1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
10

How to find no of Distinct triangles in a polygon?

Computers and Technology
1 answer:
8_murik_8 [283]3 years ago
7 0
Input : N = 6
Output : 6 2
The image below is of a triangle forming inside a Hexagon by joining vertices as shown above.
The triangle formed has two sides (AB and BC) common with that of a polygon. Similarly BC and
CD can make one triangle. With this, we can say that there will be a total of 6 triangles possible
having two sides common with that of a polygon. The second image of a hexagon,
a triangle is formed with no side common with that of a polygon.
There will be just 2 triangles possible, BFD and ACE.


Triangle with two side common and no side common of the Hexagon

Number of triangles formed are 6 and 2 with two side common and with no side common respectively.
Input : N = 7
Output : 7 7
You might be interested in
All the network nodes are connected to each other
Shalnov [3]
It’s a mesh topology
7 0
3 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
Which of the statements below explains why a budget is useful
Papessa [141]

The answer is D. All the other answers describe what a budget CAN be like, not necessarily what it is for everyone, if that makes sense.

8 0
3 years ago
The _____ is the mechanism inside a computer that actually does the arithmetic and logical operations.
dimaraw [331]

Answer:

The arithmetic/logic unit

Explanation:

The arithmetic/logic unit (ALU) contains the electronic circuitry that executes all arithmetic and logical operations. The arithmetic/logic unit can perform four kinds of arithmetic operations, or mathematical calculations: addition, subtraction, multiplication, and division.

https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading04.htm

8 0
3 years ago
In end game, should you drink a chug jug just to get an extra 25-50 shield?
antiseptic1488 [7]
Yes, It's important to do that. The more shield you have the more you stay alive between 1v1s 

Hope this helps!
3 0
4 years ago
Other questions:
  • What is deshtop in desktop publishing
    11·1 answer
  • . What are the disadvantages of using small, fixed-length cells in ATM?
    13·2 answers
  • Which statement is most likely to be true about a computer network?
    11·2 answers
  • WILL GIVE BRAINLIEST
    15·1 answer
  • 4.9 Code Practice: Question 3
    15·2 answers
  • Write down the functions of network layer in your own words.ASAP
    14·1 answer
  • Yooooooooooooooo
    5·2 answers
  • Describe all the steps a router goes through while deciding where to send the a packet. Explain why a router would choose one ro
    7·1 answer
  • The following procedure is intended to return the number of times the value val appears in the list nylist. The procedure does n
    15·2 answers
  • What is this line called that appears and disappears in the search box<br><br> WILL MARK BRAINLIEST
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!