1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
3 years ago
13

Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C

Computers and Technology
1 answer:
nasty-shy [4]3 years ago
8 0

Answer:

The program in Python is as follows:

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

while A<=0 or B <= 0 or C <= 0:

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

print("Valid inputs")

Explanation:

Get input for A, B and C

<em>A = int(input("A: "))</em>

<em>B = int(input("B: "))</em>

<em>C = int(input("C: "))</em>

The loop is repeated until inputs for A, B and C are above 0

while A<=0 or B <= 0 or C <= 0:

Get input for A, B and C

<em>    A = int(input("A: "))</em>

<em>    B = int(input("B: "))</em>

<em>    C = int(input("C: "))</em>

Print valid inputs when user inputs are correct

print("Valid inputs")

You might be interested in
What is one way to process your thoughts about the information you are reading?
tatuchka [14]
Make a connection to what you already know about the material
4 0
3 years ago
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
4 years ago
Which of the following is something you need to keep an eye out for
Brilliant_brown [7]

Answer:

D. Pedestrians ignoring DON'T WALK signs

Explanation:

Pedestrians ignoring DON'T WALK signs is something you need to keep an eye out for  near packed intersections.

4 0
3 years ago
Read 2 more answers
The protocol that enables computers on the Internet to communicate with each other is called _____.
dybincka [34]
"C" is the correct answer, if its correct please mark me brainliest.
5 0
3 years ago
based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
tamaranim1 [39]

Answer:

It was Halloween morning, in 1938, Orson Welles opened his eyes just to discover himself as the most trending person in the USA. Just the past night, Welles together with his Mercury Theatre performed the radio adaption of the Wars of the Worlds, written by H.G. Wells. He transformed around 40 years old novel into the false news edition which broadcasted the news of Martian attack on New Jersey.

Explanation:

It was Halloween morning, in 1938, Orson Welles opened his eyes just to discover himself as the most trending person in the USA. Just the past night, Welles together with his Mercury Theater performed the radio adaption of the Wars of the Worlds, written by H.G. Wells. He transformed around 40 years old novel into the false news edition which broadcasted the news of Martian attack on New Jersey. Just previously it was Halloween night, and hence, this was expected. And various listeners of the show were shocked, and they made a lot of crazy calls to the nearby Police Stations, as well as the newspaper publication houses. The radio stations tried to convince various journalists that the radio episode was able to cause hysteria throughout the USA. And by the very next dawn, the front column of each new newspaper from coast to coast together with the headlines related to the huge panic inspired allegedly by the CBS broadcast.

8 0
3 years ago
Other questions:
  • CAD helps professionals to _____. create a technical drawing give directions to a new location calculate the interest rate of a
    13·2 answers
  • When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?
    9·2 answers
  • The architecture that the large paper company Mohawk adopted enables the company to scale technology services up and down instan
    14·1 answer
  • What should be done with statements or sections which are unclear?
    12·2 answers
  • When searching for an image on your computer, you should look for a file with which of the following extensions?
    8·1 answer
  • Which type of financial institution typically has membership requirements?
    14·1 answer
  • Whay is processing?Explain with an example.​
    9·2 answers
  • Tgif
    7·1 answer
  • Is majority intent determined by how many times the same type of result is shown on the search engine result page?
    6·1 answer
  • the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!