1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
2 years ago
12

4. The volume of a sphere is (4.0/3.0)rr3 and the surface area is 4.0rr2, where r is the radius of

Computers and Technology
1 answer:
Basile [38]2 years ago
3 0

An algorithm that computes the volume and surface area of this sphere include:

  1. Get the radius.
  2. Calculate the volume.
  3. Calculate the surface area.

<h3>What is an algorithm?</h3>

An algorithm is a standard formula which comprises a set of finite steps and instructions that must be executed in order to proffer solutions to a problem on a computer, under appropriate conditions.

For this exercise, an algorithm that computes the volume and surface area of this sphere is as follows:

  1. Get the radius.
  2. Calculate the volume.
  3. Calculate the surface area.

Read more on algorithm here: brainly.com/question/24793921

$SPJ1

You might be interested in
Part 1: 1) Write a C program getPhoneNumber.c that accepts a phone number from the user in the form XXX-XXX-XXXX, and then displ
Allushta [10]

Answer:

Following are the program, which can be below:

#include <stdio.h> //defining header file

#include <string.h>//defining header file

int main() //defining main method

{  

int x=0,y=0,l=0; //defining integer variable

char phone_number[32] = {'\0'}; //defining char array

printf("Enter a date(xxx-xxx-xxxx): \n "); //print message

printf("Example: 000-000-0000 \n :"); //print message

scanf("%s",phone_number); // taking input from user

printf("%s\n",phone_number); //print number

for(x=0; phone_number[x]; x++) // check character by character

{

if(x==0) // put ( on first character

{

l = strlen(phone_number); //calculate length  

phone_number[l] = '\0'; //check number  

for(y=l; y>=1; y--) //loop to calculate a value

{

phone_number[y] = phone_number[y-1]; //holding value in array

}

phone_number[y] = '('; //assigning bracket

}

if(phone_number[x] == '-') // put ) at first -

{

phone_number[x] = ')'; //assigning bracket

break;

}

}

printf("You entered %s\n",phone_number); //print all value with brackets

}

Output:

Enter a date(xxx-xxx-xxxx):  

Example: 000-000-0000  

:011-123-4567

011-123-4567

You entered (011)123-4567

Explanation:

The description of the above program can be defined as follows:

  • In the above program three integer variable "x, y, and l" and a character array "phone_number" is declared.
  • In the char, variable user input the value and print its value by using the print function.
  • In the next line, a for loop is declare, that checks user input value character by character and counts its length by using the strlen() method, inside the loop a conditional statement is used.
  • In the condition statement check, the values are not equal to null and provide brackets in the inserted value.
8 0
3 years ago
Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
zhenek [66]

A circuit-switched network would be more appropriate for this application.

<u>Explanation</u>:

The method of Circuit switching helps in the establishment of a network with the nodes that are in communication. The network will be established in the earlier stages before the two nodes starts to communicate with each other. The bandwidth that is essential fro the communication will be reserved and the communication will take place without any interruption.  

The example that is given in the question requires a circuit switched network suiting its need. This is because long sessions are essential and there are some needs of bandwidth too. Circuit switched networks helps in this scenario reserving bandwidth for each session of the application and there wont be any wastage. There is also an advantage of ignoring he costs that are related with the setting and disconnecting the circuit connection even if an application has a session with longer time duration.  

8 0
3 years ago
Select the correct answer from each drop-down menu.
Dmitry_Shevchenko [17]

Answer:

Suzanne needs a blog

Explanation:

Because she wants to use a digital media tool that acts as a journal and facilitates discussion, Suzanne would need a blog for this.

A blog is a platform where people can meet and have discussions on the internet sometimes in a diary-like format.

Suzanne would need software like WordPress for her blog.

8 0
4 years ago
The _______ is a connection of computers and networks built into common, everyday devices.
crimeas [40]

Answer:

B. Internet of things.

Explanation:

Internet of things (IOT) is an interconnection of everyday devices through the internet to allow the device send and receive data. It is used for remote connections in offices, homes and industries to achieve various activities like switching of the power status, regulating device operation etc, in the absence of a physical operator.

BYOD or bring your device to work is a situation where members of an organisation connect and use their personal devices in the company's private network.

7 0
4 years ago
Cuantos actos ay en el mito de aracne
mash [69]

Answer:

En el mito de Aracne hay un acto, que se desarrolla con cinco escenas.

Explanation:

En el mito de Aracne hay un solo acto, que se desarrolla con cinco escenas. En este mito, la joven Aracne es muy hábil tejiendo, tanto así se enorgullece de su talento que se compara y se considera mejor que la diosa Atenea. Esto último ofende a la divinidad, que le advierte sobre su egocentrismo, lo que lleva a que ambas mujeres participen en una competencia. Aracne demuestra ser muy hábil pero irrespetuosa, lo que hace enfadar a la diosa. Al final, la joven se da cuenta de su error y se ahorca, pero Atenea se apiada de ella y la transforma en una araña.

6 0
4 years ago
Other questions:
  • Given the plaintext {0F0E0D0C0B0A09080706050403020100} and the key {02020202020202020202020202020202}: a. Show the original cont
    11·1 answer
  • The English (or Shakespearean) sonnet form includes three quatrains and a couplet two quatrains and a couplet two quatrains and
    15·1 answer
  • What can Strings store
    15·2 answers
  • You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
    8·2 answers
  • Draw the tree that results when you add the values 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 to each of the following initially em
    15·1 answer
  • Identify the programming language released by
    10·1 answer
  • Nadia has inserted an image into a Word document and now would like to resize the image to fit the document befter. What is the
    11·1 answer
  • User 2.0 is most likely to Multiple Choice passively read and search for content. depend on content creators and avoid expressin
    5·1 answer
  • confidentiality ensures that only those with the rights and privileges to access information are able to do so.
    12·1 answer
  • Click the _______________________________ button in the css designer panel to create a new css files, or define an existing exte
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!