1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
devlian [24]
3 years ago
6

Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt

s the user to input the radius of a circle and outputs the area and circumference of the circle-#include {int.main()cout << "Enter the radius: ':cin >> radius;cout << endl;double radius;double area;using namespace std;return 0;cout << "Area = ' << area << endl;area - PI * radius * radius;
Computers and Technology
1 answer:
choli [55]3 years ago
8 0

Answer:

The correct program to this question can be given as:

Program:

//header file

#include<iostream> //include header file

using namespace std;

//main

int main() //defining method main

{

double radius,area=0; //defining variables

double PI=3.14; //defining variable PI and assign value

cout <<"Enter the radius: "; //message

cin >> radius; //input value by user

area = PI * radius * radius; //formula to calculate area

cout << "Area: "<< area << endl; //print area

return 0;

}

Output:

Enter the radius: 3.0

Area: 28.26

Explanation:

In the above program code, a header file is included. In the next line, the main method is defined, which contain three double type variable that is "radius, area, and PI".

  • The radius variable is used to take input by the user, and the area variable is to calculate the area of the circle, and the PI is used to hold a constant value, which is "3.14".
  • After taking user input in radius variable the area variable has used the formula of the circle, which calculates a value and in the last print, the function uses "cout", that prints area variable value.
You might be interested in
You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and
Katarina [22]

Answer:

IUYTR

Explanation:

5 0
3 years ago
in which situation, a unicast session or a multicast session, can feedback received from an rtcp packet about the session be han
nikklg [1K]

The Real-time Transport Protocol is a network protocol that enables the Voice Over Internet Protocol by delivering streaming audio and video content over the internet (VoIP).

The datagram-oriented protocol is UDP. It is thus because none of the overhead associated with creating, maintaining, and closing connections exists. A network's ability to send audio and video depends on the RTP internet protocol. Designed for reliable live data delivery, the Real-time Transport Protocol (RTP) is a network standard for sending audio or video data. It is utilized in voice over IP, video telephony, and internet telephony. In the OSI model, RTP belongs to both the Presentation Layer (Layer 6) and the Session Layer (Layer 5).

Learn more about protocol here-

brainly.com/question/27581708

#SPJ4

3 0
1 year ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
Which of the following is a feature of Big Data? Group of answer choices Its datasets are at least a petabyte in size. It is gen
Serggg [28]

Answer:

Its data sets are at least a petabyte in size.

Explanation:

Big data data sets are of huge size to perform the computations using modern techniques.

6 0
4 years ago
_____ is a valid URL, or internet address. In this URL, ______ indicates the protocol.
Natalija [7]

Answer:

1. B.http://www.example.com

2. A. http

Explanation:

7 0
3 years ago
Other questions:
  • You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching
    8·1 answer
  • In Python please:
    15·1 answer
  • You have implemented a network where each device provides shraed files with all other devices on the network. what type of netwo
    10·1 answer
  • Mary can view the thumbnails of her presentation slides when she is creating the slides. Which element of the program’s interfac
    5·2 answers
  • An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The pho
    12·1 answer
  • Why does everyone refer to dogs as being loyal
    11·2 answers
  • If a menu-driven program uses a loop to redisplay the menu after a selected operation has been performed, the menu should probab
    14·1 answer
  • A user is attempting to access a shared file locally on their workstation. The file has Full control NTFS permissions assigned,
    14·1 answer
  • Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
    8·1 answer
  • Which statement best describes network security?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!