1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
14

Assignment 2: Room area

Computers and Technology
1 answer:
Y_Kistochka [10]3 years ago
5 0

Answer:

a = float(input("Enter Side A: "))

b = float(input("Enter Side B: "))

c = float(input("Enter Side C: "))

d = float(input("Enter Side D: "))

e = float(input("Enter Side E: "))

area1 = 1.0* a * b

area2 = (a - c) * (d - e -b)

area3 = 0.5 * (a - c) * e

print ("Room Area: " + str(area1 + area2 + area3))

Explanation:

happy to help ^3^

You might be interested in
You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your univer
inna [77]

Answer and Explanation:

  • The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.
  • The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.
  • The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.
  • The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.
  • The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.
  • The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.
8 0
3 years ago
Could it be there will be nothing like lost forever documents with programs like backupdocs.com?
katen-ka-za [31]

Answer:

Yes

Explanation:

The programs like backupdocs.com help us in storing the lost forever documents like driving license, ration card, social security number, etc., and in case they are lost you need not worry as the backup is there on the backupdocs.com. You can hence, get your lost forever documents from the backupdocs.com in case you have lost them. Hence, the fact put forward by the above question is certainly true. And backupdocs.com is a real advantage for us hence.

4 0
3 years ago
What is essential for a good study routine? Select four options.
Kipish [7]

Answer:

the answer is having an organized assignment notebook

following a realistic study schedule

realizing when and how long to study

recording due dates and tasks to be done

Explanation:

7 0
3 years ago
To arrange data in alphabetical order quickly, you can _____ the data.
Vadim26 [7]
A. Organizing the data makes it easier to to arrange anything.
7 0
3 years ago
Read 2 more answers
Secondary​ shots, used for visual interest and to smooth over​ transitions, are called​ _________ material.
kvasek [131]

Video source material that's used to fill holes in the timeline where synchronized video is not included, or as a source of supplemented footage to accompany a video sound bite, visually supports what is happening on-screen. Video footage that supports the spoken narrative but that is not synchronized with it (e.g. an establishing shot of a scene that appears on screen while the narrator or reporter's voice introduces the story)

6 0
3 years ago
Read 2 more answers
Other questions:
  • Consider a load-balancing algorithm that ensures that each queue has approximately the same number of threads, independent of pr
    14·1 answer
  • FAST ANSWER I NEED FOR APEX NOW!!!!!!!!!!!!!!!
    5·2 answers
  • Variable costs are __________.<br><br> A. decreasing<br> B. increasing<br> C. static
    10·1 answer
  • What skills do you need to be a marketing manager
    10·2 answers
  • A(n) ________ is a text or image that allows the user to access that file or web page with a single click.
    15·2 answers
  • Collaborative devices are web and mobile applications that allow users to share files, meet virtually in real-time, and assign t
    9·2 answers
  • What objective behaves like a high level array
    11·1 answer
  • Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based
    10·1 answer
  • Answer this if you can help me!
    11·2 answers
  • 1. While researching online, you come across an article that prominently displays the author's name. This source is likely to ha
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!