
what is the term for delivering an application over the internet called?
Answer:
Cloud computing
Explanation:
The termnology which is used to describe the delivering of an application over the internet is called SaaS.
What is SaaS?SaaS is an acronym for Software as a Service and it can be defined as a type of cloud computing delivery model that typicaly involves developing and making licensed software applications available to end users on a subscription basis and over the Internet, especially by centrally hosting these software applications within the cloud or through a third-party (vendor).
This ultimately implies that, Software as a Service (SaaS) is a termnology which is used to describe the delivering of an application over the internet.
Read more on SaaS here: https://brainly.com/question/24852211
codes 7.2.8: Listed Greeting python
pls help i have no idea on how to fix this
The listed greetings program is an illustration of Python functions.
The error in the program is that the program is not properly indented.
Python program uses indents to identify blocks of code.
So, the fix to the program is to properly indent the code, and the fix (without the comments) is as follows:
def greetings(s):
x = s.split()
print("Hello, "+x[0]+"! I also enjoy "+x[1]+"!")
Read more about Python programs at:
https://brainly.com/question/16240699
Pls help me pls I’m struggling
Which of these problems is correct if the numbers are binary numbers?
Group of answer choices
1 + 1 = 2
1 + 1 = 10
0 + 0 = 1
1 + 0 = 10
Answer:
1 + 1 = 10
Explanation:
2 does not occur in the binary "alphabet"
0 + 0 = 0 in any base, so also in binary
1 + 0 = 1 in any base, so also in binary
which computer belongs to the first generation?
Pls help me pls I’m struggling
Answer:Turn Right () Degrees (block)
The turn right () degrees block is a Motion block and a stack block. The block turns its sprite's direction the specified amount of degrees clockwise.
Find the error in the following code fragment. int a: System.out.print(a):
Answer:
If your using java, then its supposed to be "System.out.print("a")"
Explanation:
its supposed to have quotations
The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.
Answer: Application
Explanation:
how does digital and hybrid computers differ in portability
Answer:
Digital computers perform functions like mathimatical,compex calculations. while hybrid computers work with the duo combinations like analog and tempature.
Explanation:
I passed the class A+
yourwelcome :)
thank me if it was correct for you too.
Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?
A.
alongside the development of the app
B.
after the app has been developed
C.
during the testing phase
D.
during the design phase
Answer:
C option
Explanation:
Because in testing phase the game has been developed and test for errors in game.
Katie is writing a print statement but nothing is printing. Which of the following should she check for?
A.
Make sure the print statement is surrounded by parentheses.
B.
Make sure the word print is in all capital letters.
C.
Make sure there is a colon after the print statement.
D.
Make sure the next line after the print statement is indented.
Answer:
A.
Explanation:
Parenthesis are required to be around the data in a print function. All the letters in a print statement should be lowercase. A colon isn't required after a print statement. Indentation is not needed for a print statement because there are no colons after the statement instead. Here's an example where you would need to indent the line:
def randNum( x, y ):
x = input("Enter number: ")
y = input("Enter number: ")
return x * y
Here's an example of a print statement:
print("My name is Sullen.")
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106
I am very stuck and still don’t know how these work.
Answer:
Encrypt this binary string into ciphertext: 110000. Include
in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y
-Decrypt this ciphertext into a binary string: 106
Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.
Explanation: ……………..
This computer is used by touching your finger.
A Desktop
C. Mainframe
B. Laptop
D. Tablet
Answer:
a tablet because it's controlled by the touch of a finger.
Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?
a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)
¿Qué juegos pueden jugarse en un Raspberry 4 B con 2 GB de RAM?
Answer:
flow chart of sales amount and commission %of sales