1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
baherus [9]
3 years ago
9

Write Python programs to solve the following two problems. Your programs should be named according to the problem descriptions a

nd pack them into a compression file.
1. Design a class Cannonball to model a cannonball that is fired into the air. A ball has
An x- and a y-position.
An x- and a y-velocity.
Supply the following methods:
A constructor with an x-position (the y-position is initially 0)
A method move(sec) that moves the ball to the next position (First compute the distance traveled in sec seconds, using the current velocities, then update the x- and y-positions; then update the y-velocity by taking into account the gravitational acceleration of -9.81 m/sec2; the x-velocity is unchanged.)
Methods getX and getY that get the current location of the cannonball
A method shoot whose arguments are the angle alpha and the y-velocity as v*sin(alpha); then keep calling move with a time interval of 0.1 seconds until the y-position is approximately 0; call getX and getY after every move and display the position; draw a figure to show the cannonball positions and trajectory.)
Use this class in a program that prompts the user for the starting angle and the initial velocity. Then call shoot. Write the file called "CannonballDemo.py" to demonstrate your program is workable.
Computers and Technology
1 answer:
netineya [11]3 years ago
7 0

no one is gonna write this for you lol, don't know why'd you take python and not pay attention.

You might be interested in
You can undo up to the most recent 40 actions by clicking the undo button.
Cloud [144]
The answer is true. The Undo command is set up on the toolbar.  You can undo up to 40 edits in your plan by clicking on the Undo button.  If you want to undo all of the revises made, simply quit (close your Internet browser window or start a new plan) without saving. 
6 0
3 years ago
Using the _______ list, you can select the number of photos that will appear on each slide.
Softa [21]

i think its D but i am not exactly sure


8 0
3 years ago
Read 2 more answers
Validation ensures that a website looks good.<br> True or False
Nezavi [6.7K]
The answer would be false. Validation doesn't have to do with a website looking good, validation is just checking the quality of the logic and backing up a statement with information that proves a statement to be true
8 0
3 years ago
As a student you are able to earn extra money by assisting your neighbors
Lorico [155]
You can just earn extra money by doing your neibors lawn
8 0
3 years ago
Read 2 more answers
when web services are offered outside the firewall, traffic is prevented from reaching the internal networks via the implementat
Tju [1.3M]

An isolated networking space or sub-network that is isolated from the rest of the organization's connected footprint using logical or physical blocks to enable access to untrusted connections in a safe environment is referred to as a demilitarized zone (DMZ).

Demilitarized zones are secluded network areas that provide as a secure link between proprietary and non-proprietary networks within an organization's perimeter. It stops unauthorized traffic from entering the internal local area network of a business. A demilitarized zone (DMZ) is a region where warring parties have agreed to put their differences aside in order to create peace. An example of a DMZ is the little sliver of territory that divides North and South Korea on the Korean Peninsula.

Learn more about demilitarized here-

brainly.com/question/7933837

#SPJ4

3 0
1 year ago
Other questions:
  • Which is the most likely problem if your computer starts up​ slowly, has many unwanted​ pop-up advertisements, and unusual hard
    5·1 answer
  • Convot the following biliary number into decimal form using any method ? (1010.100)2
    8·1 answer
  • An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True Fa
    11·1 answer
  • _____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protoc
    11·1 answer
  • AW Computing uses a private sharing model for cases. A select group of five users need read/write access to all cases with a spe
    8·1 answer
  • The light source for a typical silhouette is generally___________ the subject.
    12·2 answers
  • I really want to know the best way to deal as much heart as possible plz tell me
    7·2 answers
  • When documenting one author in reference in a text, which is correct?.
    7·1 answer
  • Q5: what is the difference between a spreadsheet and a relational database? when would you have to use a relational database ins
    5·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!