1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
11

Write a computer program that computes the duration of a projectile’s flight and its height above the ground when it reaches the

target. As part of your solution, write and call a function that displays instructions to the program user. Note: Include functions in your program. Problem Constant G = 32.17 // gravitational constant Problem Inputs float theta // input - angle (radians) of elevation float distance // input - distance (ft) to target float velocity // input - projectile velocity (ft/sec) Problem Outputs float time // output - time (sec) of flight float height // output - height at impact
Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
7 0

Answer:

#include <stdio.h> #define Gray 32.17 /* gravitational constant */ #include <math.h> /*cos definition*/ #define PI 3.14159265

int main(void) double Theta; /*input-angle(radians)of elevation*/ double Distance; /*input-distance (ft) to target */ double Velocity; /*input-projectile velocity (ft/sec)*/ double Time; /* output-time(sec) of flight*/ double Height; /*output-height at impact*/

printf("Enter Distance> "); scanf("%f", &Distance);

printf("Enter Radians> "); scanf("%f", &Theta);

printf("Enter Velocity> "); scanf("%f", &Velocity

Time = Distance / (Velocity * cos(Theta*PI/180.0) ) ;

Height = (Velocity *sin(Theta*PI/180.0)*Time) - Grav*(Time* Time) );

printf("The time of flight is %.3f seconds.\n", Time); printf("The height at impact is %.3f feets.\n", Height);

system("pause");

return (0);

You might be interested in
What are the three business writing formats
Tasya [4]
They are Block, Modified Block, and Semi - Block Styles. Hope this Helps:)))
8 0
3 years ago
Assume that Publication is the root class of an inheritance tree. You want to form a linked list of different publications in th
Westkost [7]

The best way to create a linked list using PublListNode and Publication classes is the use of the PublListNode class contains the Publication class.

<h3>What is a root class?</h3>

A root class is known to be inherited and it is one that defines an interface and behavior that are specific to all objects in any given hierarchy.

Note that The best way to create a linked list using PublListNode and Publication classes is the use of the PublListNode class contains the Publication class.

See options below

A.

The PublListNode class contains the Publication class.

B.

The Publication class is derived from the PublListNode class.

C.

The PublListNode class is derived from the Publication class.

D.

The Publication class contains the PublListNode class.

Learn more about root class from

brainly.com/question/14551375

#SPJ1

5 0
2 years ago
Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
Artyom0805 [142]

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

3 0
3 years ago
How to use 2 tabs at once on my Lenovo yoga book?​
svp [43]
To turn on Multi-window: Method 1: Swipe up from the bottom of Home screen to show Bottom switch, touch Multi-wins. Method 2: Tap Settings on Home screen, tap Multi-window, check Multi-window on the right.
3 0
3 years ago
What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
ale4655 [162]

Answer:

/etc/yum.conf

Explanation:

The absolute pathname for YUM is /etc/yum.conf. The configuration file For yum and related utilities can be found there. The file has one compulsory section, and this section can be used to place Yum options with global effect, it could also have one or more sections, that can enable you to set repository-specific options.

4 0
4 years ago
Other questions:
  • Advancement in technology is making peripherals...
    5·2 answers
  • What type of data can we enter in a spreadsheet?
    11·1 answer
  • 1. compression
    11·1 answer
  • The building blocks of coded language are called
    11·2 answers
  • Richard needs to copy information from another slide presentation that uses a different design template. To ensure that the info
    10·1 answer
  • Rewritable (write, erase, write again) is known as _______.
    7·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    15·1 answer
  • DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/python
    11·1 answer
  • Nia is editing a row in an Access table. The row contains the Pencil icon on the left end of the record
    12·2 answers
  • You have implemented an access control method that only allows users who are managers to access specific data. Which type of acc
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!