1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kazeer [188]
4 years ago
15

Write a C++ program that computes an approximation of pi (the mathematical constant used in many trigonometric and calculus appl

ications) to four decimal places. A summation that can be used to compute pi is the following (from calculus). pi = 4/1 - 4/3 + 4/5 - 4/7 + 4/9 - ....... + (-1)ⁿ * 4/ (2n+1)Your program will compute a sequence of computations: S₀ = 4/1 S₁ = S₀ - 4/3 S₂ = S₁ + 4/5Since the above sequence So, S1, S2, ... converges to pi, we can stop when two consecutive S values differ by less than 0.00005.
Computers and Technology
1 answer:
Verizon [17]4 years ago
3 0

Answer:

#include <iostream>

#include<cmath>

using namespace std;

int main()

{

double total = 0;

double check=1;

double ct=0;

double old=1;

while( fabs(total - old) > 0.00005 )

{

old=total;

total=total+check*4.0/(2.0*ct+1);

ct=ct+1;

check=0.0-check;

}

cout<<"Approximate value of pi is "<<total<<endl;

return 0;

}

Explanation:

  • Initialize all the necessary variables.
  • Run a while loop until the following condition is met.

fabs(total - old) > 0.00005

  • Inside the while loop calculate the total value.
  • Lastly, display the approximate value of pi.
You might be interested in
Use ordinary pipes to implement an inter-process communication scheme for message passing between processes. Assume that there a
Naya [18.7K]

Answer:

Yup

Explanation:

6 0
3 years ago
Consider the following method: public double doubleVal(double x) { return x *2; } The following code segment calls the method do
VashaNatasha [74]

Answer:

13.0

Explanation:

The method doubleVal() is created to accept a single parameter of type double.

It multiplies what ever the value of the parameter is and returns the resulting value.

In this question The method is called within this output statement System.out.println(doubleVal(val)); (Note that val had already been declared and assigned the value of 6.5)

The value 6.5 is doubled and outputed to the screen

8 0
3 years ago
Machine code and Object code is the same right?​
guapka [62]

Answer:

"True" Machine code and Object code is the same.

Explanation:

All code at the same level is considered the same code, so we can say that the machine code, byte code, and the object code with it is of the same type, all of which are considered as the lowest level associated with the common program, these are common. Also known as source code because it is used in translating different languages.

6 0
3 years ago
Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% o
insens350 [35]

Answer:

The requirement of the virtualization in the operating system:

• The virtualization of the resources from single systems input can be partitioned into a small virtual environment in multiple system data processes.

• Virtualization can collect the physical system's hardware and software data, they can transfer the virtualization process and also verify that the working system is running properly.

• Virtualization has to determine the specific components such as workload, file location, network traffic and console administration process. The requirement for moving into the virtual environment must be selected based on windows for the operating system(32-bit), windows host operating system(4-bit) and Linux operating system.

7 0
3 years ago
Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
suter [353]

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

<h3>Defenses and Browser Vulnerabilities</h3>

Java script sandboxing defense JavaScript to run in a restricted environment ("sandbox") and limit the computer resources it can access or actions it can take.

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

Java script limit capabilities restrict JavaScript to not support certain capabilities.

Find out more on browser vulnerability at: brainly.com/question/18088367

5 0
2 years ago
Other questions:
  • What is html?
    9·2 answers
  • 3.A ball is thrown into the air with an initial velocity of 15 m/s. a.How long does it take the ball to reach maximum height?b.W
    12·1 answer
  • Write a method called swapPairs that switches the order of values in an ArrayList of strings in a pairwise fashion. Your method
    9·1 answer
  • What is included on the HP PC Hardware Diagnostics 3-in-1 USB Key that allows you to recover systems that cannot boot?
    14·1 answer
  • Michael Holliday is a business systems analyst who is working on a feasibility study for a new​ e-911 system for the city of Mem
    6·1 answer
  • A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considera
    8·1 answer
  • A=3<br> b = 2<br> print (a ** b)<br> What is output?
    13·2 answers
  • Clicking the ____ opens the insert function dialog box.
    13·1 answer
  • Wyjaśnij w jaki sposób wykonuje się nitowanie zakładkowe i nakładkowe, oraz wyjaśnij na czym polega pasowanie mieszane.
    7·1 answer
  • Alexis plans to stop trading once she lose 5% of her account balance, her account balance is $215.00. How much money is she will
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!