1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NemiM [27]
3 years ago
7

how to plot a trianing field (running track around football field) in matlab. Parameters are two lines and two semicircles. Each

line is 84.4m and radius of semicircle is 46.3m.
Computers and Technology
1 answer:
Morgarella [4.7K]3 years ago
4 0

Is this a question or answer? Either re-post correctly or ignore this.

You might be interested in
The operating systems, and utility programs that perform system
Phantasy [73]

Answer:

System softwares.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Utility software.

II. System software.

The operating systems, and utility programs that perform system maintenance and protection tasks such as error correction and backup are called system softwares.

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

On the other hand, a utility software can be defined as a software application or program designed to add more functionality to a computer system, as well as to improve its performance efficiently. Some examples of commonly used utility tools in computer are file and folder backup tools, file management, antivirus, hard disk diagnostics, registry cleaner, network performance monitor, screensavers etc.

4 0
2 years ago
Consider a binary search tree where each tree node v has a field v.sum which stores the sum of all the keys in the subtree roote
AVprozaik [17]

Answer:

Each time you insert a new node, call the function to adjust the sum.

This method has to be called each time we insert new node to the tree since the sum at all the

parent nodes from the newly inserted node changes when we insert the node.

// toSumTree method will convert the tree into sum tree.

int toSumTree(struct node *node)

{

if(node == NULL)

return 0;

// Store the old value

int old_val = node->data;

// Recursively call for left and right subtrees and store the sum as new value of this node

node->data = toSumTree(node->left) + toSumTree(node->right);

// Return the sum of values of nodes in left and right subtrees and

// old_value of this node

return node->data + old_val;

}

This has the complexity of O(n).

Explanation:

6 0
3 years ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
3 years ago
Coordinates that measure how far a point is from the origin are _______________. A. Relative coordinates B. Absolute coordinates
S_A_V [24]
The correct answer is B
4 0
3 years ago
Read 2 more answers
When creating a presentation in Libre Office Impress, where does the editing of slides take place?
kondor19780726 [428]
The Canterbury Tales, written towards the end of the fourteenth century by Geoffrey Chaucer, is considered an estates satire because it effectively criticizes, even to the point of parody, the main social classes of the time. These classes were referred to as the three estates, the church, the nobility, and the peasantry, which for a long time represented the majority of the population.
4 0
3 years ago
Other questions:
  • You have two LANs connected via a router. Network 1 has a DHCP server with a single Ethernet interface. Network 2 does not have
    9·2 answers
  • An example of an email client is:<br> A.)Yahoo<br> B.)Gmail<br> C.)Outlook<br> D.)All of the Above
    9·1 answer
  • Which program can damage your computer
    13·2 answers
  • Write a sentence about a mineral you use and how you use it
    12·1 answer
  • Budgets help you to do all of the following expect
    15·2 answers
  • Please Do Solve it guys...
    6·1 answer
  • The computer output for integer programs in the textbook does not include reduced costs, dual values, or sensitivity ranges beca
    14·1 answer
  • What is the encryption cipher that was the precursor to des??
    5·1 answer
  • What do level meters show?
    8·1 answer
  • Write a program in python to test if given number is prime or not.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!