1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AfilCa [17]
2 years ago
6

Write a program to calculate the area of a triangle whose base is 10cm and height is 6cm

Computers and Technology
1 answer:
Tcecarenko [31]2 years ago
7 0

Answer:

30cm

Explanation:

Height X Base

6cm X 10cm

60cm

Then take half because a triangle is half a square and we are using a square formula.

60cm divided by 2

=30cm

You might be interested in
Web and mobile applications are created for users to only read information. True False
SIZIF [17.4K]
I think it's false. It's not created just for reading.
4 0
3 years ago
Read 2 more answers
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
Galina-37 [17]

Answer:

D) Hybrid Attack

Explanation:

This type of  attack is a blend of both a dictionary and brute force attack. The meaning of this is, while a dictionary attack method would capture a wordlist of passwords, the brute-force attack would be applied to each of  password captured.

6 0
2 years ago
What do you remember about the difference between Canadian and US dollar (which one is greater)? Also, explain which online tool
Talja [164]
I’m not sure about USD but Canadian dollars are greater, one dollar CAD is equal to $0.79 US. So $10 CAD is equal to $7.90 US.
8 0
3 years ago
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to acc
abruzzese [7]

Answer:   b. LDAP injection

Explanation:

LDAP (Lightweight Directory Access Protocol ) Injection is defined as

  • an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input.
  • It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.

So,<u> LDAP injection</u> is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.

Hence, the correct option is b. LDAP injection.

4 0
2 years ago
Which type of multiplexing divides transmission opportunities into slots of 125 microseconds with position inside each slot rese
Zinaida [17]

Answer: Time division multiplexing

Explanation: because a slot is equivalent to 125ms

And each position inside a slot is for each signal and a single bit frim each voice conversation is sent during each 125ms slot

7 0
3 years ago
Other questions:
  • the piece of hardware that contains the circuitry that processes the information coming in to the computer
    13·1 answer
  • WHAT DOES THE WORD MONOCHROME MEAN?
    11·1 answer
  • 18. Using the same formatting elements and designs across slides in a presentation is important to develop?
    5·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    7·1 answer
  • Can someone please give me two (2) thesis statement for this question?
    5·1 answer
  • A program called a ( n ) ____ translates instructions written in high-level languages into machine code.
    13·1 answer
  • When you print a worksheet or use the Page Setup dialog box, Excel inserts __ breaks that show the boundaries of what will print
    7·1 answer
  • "True or False? Software designers use layering and other techniques to organize large software systems."
    13·1 answer
  • Paolo, a popular basketball player in school was asked by his coach, how is your family
    8·1 answer
  • What starts with p and ends with orn
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!