B. Percent of patches applied in the past 30 days
Answer:
The correct program to this question can be given as:
Program:
//header file
#include<iostream> //include header file
using namespace std;
//main
int main() //defining method main
{
double radius,area=0; //defining variables
double PI=3.14; //defining variable PI and assign value
cout <<"Enter the radius: "; //message
cin >> radius; //input value by user
area = PI * radius * radius; //formula to calculate area
cout << "Area: "<< area << endl; //print area
return 0;
}
Output:
Enter the radius: 3.0
Area: 28.26
Explanation:
In the above program code, a header file is included. In the next line, the main method is defined, which contain three double type variable that is "radius, area, and PI".
- The radius variable is used to take input by the user, and the area variable is to calculate the area of the circle, and the PI is used to hold a constant value, which is "3.14".
- After taking user input in radius variable the area variable has used the formula of the circle, which calculates a value and in the last print, the function uses "cout", that prints area variable value.
Answer:
or formatting marks are characters for content designing in word processors, which aren't displayed at printing. It is also possible to customize their display on the monitor. The most common non-printable characters in word processors are pilcrow, space, non-breaking space, tab character etc.
Explanation:
Answer: Using imread command
Explanation:
For loading images in matlab we can use the imread command. Some example regarding how to use the code is as follows:
A = imread('ball.tif');
Here suppose the image file name is saved as ball and is in tif format. Here the image is stored in an array named A.
We can view the image using
imshow(A);
Answer:
1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.
2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.
3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got sc/mmed it might apply to this question