1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
4 years ago
12

Simple geometry can compute the height of an object from the the object's shadow length and shadow angle using the formula: tan(

angleElevation) = treeHeight / shadowLength. Given the shadow length and angle of elevation, compute the tree height.
Sample program:

#include
#include

int main(void) {
double treeHeight = 0.0;
double shadowLength = 0.0;
double angleElevation = 0.0;

angleElevation = 0.11693706; // 0.11693706 radians = 6.7 degrees
shadowLength = 17.5;

printf("Tree height: %lf\n", treeHeight);

return 0;
}
Computers and Technology
1 answer:
irakobra [83]4 years ago
6 0

Answer:

#include

#include

int main(void) {

double treeHeight = 0.0;

double shadowLength = 0.0;

double angleElevation = 0.0;

angleElevation = 0.11693706;

// 0.11693706 radians = 6.7 degrees

shadowLength = 17.5;

treeHeight =angleElevation * shadowLength

printf("Tree height: %lf\n", treeHeight);

return 0;

}

Explanation:

since we are given the angle of elevation (6.7 degrees) and shadow length (17.5), we simply add the statement treeHeight =angleElevation * shadowLength to compute the tree hieght using the given formular

You might be interested in
What is two examples of software and hardware?​
yanalaym [24]

Answer:

Hardware Software

If hardware is damaged, it is replaced with new one. If software is damaged, its backup copy can be reinstalled.

Ex: Keyboard, Mouse, Monitor, Printer, CPU, Hard disk, RAM, ROM etc. Ex: Ms Word, Excel, Power Point, Photoshop, MySQL etc.

Explanation:

5 0
3 years ago
Read 2 more answers
Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
BabaBlast [244]

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

5 0
3 years ago
Which wireless technology has a typical transfer rate of 1 Mbps to 3 Mbps at distances up to about 10 meters?
PtichkaEL [24]

Answer:

Bluetooth

Explanation:

Bluetooth is a wireless technology which has a transfer rate of 1 Mbps to 3 Mbps that to up to the distance of 10 meters.

In 2000's Bluetooth was used to exchange data without using wires or cables over short distances.

Nowadays it is not used to exchange data.There are more faster technologies present to do that now.But it is still popular to devices like speakers,headphones etc which can be connected by Bluetooth without using wires.

It uses UHF radio waves.

5 0
4 years ago
What key will cause the windows boot manager to appear as long as it is pressed during the windows startup process?
Zigmanuir [339]
The <span>key that will cause the windows boot manager to appear as long as it is pressed during the windows startup process is the S</span>pacebar.  T<span>he </span>spacebar<span>  or </span>space bar<span> is a long horizontal key on the lower edge of a keyboard that is always the largest and longest key on the keyboard.</span>
7 0
3 years ago
A scale model that proves the initial concept is called a
vlabodo [156]

Answer:

Domain model.

Explanation:

A domain model is a type of conceptual model used to show the structural elements and their conceptual constraints within a domain of interest. A domain model will include the various entities, their attributes and relationships, plus the constraints governing the conceptual integrity of the structural model elements comprising that problem domain.

7 0
3 years ago
Other questions:
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • Rachel uses a word processor to write short stories. However, most of her time is spent toying with the keys, rather than in wri
    13·2 answers
  • All of the following are guidelines for maintaining an engineering notebook EXCEPT
    7·1 answer
  • HELP ME FAST???
    15·1 answer
  • Cameron is having a party and needs to write step-by-step directions on the invitation. Which type of list would you
    11·1 answer
  • Match the data-management concepts to their meanings.
    12·1 answer
  • Need answer ASAP!!!!
    7·1 answer
  • Someone please help ASAP will brainlist
    9·2 answers
  • Important of microcomputer in some point​
    9·2 answers
  • What is the advantage of learning through story compared to learning through personal experience?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!