1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
4 years ago
12

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyram

id with a rectangular base. Sample output with inputs: 4.5 2.1 3.0 Volume for 4.5, 2.1, 3.0 is: 9.45 Relevant geometry equations: Volume = base area x height x 1/3 Base area = base length x base width.
Computers and Technology
1 answer:
olga_2 [115]4 years ago
4 0

Answer:

Following are the program in Python programming language

def pyramid_volume(base_length,base_width,pyramid_height):

base_area=base_length*base_width

volume=base_area*pyramid_height*(1/3)

return volume

print('volume for 4.5,2.1,3.0 is:',pyramid_volume(4.5,2.1,3.0))

Explanation:

Here, we define a function "pyramid_volume()" and pass an arguments "base_length,base_width,pyramid_height"

inside that program we have calculated the area of the pyramid and after that we have calculated the volume of that pyramid and return the volume.

Outside of the function we have called the function by passing the arguments.

You might be interested in
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
Consider the following code segment:
lesya [120]
Function demo {

If (value & gt;0);

If-else (...)

If-else (...)
}



I’m not on the computer right now but lemme know if this doesn’t work. Try going to inspect element on your html page and then console log and your issue should show their.
You may need to add a try and catch but idk.
8 0
3 years ago
Write a method to add/subtract two matrices. The header of the method is as follows:
Sergio [31]

Answer: A

Explanation:

3 0
2 years ago
Examples of hardware that computes on a network can share are the operating system and the web browsers
qwelly [4]

Answer:

False.

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.

In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.

Hence, examples of software but not hardware that computers on a network can share are the operating system and the web browsers

4 0
3 years ago
Can somebody help me?
Alika [10]
Are you signed in? if not then try to reset your device and see if you can get in there I hope this helped you if not plz let meh know :P 
5 0
4 years ago
Other questions:
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    12·1 answer
  • 12. In Microsoft Word, when you highlight existing text you want to replace, you are in A. basic mode. B. automatic mode. C. ins
    10·2 answers
  • Give me 3 companies that utilize audio/video technology
    8·1 answer
  • If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
    9·2 answers
  • If a system responds to a change in input by moving further away from its equilibrium condition, what type of feedback has occur
    13·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • What is an example of CT SO?
    9·1 answer
  • Which of the following is the fastest computer processing speed?
    10·1 answer
  • How do you record your own video game Music and post Them on yt
    7·2 answers
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!