1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
4 years ago
15

A friend asks you for help writing a computer program to calculate the square yards of carpet needed for a dorm room. The statem

ent "the living room floor is rectangular" is an example of a(n) . The length and width of the room are examples of information, which you can obtain as from the user.
Computers and Technology
1 answer:
quester [9]4 years ago
4 0

Answer:

A friend asks you for help writing a computer program to calculate the square yards of carpet needed for a dorm room. The statement "the living room floor is rectangular" is an example of a(n) <u>assumption</u> . The length and width of the room are examples of <u>known</u> information, which you can obtain as <u>input</u> from the user.

Explanation:

The given question is a Problem statement.

Problem statement can be defined as the brief description of an issue that needs to be focused in order to reach the require goal.

So the parts that a problem statement may have include:

  • facts and figures (assumptions), that are known in the given scenario.
  • data required (solution)to be calculated by focusing on present assumptions (given as input by the user).

So the attributes to be filled into blanks of given statement are assumption, known, input.

i hope it will help you!

You might be interested in
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:
Ainat [17]

Answer:

C

Explanation:

5 0
3 years ago
What type of device is characteristic of an enterprise environment?
Nitella [24]
A workstation used at an engineering firm.
8 0
4 years ago
Implement a 3-bit counter that counts in two different orders. Your circuit should have a Button named CLK, a Button named RESET
ss7ja [257]

Answer:

gfhfidusbifhgseliuggbdsdbdf

Explanation:

5 0
3 years ago
Which family does Ms word 2007 belongs to?​
kari74 [83]

Explanation:

Ms word 2007 belongs tt the family of Microsoft office.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Why does hamlet want to kill himself and what stops him from doing that?
    10·1 answer
  • Which term refers to the technical structure of the software, how users interact with the software, and how the software is phys
    10·1 answer
  • The Printer Event 1 P1 requests and is allocated the printer R1. 2 P1 releases the printer R1. 3 P2 requests and is allocated th
    10·1 answer
  • Which of the following statements are valid in Java? (Assume that console is Scanner object initialized to the standard input de
    15·1 answer
  • What command is used to locate all occurrences of the word "dog" in a document?
    10·2 answers
  • Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software
    5·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • What is characteristic of the Computer?
    11·2 answers
  • The Next Einstein Initiative and the ________ Institute for Mathematical Sciences bring bright young learners and the best lectu
    15·1 answer
  • Write a one register parameter procedure that converts an ASCII digit in AL to its corresponding binary value. If AL already con
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!