1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
10

Wendy wants to learn how to write a computer program that can get the dimensions of a rectangle from the user and then tell the

user what the area of the rectangle is. Which of these should Wendy research?
A
binary code for area

B
algorithms for finding the area

C
input devices for area determinations
Computers and Technology
2 answers:
otez555 [7]3 years ago
4 0

Answer:

algorithms for finding the area

Explanation:

you need algorithms to find out any computer input information.

serious [3.7K]3 years ago
4 0

Answer:

algorithms for finding the area

Explanation:

for shapes like rectangle or square or more.

You might be interested in
Flexplace and telecommuting are similar in that both allow you to _____. work in a location away from the office work different
viva [34]
Flexplace and telecommuting are similar in that both allow you to work in a different location four days a week. 
3 0
3 years ago
pen the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if
zysi [14]

Answer:

Packets with unknown source addresses will be dropped.

Explanation:

This question is incomplete, we must add the number "1" in Fa0/1.

Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

There are four options:

- A notification is sent.

- A syslog message is logged.

-The interface will go into error-disabled state.

- Packets with unknown source addresses will be dropped.

In this specific example, we have configured a security protection mode, if there is an unknown MAC address,  every package will be dropped.

We can configure in our switch with different Mac address, if there is not a MAC address in our configuration, the security mode will active, and we could receive any package.

5 0
3 years ago
(tco 8) when asp.net receives a request for an application that uses forms-based authentication from a user who hasn't been auth
leonid [27]
Hi,

This what you are looking for: "records incorrect prompt"

Hope this helps.
r3t40
7 0
3 years ago
While waiting to be seated at a restaurant, Jason receives a customer loyalty coupon through an app on his mobile phone for half
Tamiku [17]

Answer:

Excite

Explanation:

The 4E framework objectives are:

EXCITE: customer are excited with relevant offer

EDUCATE: customer are educated about ongoing offers

EXPERIENCE: customer experience is improved with regards to the product

ENGAGE: customer is engaged to share feedback.

The use of location-based software application will help Jason to be excited. In this case Jason will be excited about the offer.

6 0
3 years ago
What do Business Analysis workers do? Check all that apply.
nlexa [21]

Answer: Recommend solutions to problems & Analyze information and problems.

A business analyst is a person that takes a look at a company's current system and tries to understand how the company works. These analyst seek to find out how the company will be in the future. Their main job is actually to oversee the different projects done by the company and analyze the different projects to determine if it would benefit the company or not.

Since business analysts thrive to understand their company's system, they are often the people who find information and problems that the company may have in the present or in the near future. These workers also recommend solution to problems that the company may have. The analysts are also often working with the IT departments of companies to help with the moving forward of the company's current system.

7 0
3 years ago
Read 2 more answers
Other questions:
  • ________ sets up a point-to-point connection between two computer systems over an Internet Protocol (IP) network. A. Point-to-Po
    15·1 answer
  • Which of the following refers to semitransparent text or a faint object that appears
    15·1 answer
  • What is the accounting equation?
    12·1 answer
  • What is the effect of this line of CSS code?
    15·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • What effect does screen resolution have on how graphics are displayed?
    7·1 answer
  • Importing data is sending data to a new file.Is this true or false
    10·2 answers
  • An HTML document is composed of ______ that represent distinct items in the Web Page, such as a paragraph, the page heading, or
    9·1 answer
  • In discussing inventory, Helena mentions that bikinis for sale on the website are not always in stock. Say customer feedback ind
    15·1 answer
  • Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!