1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
14

Write a C++ program that prompt the user to enter three points (x1, y1), (x2, y2), (x3,y3) of a triangle and

Computers and Technology
1 answer:
My name is Ann [436]3 years ago
5 0

Answer:

#include<iostream>

using namespace std;

int main(){

   int x1,x2,x3;

   int y1,y2,y3;

   cout<<"Enter the value of first point(x1,y1): ";

   cin>>x1>>y1;

   cout<<"\nEnter the value of second point(x2,y2): ";

   cin>>x2>>y2;

   cout<<"\nEnter the value of third point(x3,y3): ";

   cin>>x3>>y3;

   

}

Explanation:

first include the library iostream for use the input/output commands

then, write the main function. within the main function declare the variable which store the value of points.

after that, use the 'cout' for output. It has the function which print the value or message on the screen.

and 'cin' is used to store the value in the variable.

So, in the above code cout ask for enter the value of point and after enter value by user, cin store in the variables.

Note: you have to enter two value with space or by enter.

You might be interested in
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
Consider the following modification to the Merge Sort algorithm: divide the input array into thirds (rather than halves), recurs
ehidna [41]

Answer:

The correct answer to the following question will be "n logn".

Explanation:

  • Time Complexity should be the same as the whole last particular instance, just the log base keeps changing with three.  
  • Throughout the circumstance of separating 2 arrays, we want one correlation. however, for splitting between 3-way arrays, will require 2 comparisons to sort.
  • However, after breaking the array into 3, we can lower the number of transfers by growing the comparison. So the time complexity would then persist the same, but the log should get base 3 as we've classified into different parts.

So the time complexity will be:

⇒  T(n)=3T(\frac{n}{3})+ O(n)

⇒          =O(n \ logn) \ with \ base \ 3

7 0
3 years ago
(3 marks)
muminat

Answer: 1.5 : 1

Explanation:

The average of 92 marks for the test is a weighted average of the proportion of students in the class.

Assume boys are in the proportion, x.

(90 * x) + (95 * (1 - x)) = 92

90x + 95 - 95x = 92

-5x = 92 - 95

-5x = -3

x = -3/-5

x = 0.6

Boys are 0.6 of the class

Girls are:

= 1 - 0.6

= 0.4

0.6 : 0.4

1.5 : 1

3 0
3 years ago
What are possible consequences for cyberbullying?
BaLLatris [955]

Answer:

Possible consequences for cyber bullying include depression, isolation and illness

Explanation:

The reason for this is when a person is hurt there body tends to go through things to make them feel a certain way about things.

3 0
3 years ago
Read 2 more answers
Identity management programs often implement a _________system that facilitates the management of user accounts.
Trava [24]

Answer:

single sign-on

Explanation:

Identity management programs in computer operation involve an administrative process that is carried out by implementing a SINGLE SIGN-ON system that facilitates the management of user accounts.

The purpose is to identify, validate, and approve an individual or group of people to have permission to various applications, computer systems, or networks by linking user rights and limitations with created identities.

Hence, in this case, the correct answer is SINGLE SIGN-ON

6 0
3 years ago
Other questions:
  • Which of the following is an appropriale way to declinc an offer in a<br>professional environment?​
    13·2 answers
  • Search engines enable you to
    9·2 answers
  • Whats the difference between firms that provide services and firms that sell products?
    7·2 answers
  • DRIVER ED
    13·2 answers
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • Which statements accurately describe the Bookmark feature in the Audio/Video control bar? Check all that apply.
    13·1 answer
  • Suppose that you have been asked to create an information system for a manufacturing plant that produces nuts and bolts of many
    12·1 answer
  • Please help me answer this question
    8·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • Javier downloads an illustration from an online Image library and modifies it for his purposes. The illustration he downloads is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!