1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NemiM [27]
3 years ago
7

how to plot a trianing field (running track around football field) in matlab. Parameters are two lines and two semicircles. Each

line is 84.4m and radius of semicircle is 46.3m.
Computers and Technology
1 answer:
Morgarella [4.7K]3 years ago
4 0

Is this a question or answer? Either re-post correctly or ignore this.

You might be interested in
Given a floating-point formal with a k-bit exponent and an n-bit (fraction, write formulas for the exponent E, significant M, th
ANEK [815]

Answer:

A) Describe the number 7.0 bit

The exponential value ( E ) = 2

while the significand value ( M ) = 1.112  ≈ 7/4

fractional value ( F )  = 0.112

And, numeric value of the quantity ( V )  = 7

The exponent bits will be represented  as :  100----01.

while The fraction bits will be represented  as : 1100---0.

<u>B) The largest odd integer that can be represented exactly </u>

The integer will have its exponential value ( E ) = n

hence the significand value ( M )

=  1.11------12 = 2 - 2-n

also the fractional value ( F ) =  

0.11------12 = 1 – 2-n

Also, Value, V = 2n+1 – 1

The exponent bits  will be represented  as follows:  n + 2k-1 – 1.

while The bit representation for the fraction will be as follows: 11---11.

<u>C) The reciprocal of the smallest positive normalized value </u>

The numerical value of the equity ( V ) = 22k-1-2

The exponential value ( E )  = 2k-1 – 2

While the significand value ( M )  = 1

also the fractional value ( F ) = 0

Hence The bit representation of the exponent will be represented as : 11---------101.

while The bit representation of the fraction will be represented as : 00-----00.

Explanation:

E = integer value of exponent

M = significand value

F = fractional value

V = numeric value of quantity

A) Describe the number 7.0 bit

The exponential value ( E ) = 2

while the significand value ( M ) = 1.112  ≈ 7/4

fractional value ( F )  = 0.112

And, numeric value of the quantity ( V )  = 7

The exponent bits will be represented  as :  100----01.

while The fraction bits will be represented  as : 1100---0.

<u>B) The largest odd integer that can be represented exactly </u>

The integer will have its exponential value ( E ) = n

hence the significand value ( M )

=  1.11------12 = 2 - 2-n

also the fractional value ( F ) =  

0.11------12 = 1 – 2-n

Also, Value, V = 2n+1 – 1

The exponent bits  will be represented  as follows:  n + 2k-1 – 1.

while The bit representation for the fraction will be as follows: 11---11.

<u>C) The reciprocal of the smallest positive normalized value </u>

The numerical value of the equity ( V ) = 22k-1-2

The exponential value ( E )  = 2k-1 – 2

While the significand value ( M )  = 1

also the fractional value ( F ) = 0

Hence The bit representation of the exponent will be represented as : 11---------101.

while The bit representation of the fraction will be represented as : 00-----00.

8 0
3 years ago
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
2 years ago
Program ___________________ are written explanations that are not part of the program logic but that serve as documentation for
Aleks04 [339]

Answer:

Program Comments

Explanation:

program comments are explanations. They are not executable code and the can actually appear anywhere in your code. Their main function is code documentation for the future. In Java programming language for example three types of comments is used. These are

// Single line comments  (This starts with two forward slashes

/* Multiple Line

comment

Style*/    

The third is the javadoc that gives a description of a function. I looks like the multiple line but is has two asterics

/** This is javadoc

comment

style*/

8 0
3 years ago
Lucy was bucking for a promotion. She paid careful attention to the e-mails she sent out to make sure they did not violate netiq
salantis [7]

Answer: Include lots of exclamation marks to get your point across

Explanation:

When sending an e-mail, we should note that the subject line that should be used should be relevant with regards to the message being passed.

A spell check is also vital in order to reduce mistakes. The use of many exclamation is wrong. That's not professional and should be avoided.

7 0
2 years ago
when a sender encrypts a message using their own private key, what security service is being provided to the recipient?
Rudik [331]

asymmetric encryption

4 0
3 years ago
Other questions:
  • Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?
    15·1 answer
  • E gpa(grade point average) you need to have or you get kicked out of robotics for middle school?
    13·1 answer
  • Software is nothing but a piece of code or set of instructions written in a chip to run a hardware device on the Computer. O Tru
    14·1 answer
  • The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
    12·1 answer
  • Which of the following is NOT necessary for organizing data to make it easier to sort?
    6·1 answer
  • 8.7 Code Practice: Question 2 edhesive
    14·2 answers
  • Nicotine us a dangerous chemical found in Cigarettes; it is accompanied by two other very harmful chemicals. These are
    15·1 answer
  • Who is the father of computer?​
    14·1 answer
  • The web lab consists of which elements. Select all that apply. Group of answer choices Files Inspector Tool Preview Hints Work S
    9·1 answer
  • Password ____ traverse the network searching for passwords from remote authentication systems.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!