1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
15

Write a C++ program that prompt the user to enter v in meter/second(m/s) and the acceleration in a in meters/second squared (m/s

^2), and displays the minimum runway length.
Computers and Technology
1 answer:
GaryK [48]3 years ago
5 0

Answer:

following are the code in c++

#include<iostream> // header file

#include<math.h>

using namespace std;

int main() // main function

{

   double v,a,len;// declaring variable

   cout<<" Enter v: ";

   cin>>v;

   cout<<" Enter a:";

   cin>>a;

   len=pow(v,2)/(2*a); // to calculate the minimum runway length.

   cout<<" The minimum runway length is :";

   cout<<len;

   return 0;

}

Explanation:

In this program we taking two user input in the variable v and a respectively.After that we using the formula len=v*v/2*a to calculate the minimum runway length and finally print len which display the minimum runway length.  .

output

Enter v: 60

Enter a: 3.5

The minimum runway length is :514.286

You might be interested in
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
1. In which generation were semiconductor memories used for the first time:
Llana [10]

1: D. Third Generation

2: C. 10

4 0
4 years ago
AP CSA help needed. Java please.
leva [86]
#include using namespace std;int main(){int year = 12,value = 10,total = 0;do{year++;value *= 2;total += value;}while(value*2 < 1000);cout << "Age: " << year << endl;cout << "Last gift: " << value << endl;cout << "Total: " << total << endl;cin.get();return 0;
5 0
2 years ago
List 2 negative impacts of cybersecurity.<br><br><br><br>Answer and I will give you brainiliest ​
Nitella [24]

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

5 0
3 years ago
What is one of the key components of a typical formula?
hoa [83]

A formula key components are:

  • Functions
  • References
  • Operators
  • Constants.

<h3>What is a formula?</h3>

This is known to be a kind of mathematical relationship or rule that is said to be expressed in form of symbols.

Therefore, A formula key components are:

  • Functions
  • References
  • Operators
  • Constants.

Learn more about formula from

brainly.com/question/2005046

#SPJ11

4 0
2 years ago
Other questions:
  • What registry file contains installed programs' settings and associated usernames and passwords?​?
    13·1 answer
  • Select the correct answer. Which character type is usually seen more often in games for young children than for the other age gr
    13·1 answer
  • An ______ search is when the buyer looks for information beyond personal knowledge to help make the buying decision, such as che
    10·1 answer
  • PLEASE HELP!!!!!!!!!!!
    15·2 answers
  • To aid Android app developers, who must account for multiple screen sizes and resolutions, Android has introduced the ____, whic
    15·1 answer
  • HELP 25 POINTS!!!!!
    6·2 answers
  • Write and test a Python program to find and print the largest number in a set of real (floating point) numbers. The program shou
    5·1 answer
  • The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs. Gr
    8·1 answer
  • What is the best resource to learn python?
    14·2 answers
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!