1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
13

Write and test a program that computes the area of a circle. This program should request a number representing a radius as input

from the user. It should use the formula 3.14 * radius ** 2 to compute the area and then output this result suitably labeled.
Computers and Technology
1 answer:
Mamont248 [21]3 years ago
4 0

Answer:

mark me brainlist

Explanation:

You might be interested in
Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
steposvetlana [31]

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

7 0
4 years ago
How do you restore deleted notpad++ file?
Natasha2012 [34]
Check your trash can, if that doesnt work then I would say its lost.
3 0
3 years ago
Which language would you use to create scripts that send data to a web server?
bonufazy [111]

Which language would you use to create scripts that send data to a web server?

A. HTML

<u>B. ASP</u>

C. SGML

D. CSS

5 0
4 years ago
Read 2 more answers
Explain why the cost of ownership may be lower with a cloud database than with a traditional, company database.
geniusboy [140]

Answer:

Cloud database eliminates the need for establishing and maintaining data centres.

Explanation:

Cloud computing provides an organisation with the infrastructure they need but can not afford. A large online storage with access control policies is available based to subscription.

For a company to establish a data centre, they would need a team of skilled network engineers, fleet of high speed server systems and large storage devices.

The daily power supply and management, coupled with the needed skills and items, can be overwhelming for a company whose main objective is not to deliver database services. So cloud computing is adopted to reduce the cost.

4 0
4 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
Other questions:
  • Write a program that defines a type for a structure that stores information on a student in ENG EK 125. Declare two variables to
    8·1 answer
  • Your dive computer indicates you need to make a mandatory decompression stop. You buddy's dive computer does not. You should: A.
    9·1 answer
  • How does a 3D CAD solid model program display the progression of work involved in creating a model?
    5·1 answer
  • What online resource name does a major University end with
    7·2 answers
  • Though it is seen as a last resort bankruptcy allows a consumer to
    6·1 answer
  • Su
    6·1 answer
  • Many contemporary languages allow two kinds of comments: one in which delimiters are used on both ends (multiple-line comments),
    7·1 answer
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
  • Who is the founded the java computer language?​
    5·1 answer
  • An example of documentary evidence that might be presented at trial for a cyber crime is:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!