1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AfilCa [17]
2 years ago
6

Write a program to calculate the area of a triangle whose base is 10cm and height is 6cm

Computers and Technology
1 answer:
Tcecarenko [31]2 years ago
7 0

Answer:

30cm

Explanation:

Height X Base

6cm X 10cm

60cm

Then take half because a triangle is half a square and we are using a square formula.

60cm divided by 2

=30cm

You might be interested in
WHO GIVE THE CONCEPT OF INTERNET?
viktelen [127]
Google, Apple, or even Dell
6 0
3 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
Shreya has combined all the cells in a single leftmost column in a table. Instead of identifying the category multiple times, sh
aleksklad [387]

The place where Shreya will find these options is option b: Design tab, Merge group.

<h3>What is the Design tab?</h3>

The Design tab is known to be one that is made up of table formatting, cell as well as the table borders.

It is one that has the features of arranging the table on the page, as well as the size of the table.

Hence, The place where Shreya will find these options is option b: Design tab, Merge group.

Learn more about Design tab from

brainly.com/question/2501083

#SPJ1

3 0
2 years ago
Hlo friends what is full form of RAM and ROM ​
Usimov [2.4K]

Answer:

Hello.

Explanation:

The full form of

RAM=Random Acess Memory.

ROM=Read Only Memory.

6 0
2 years ago
Read 2 more answers
Which Azure service should you use to correlate events from multiple resources into a centralized repository?
Trava [24]

Answer:

D. Azure Log Analytics

Explanation:

The Azure service we can use when you have to correlate events from more than 1 sources into a repository which is centralized you have to use Azure Log Analytics.

it is a special surrounding for Azure monitor log data.Each workspace has their own repository and configuration.

Hence we conclude that the answer to this question is option D Azure Log Analytics.

6 0
3 years ago
Other questions:
  • What kind of testing is basically checking whether a game or feature works as expected by the developers?
    10·1 answer
  • An item such as a smart card is an example of the _______ form of authentication.
    10·1 answer
  • The action in which a router divides and forwards incoming or outbound message traffic to multiple links is known as
    15·1 answer
  • How do I answer a question that was answered incorrectly on Brainly
    10·2 answers
  • ECG mashine is an example of
    12·1 answer
  • What are the values of the following expressions? In each line assume that,
    7·1 answer
  • IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
    8·2 answers
  • Choose the correct definition for Conditional Statement A. Affects the sequential flow of control by executing different stateme
    6·2 answers
  • ________________, _______________ and ___________ are what you see when you open Excel
    14·2 answers
  • What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!