1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
3 years ago
13

Simple geometry can compute the height of an object from the object's shadow length and shadow angle using the formula: tan(angl

eElevation) = treeHeight / shadowLength. 1. Using simple algebra, rearrange that equation to solve for treeHeight. (Note: Don't forget tangent). 2. Complete the below code to compute treeHeight. For tangent, use the tan() function, described in the "math functions" link above.
Computers and Technology
1 answer:
KatRina [158]3 years ago
6 0

Answer:

1. Modified formulae for calculating tree height.

treeHeight = tan(angleElevation)\times shadowLength.

2. C++ program to calculate tree height.

#include<iostream>

#include<math.h>

using namespace std;

int

main ()

{

 double treeHeight, shadowLenghth, angleElevation;

 cout << "Please enter angle of elevation and shadow length" << endl;

 cin >> angleElevation;

 cin >> shadowLenghth;

 

 //Modified formulae to calculate tree height.

 treeHeight = tan (angleElevation) * shadowLenghth;

 cout << "Height of tree is:" << treeHeight;

}

Output:

Please enter angle of elevation and shadow length

45

12

Height of tree is:19.4373

Explanation:

Since no programming language is mentioned, so solution is provided using C++.

In the above C++ program, first angle of elevation and length of shadow provided by user will be stored in variables angleElevation and shadowLength.

Then using  the modified formalue height of tree will be  calculated and stored in variable treeHeight. Final result is displayed to user.

You might be interested in
What time is it in Ohio?
skad [1K]
Geographically, the state of Ohio falls within the lines of latitude of 75 °W and 90 °W. The timezone corresponding to this portion of the globe is eastern standard time (EST). The prime meridian at 0 °, has the timezone greenwich mean time (GMT) from which all other timezones are referenced. And eastern standard time, local time in Ohio, will be 5 hours behind GMT.
5 0
3 years ago
Read 2 more answers
A drink costs 3 dollars. A pizza costs 6 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dr
steposvetlana [31]

I think it's correct

.

.

.

.

.

.

.

.

.

5 0
2 years ago
A final class can't be extended.TrueFalse
PIT_PIT [208]

Answer:

True

Explanation:

A final class is something like sealed one and no one can inherit that further.

it is useful to lock our code or functionality from others

4 0
3 years ago
When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed ha
stira [4]

When you first purchase a notebook, make sure you have a RECOVERY CD. It enables the restoration of the notebook computer.

A recovery disc is a disc that enables to restore the computer to the same condition when it was bought.

Moreover, a recovery drive refers to a separate partition in the notebook that must contain the required files to restore the device if the system becomes unstable.

A recovery disc can be considered as a drive used to keep a backup of the files (e.g., images) and other types of restoration data.

Learn more about recovery disc here:

brainly.com/question/14217813

5 0
3 years ago
Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement
Salsk061 [2.6K]

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Monica needs a printer to use at home. She wants fine-quality prints at an affordable cost. Which printer will help her achieve
    9·1 answer
  • What are the cause of eye strain during computer usage?
    7·1 answer
  • Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
    6·1 answer
  • • What is the difference between primary storage, secondary storage, and off-line storage
    10·1 answer
  • Retraining is required at intervals of ___ or less.
    10·1 answer
  • What features are offered by most of the email programs with for receiving and sending messages?
    10·1 answer
  • 1. A database table can hold ??
    9·1 answer
  • Blender is used by which video game team member?
    15·1 answer
  • Reading (BCK FORM 2C IT 2020-2021)
    12·2 answers
  • What is printed when the following code has been executed?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!