Answer:
The correct program to this question can be given as:
Program:
//header file
#include<iostream> //include header file
using namespace std;
//main
int main() //defining method main
{
double radius,area=0; //defining variables
double PI=3.14; //defining variable PI and assign value
cout <<"Enter the radius: "; //message
cin >> radius; //input value by user
area = PI * radius * radius; //formula to calculate area
cout << "Area: "<< area << endl; //print area
return 0;
}
Output:
Enter the radius: 3.0
Area: 28.26
Explanation:
In the above program code, a header file is included. In the next line, the main method is defined, which contain three double type variable that is "radius, area, and PI".
- The radius variable is used to take input by the user, and the area variable is to calculate the area of the circle, and the PI is used to hold a constant value, which is "3.14".
- After taking user input in radius variable the area variable has used the formula of the circle, which calculates a value and in the last print, the function uses "cout", that prints area variable value.
Explanation:
omg it's Python, I don't like it
I would say the answer is 33 or 6
A central issue in the Microsoft antitrust lawsuit involved Microsoft's integration of its internet browser into its windows operating system, to be sold as one unit is a practice that is known as: C. tying.
<h3>What is an operating system?</h3>
In Computer technology, an operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, in order to manage random access memory (RAM), software programs, computer hardware and all user processes.
Microsoft was involved in an antitrust lawsuit with respect to tying the integration of its internet (web) browser into its windows operating system (OS) such as Windows 7, 8, 10, etc., in order to sell them to end users as a single unit.
Read more on operating system here: brainly.com/question/22811693
#SPJ1
Answer:
b) False.
Explanation:
Port explorers are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.
Answer:
yes administrators have to be concerned
Explanation:
It is necessary for countermeasures to be taken against DoS attacks
The types of attacks that can still occur are:
If the network connection get to be overloaded, there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.
To reduce the impact of this kind of attacks,
1. there should be enough or excess network bandwidth and distributed servers should be replicated if there is a possibility that network could get to be overloaded.
2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.
3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters
4. Use strong antivirus on computer sytems that are used to connect to the internet