Answer:
#include <iostream>
using namespace std;
int main()
{
float radius = 5.4;
float circumference = 2 * 3.14 * radius;
float area = 3.14 * radius * radius;
cout<<"the circumference of the circle is "<<circumference<<endl;
cout<<"the area of the circle is "<<area<<endl;
return 0;
}
Explanation:
Include the library iostream for using the input/output instructions.
create the main function and define the variable with value. Then,
use the formula to calculate the circumference and are of circle.


here, choose 
after that, display the result.
Note: All variable define in float type.
In fact, at the lowest level, computers only understand sequences of numbers that represent operational codes (op codes for short). On the other hand, it would be very difficult for humans to write programs in terms of op codes
In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.
<h3>What is this stage about?</h3>
This is known to be the phases of development where there is Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.
Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.
Learn more about Analysis phase from
brainly.com/question/13897351
#SPJ1
The answer is (B) delete a program from the hard drive.
The task manager enables you to monitor processes, applications and services currently running on your computer. You can use it to start and stop programs and processes. In addition, you can use the task manager to show informative stats about your PC’s performance and network.
With this kind of information always listed at the bottom of the windows task manager, you will be able to know whether your computer is working hard or hardly working. To delete a program from the hard drive, you have to go to the control panel to uninstall an application properly.
Answer: C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints
Explanation:
Option A is incorrect. There's no information on the speed and analysis of the fingerprint.
Option B is incorrect. No information regarding computer installation was given in the passage.
Option C is correct. With the information, it can be concluded that it is impossible for a top hacker to have access to the protected computer.
Option D is Incorrect. Information regarding time and investment costs that were incurred during the software development wasn't given in the passage
Option E is Incorrect. The passage didn't give information on the errors that the software produced.