1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shutvik [7]
3 years ago
8

Hi I am Khine Mye and I want to ask you a question I don't know that is square root of 2 is 1.4 and how to get that 1.4 and plz

explain me step by step​
Computers and Technology
1 answer:
MrRissso [65]3 years ago
3 0

Divide the radicand into groups of two, starting

from the decimal point and going in either

direction. For rational radicands, add pairs of

zeroes to the right of the decimal point as

needed. If the number is irrational, you already

have an infinite sequence of pairs. Now that the

radicand is marked off in pairs, forget the

decimal point (except in the answer). Call each

new digit of the approximation D, and the

current best approximation of the square root R.

Find the largest integer whose square is less

than or equal to the leftmost group. Since

groups are at most two digits long, the integer

is one digit long: in this case, the leftmost group

is 2, so we begin with D = 1, R = 1.

2 -1 = 1, append the next pair of digits, giving

100.

Find the largest digit D such that D*(20*1+D) is

less than or equal to 100.

(HINT: estimate D by dividing 20*1 into 100 -

this approach might overestimate.)

The result is 4*(20*1+4) = 4*24 = 96, so D = 4, R

= 1.4.

100 - 96 = 4, append next pair of digits, result is

400.

400/(20*14) = 1 + fraction, 1*(20*14+1) =

%3D

1*281, so D = 1, R = 1.41.

400 - 281 = 119, appending next pair yields

11900.

11900/(20*141)

= 4 + fraction, 4*(20*141+4) =

4*2824 = 11296, so D = 4, R = 1.414, etc. etc.

What justifies this?

Suppose we know R, the best N-digit

approximation from this algorithm. Then the

next approximation will be 10*R + D, and D must

be the largest digit that satisfies

10R + D)? = (100R? + 20RD + D² )

(= 100R? + D(20R+ D) < radicand

You might be interested in
When you select Insert and click on a shape the mouse pointer turns into a/an
o-na [289]
The answer to this is C I-beam 
6 0
4 years ago
Read 2 more answers
In which career does the level of education vary the most?
Ksenya-84 [330]
Journalism
all the best
3 0
3 years ago
Read 2 more answers
Cable television, as well as some networks, uses ________ cable.
guajiro [1.7K]
The answer is Coaxial Cable
7 0
3 years ago
Which function in spreadsheet software can be used to predict future sales or inventory needs?
melisa1 [442]
create a forecast, Excel creates a new worksheet that contains both a table of the historical and predicted values and a chart that expresses this data. A forecast can help you predict things like future sales, inventory requirements, or consumer trends.
6 0
3 years ago
Read 2 more answers
TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals
Law Incorporation [45]

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

5 0
3 years ago
Other questions:
  • Wich type of operating system is usually used in personal computers
    6·2 answers
  • In an array based implementationof a queue a possible solution to dealing with the full condition is to
    14·1 answer
  • What kind of word is the pronoun in bold letters?
    5·2 answers
  • The part of the computer that provides access to the Internet is the
    11·1 answer
  • URGENT!!!
    9·1 answer
  • JUST NEED TO KNOW WHO ALL DOSE EDGINUITY
    12·2 answers
  • Cuáles eran las condiciones de vida de las mujeres durante el renacimiento perduran​
    14·1 answer
  • Which of these is an example of a system?
    7·1 answer
  • The PowerPoint view in which you can edit the slide master is called ______________.
    7·1 answer
  • After a group sets a project schedule, members should be prepared to
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!