1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Travka [436]
2 years ago
12

You will create two classes, one for a box and one for a triangle. Each of the figures, the box and the triangle, will have an o

ffset telling how far they are indented from the edge of the screen. Each figure will also have a size, although the size will be determined differently for a box and a triangle. For a box, the size is given as the width and the height, expressed in the number of characters. Because characters are taller than they are wide, a box will look taller than you might expect when it is written on the screen. For a triangle, the size will be given by its base. The triangle will point up, and the base will be at the bottom. The slope of a side of the triangle is limited to what you get by indenting one character per line. So once the base is chose, you have no choice regarding what the sides of the triangle will be. We also assume that the base size of a triangle must be odd. The following shows a sample of a 5-by-5 box and a triangle with base of size 15. Assuming that the offset 10. The
Computers and Technology
1 answer:
Softa [21]2 years ago
6 0

I believe it should be

You might be interested in
How can a PowerPoint user add a shadow to a table
damaskus [11]
Https://wordribbon.tips.net/T010192_Drop_Shadows_for_Tables.html
8 0
3 years ago
Yari is having trouble determining the appropriate combination of f-stop and shutter speed for a still image he is taking. What
lapo4ka [179]
C it’s tripod that can help hair
5 0
3 years ago
MUST HELP FOR POINTS!!!!! HELP ME!!!!!!!!! I RLY NEED HELP ON THIS, plz give sincere answers that you truly believe are correct.
Damm [24]
<span>1.Integrity, positive attitude, and punctuality are considered _____personal_____ skills. 
2. Listening
3. </span><span>Dependability 
</span>4. False 
5. I am unsure of the last one but, I'm pretty sure it is academic
3 0
3 years ago
Aside from the smart cell phones used by a billion people, list and describe four
Pie
Gaming Computers- High processing speed and designed to be used for gaming.
Handheld Computers- The things that are being used by Billions of people. Firstly designed as an Internet Browser, now can be used in gaming and office purposes
Mainframe Computers- The large boxes (computers) that you see in server rooms. Designed to be used on processing large quantities of data on the same time.
Office Computers- The things you see in your office. Cheap computers that is undercut in processing speed, and designed to run Office applications.
that's​all I know. have a good day :)
5 0
3 years ago
Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
Elza [17]

Answer:

False is the correct answer for the above question

Explanation:

  • Hardware is a type of assets but its target is not for the intentional attack because it is used to make the organization
  • In any system or organization, there are two parts hardware and software and the hardware can be defined which can be touched that can be physical assets.
  • But the intentional attack is an attack that can be done from the internal source of the organization and the hardware can not do attack because it is a physical asset.
  • The above question states that the hardware is the cause of intentional attacks which is not correct as described above. Hence false is the correct answer.
6 0
3 years ago
Other questions:
  • A user can set the security and privacy settings on what is displayed in the message bar from the ________ within the options me
    8·1 answer
  • What is Napoleon's friend's name? From the Napoleon Dynamite movie.
    14·1 answer
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • What are three ways you cite evedince
    5·2 answers
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    10·1 answer
  • On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
    10·1 answer
  • How do you put a picture when you ask a question?
    6·2 answers
  • 3. Which of the following is called address operator?<br> a)*<br> b) &amp;<br> c).<br> d) %
    12·1 answer
  • Which of the following ""invisible"" marks represents an inserted tab?
    10·1 answer
  • ANs and WANs can be set up in several different shapes, also known as peripherals.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!