1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
8

Write a java program to find the perimeter of a triangle with sides measuring 10cm, 14cm and 15 cm.

Computers and Technology
1 answer:
telo118 [61]3 years ago
8 0

Answer:

The code is shown below.

Explanation:

Consider the provide information.

We need to find the perimeter of the triangle.

The perimeter of the triangle is the sum of all sides.

So the perimeter should be: 10 cm + 14 cm + 15 cm =  39 cm

Now we will write a Java program to find the perimeter.

public class MyClass {

   public static void main(String args[]) {

     int x=10;

     int y=14;

     int z=15;

     int A=x+y+z;

     System.out.println("The perimeter of the triangle is 10 cm + 14 cm + 15 cm = " + A+" cm");

   }

}

Execute the program and you will get a result like this:

The perimeter of the triangle is 10 cm + 14 cm + 15 cm = 39 cm

Refer to the image for better understanding.

You might be interested in
The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questi
Kay [80]

Answer:

Why did cell phones gain in popularity?

✔ smaller and lighter components

Which device stemmed from the original cell phone and allowed for synchronized contact information?

✔ PDA

Which device followed the PDA?

✔ smartphone

Explanation:

7 0
3 years ago
Read 2 more answers
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
seropon [69]

PKI trust model that should be used, is a distributed trust model.

  • A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

  • With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

brainly.com/question/14837773

8 0
3 years ago
You are requesting information about wireless connectivity for your workplace computers. Because you expect the information to b
Sophie [7]

Answer:

the options to the question is:

a.In the introduction

b.In the body

c.In the conclusion

d.In the post script

Explanation:

The answer is A.

The letter would be better suited to have the request placed in the introduction as the introduction will give a brief of what the letter is all about.

The request cannot be in the body of the letter as the body of the letter is structured to contain the details about the request.

The request cannot be in the conclusion as the conclusion part of the letter is the ending part and it is more of a summary, rounding off the letter.

The request cannot be in the Post Script section of the letter as the post script is used to add additional information or detail to a letter.

5 0
3 years ago
Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
Tcecarenko [31]

Answer:

B) Nuclear Technology

Explanation:

Nuclear technology involves atomic nuclei reactions which are used to generate energy. The product of nuclear reactions has huge advantages in Medicine, Agriculture, power generation, Water Desalination etc. However This technology can be misused to produce nuclear bombs (atomic bombs) Which are very dangerous weapons of mass destruction.

Since nuclear reactions involve chain (continous) reactions, they effective damage of detonating a nuclear bomb is huge.

4 0
4 years ago
What does a break statement do
kolbaska11 [484]

The break statement in C programming has the following two usages − When a break statement is encountered inside a loop, the loop is immediately terminated and the program control resumes at the next statement following the loop. It can be used to terminate a case in the switch statement

8 0
3 years ago
Other questions:
  • Blender questions
    8·1 answer
  • Google Slides saves your work to Google Drive. PowerPoint has the option to save to OneDrive. Both of these solutions are in the
    9·1 answer
  • Which of the following statements is NOT true about a mainframe computer?
    14·1 answer
  • Dynamic alliance networks work best in industries: a. that are mature and stable in nature. b. where the coordination of product
    9·1 answer
  • What is the output of the C++ codeabove?
    14·1 answer
  • Example of negative body language include all but
    8·1 answer
  • Write a program that accepts a whole number as input, multiplies that number by 12, and then outputs the product.
    6·2 answers
  • What is smarta Art ? ​
    10·1 answer
  • ____ the most popular word processing applications software<br><br>​
    12·1 answer
  • Data frames can be subset by a chosen value using ==.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!