1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
2 years ago
15

I Need Help with 6.1.3 circles in squares in codehs

Computers and Technology
1 answer:
ycow [4]2 years ago
5 0

The program below is able to calculate the area of a circle inscribed in a Square.

<h3>What is a program?</h3>

A program is a set of instructions given to the computer with specific end results in mind.

<u>Sample program in Java

</u>// Java Program to find the area of

// an inscribed circle in a square.

import java.io.*;

class GFG {

   

   static double PI = 3.14;

   

   // Function to find area of an

   // inscribed circle in a square.

   static double areaOfInscribedCircle(float a)

   {

       return ( PI / 4 ) * a * a;

   }

   // Driver code

   public static void main (String[] args)

   {

       float a = 8;

   

       System.out.println("Area of an inscribed"

       + " circle: " + areaOfInscribedCircle(a));

   }

}

Learn more about programs at :
brainly.com/question/1538272
#SPJ1

You might be interested in
What are some situations where you might find it useful to use the “!” symbol in a program?
hodyreva [135]

Answer:

The NOT operator can be useful to excludes unwanted items (or irrelevant items).

Explanation:

In a lot of computer languages, the "!" symbol stands for the Boolean operator "NOT".

The NOT operator can be useful to excludes unwanted items (or irrelevant items).

Suppose you want to check if two conditions are not equal to each other, and when that condition is true, you can control some specific the outcome, or let something happen...

if ( condition1 != condition2 ) then

whatever you want done....

end if

6 0
3 years ago
Which website offers guidance on putting together a checklist to provide guidance on configuring and hardening operating systems
WITCHER [35]

The National Vulnerability Database website offers guidance on putting together a checklist to provide guidance on configuring and hardening operating systems.

An operating system (OS) is the programme that controls all other application programmes in a computer after being installed into the system first by a boot programme.

Through a specified application programme interface, the application programmes seek services from the operating system (API). Additionally, users can communicate directly with the operating system by using a user interface, such as a graphical user interface (UI) or a command-line interface (CLI) (GUI).

The development of software for computers benefits greatly from an operating system. Without an operating system, each programme would have to contain both its own user interface (UI) and the complete code required to manage all low-level computer operations, such as disc storage, network connections, and other things.

Learn more about operating system:

brainly.com/question/1033563

#SPJ4

6 0
1 year ago
Is a free verse a poetry that has no images
hram777 [196]
No it just means that it does not have any specific rhymes or formats
3 0
3 years ago
Read 2 more answers
Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
Alenkasestr [34]

Answer:

Trace Precedent

Explanation:

Trace Precedent is a Microsoft Excel tool that is mostly used in auditing work to evaluate the connection or linkage between the cells in a spreadsheet. It is used to display the cells that are referred to by a formula in the selected cell. This is to locate the basis of an error in knowing how the formulas are adapted.

This can be done by clicking on the Formulas tab, then click on Formulas Auditing, then click on Trace Precedents.

Hence, in this case, the correct answer is TRACE PRECEDENTS.

7 0
3 years ago
When a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize t
avanturin [10]

Answer:

Online or Web Proxy

Explanation:

Web or online proxy allows you to hide your Internet Protocol (IP) address from the website you are trying to visit or access. It is like a shield between the website you are accessing and you. They can be seen as a middleman between you and the site you are visiting and as such, the site sees that a specific IP address is accessing its server but the address is not yours as all requests between your computer and the web server are first passed through the proxy server.

<em>Hope this helps!</em>

4 0
3 years ago
Other questions:
  • Word 2013 opens, by default, on a blank document?
    13·2 answers
  • What are the uses of joystick​
    13·1 answer
  • Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two character
    8·1 answer
  • Which option is the strongest password?
    7·2 answers
  • What makes these Pokémon special?
    9·2 answers
  • What was used to enhance silent films of the early 1900s
    15·1 answer
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at
    5·1 answer
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!