1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
15

Select the correct answer. Which type of software do you generally not need to pay for? A. software available online B. closed-s

ource software C. open-source software D. commercial software
Computers and Technology
1 answer:
Alex3 years ago
5 0

Answer:open-source software

Explanation:

You might be interested in
Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as
Lunna [17]

Answer:

The java program is as follows.

import java.lang.*;

public class Triangle

{

   //variables to hold sides of a triangle

   static double height;

   static double base;

   static double hypo;

   //method to compute hypotenuse

   static double rightTriangle(double h, double b)

   {

       return Math.sqrt(h*h + b*b);

   }

public static void main(String[] args) {

    height = 4;

    base = 3;

    hypo = rightTriangle(height, base);

 System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);

}

}

OUTPUT

The hypotenuse of the right-angled triangle is 5.0000

Explanation:

1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.

2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.

3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.

4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().

5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.

6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.

7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.

8. In java, all the code is written inside a class.

9. The name of the program is same as the name of the class having the main() method.

10. The class having the main() method is declared public.

11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.

4 0
3 years ago
Name the six parts of the product development life cycle.
Nuetrik [128]

Answer:

Development, Introduction, Growth, Maturity and Decline.

Explanation:

5 0
3 years ago
Read 2 more answers
For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
Paul [167]

Answer:

  • Interactive media
  • Information services and support
  • Programming and software development
  • Network systems administration

Explanation:

The company has finished designing a software program, but users aren’t sure how to use it. <u>interactive media</u>

Several people in the human resources department need new software installed. <u>information services and support</u>

An employee has an idea for a software program that can save the company time, but doesn’t know how to write it. <u> programming and software development</u>

A new branch of the company is opening soon, and the computers there need to be connected to the Internet. <u>network systems administration</u>

<u>OAmalOHopeO</u>

3 0
3 years ago
What does the binary code 01101000 01100101 01101100 01101100 01101111 00100000 01101101 01111001 00100000 01100110 01110010 011
BigorU [14]

Answer:

hello my friend

6 0
3 years ago
Read 2 more answers
Public abstract class Playerpublic class ComputerPlayer extends Player;public class SmartComputerPlayer extends ComputerPlayer;C
ZanzabumX [31]

Here's the full question;

<em>Assume the following partial declarations have been made, with default (no parameter) constructors for the classes.</em>

<em />

<em>public abstract class Player</em>

<em>public class ComputerPlayer extends Player;</em>

<em>public class SmartComputerPlayer extends ComputerPlayer;</em>

<em />

<em>Consider the following declarations.</em>

<em />

<em>I. ComputerPlayer playerA = new SmartComputerPlayer();</em>

<em>II. Player playerB = new SmartComputerPlayer();</em>

<em>III. Player playerC = new Player();</em>

<em />

<em>Which of these declarations will compile correctly?</em>

A.) I only

B.) II only

C.) III only

D.) I and II

E.) II and III

<u>Answer:</u>

<u>C)</u>

Explanation:

One of the rules of Java programming is that it must have a class which is a blueprint that informs about the behavior that the object of that class support.

If we go by the strict rules of Java programming only the class declaration;

Player playerC = new Player();

would compile correctly.

All other options would result in compiler error.

6 0
3 years ago
Other questions:
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • ( answer goes here) are pictures that you can click on to tell your computer what to do.
    10·2 answers
  • Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
    12·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    9·2 answers
  • Which of the follow represents a form of disruptive technology? Tend to open new markets and destroy old ones A new way of doing
    11·1 answer
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • Public classes are accessible by all objects, which means that public classes can be ____, or used as a basis for any other clas
    10·2 answers
  • If the old and new systems are operated side by side until the new system has proven itself, this type of system conversion plan
    11·1 answer
  • Write a script that inputs a line of encrypted text and a distance value and outputs plaintext using a Caesar cipher. The script
    11·1 answer
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!