1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
chubhunter [2.5K]
3 years ago
9

Write an algorithm for a program which inputs the lengths a, b and c of the three sides of a triangle. The program then determin

es whether the triangle is right-angled and prints out a message to say whether or not the triangle is right angled. You may assume that a is the longest side.
Computers and Technology
1 answer:
svetoff [14.1K]3 years ago
7 0

Answer:

Algorithm:

Step 1: Start

Step 2: Declare variables a,b,c

Step 3: Input a,b,c

Step 4: If a^2 == b^2 + c^2

                  Display "The triangle is right angled"

            Else

                  Display "The triangle is not right angled"

Step 5: Stop

Explanation:

A triangle is right angled if the square of the largest side equals the sum of the square of the other two sides

The algorithm will be based on the above analysis.

This indicated the start of the algorithm

Step 1: Start

This declares required variables

Step 2: Declare variables a,b,c

This gets values for the declared variables

Step 3: Input a,b,c

This checks for the condition to determine right angled triangle

Step 4: If a^2 == b^2 + c^2

If true, this message that states the triangle is right angled is printed

                  Display "The triangle is right angled"

If otherwise

            Else

This message that states the triangle is not right angled is printed

                  Display "The triangle is not right angled"

This indicates the end of the algorithm

Step 5: Stop

The algorithm when implemented in Python is as follows:

<em>a = float(input("a: "))</em>

<em>b = float(input("b: "))</em>

<em>c = float(input("c: "))</em>

<em>if a**2 == b**2 + c**2:</em>

<em>    print("The triangle is right angled")</em>

<em>else:</em>

<em>    print("The triangle is not right angled")</em>

<em></em>

It follows the same explanation as the algorithm

You might be interested in
Choose the correct term to complete the sentence.
devlian [24]
Smartphones! because mobile apps go on smartphones
8 0
3 years ago
Read 2 more answers
You are given a data set with information from 1,000 high school students (of which the following is a part of the data) and ask
serg [7]

Answer:

Classification

Explanation:

Building a machine learning solution that can predict the success of a student in completing a college degree is a binary problem. There are two possible answer: success or not success.  

This brings us to a supervised machine learning problem, where one trains the technique with labeled data whether it is a success or not. Since the target variable is discrete (not continuous), classification technique has to be used.  

3 0
3 years ago
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
What is the main purpose of a graphic organizer?
timama [110]
B. To organize information using shapes.
8 0
3 years ago
Read 2 more answers
___________ is an unsecured client server application / protocol that transfers files between two computers.
Alexus [3.1K]
It is known as the File Transfer Protocol or FTP. It is based on a customer server demonstrate design and uses isolate control and information associations between the customer and the server. FTP clients may conform themselves with an unmistakable content sign-in convention, regularly as a username and secret word, yet can interface namelessly if the server is designed to permit it.
6 0
4 years ago
Other questions:
  • To include totals and other statistics at the bottom of a datasheet, click the ____ button on the HOME tab to include the Total
    12·1 answer
  • In addition to not parking where signs prohibit it, you should never park __________________.
    12·1 answer
  • A user of the wireless network is unable to gain access to the network. The symptoms are:1.) Unable to connect to both internal
    6·1 answer
  • Which of the following goals is likely to require funding? Check all that apply.
    6·2 answers
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • Why should the drives be segregated in a computer?​
    15·1 answer
  • You want to substitute one word with another throughout your document. What tool(s) should you use?
    9·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    5·1 answer
  • Good Morning! Please Help!
    15·1 answer
  • Brain for free 12628397
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!