1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
12

Write an algorithm to find perimeter of circle​

Computers and Technology
1 answer:
Anna11 [10]3 years ago
6 0

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

You might be interested in
Akira has trouble reading what is on the computer screen and sometimes seeing pictures on websites. As her friend, you explain t
aliina [53]

1. Using Listener Software:

Software like Adobe reader allows you to listen to the stored files rather than reading them, Akira can use this software while she need to read a file or an article, simply copy the article in pdf file and turn on listener for it.

2. Zoom in/ Zoom Out:

Most of the browsers these days allow you to zoom in and zoom out the web pages while reading them by pressing Alt and + sign for Zoom in and Alt and - for zoom out. This feature can be really helpful for reading purposes and also for images view as well.

3. Narrators

When Akira is completely fed up with reading the screen, she can use Narrators which are programs that convert every text on screen into audio file and she can listen to them.

4.Color Changers

These days software like color changer are very useful for people with low vision eyes. They change the color of screen such that there is no irritation in eyes while reading articles. They can also be used by her.

7 0
4 years ago
The IT director instructed the systems administrator to build a server to support the accounting department's file growth. The I
Mamont248 [21]

Answer:

Option (C) FAT32 File System Type

Explanation:

  • FAT32 File System Type cannot be encrypted by the accounting users.
  • FAT stands for File Allocation Table. It is a file system architecture.
  • The File Allocation Table is an index table which contains the details about each cluster ( disk storage space ).
  • By traversing the File Allocation Table, the operating system gets the details the file ( where it is located ) and the size of the file.
  • The FAT32 file system contains more number of possible clusters.
  • In this system, 32 bits are used to store the total number of possible clusters.
  • In FAT32 file system, the transparent encryption is not supported.
  • So, option (C) is correct.
  • All other options are wrong options.
3 0
4 years ago
Consider the following incomplete code segment, which is intended to increase the value of each digit in a String by one. For ex
arlik [135]

The instruction that should replace /* Missing Loop Header */ so that the code segment works as intended is (c)  counter < num.length()

<h3>Loops</h3>

The program is an illustration of loops (the while loop)

While loops are program statements that are used to perform repeated operations

For the string to return 23456, the while loop body must be repeated as long the counter is less than the length of the string num

Hence, the missing loop header is counter < num.length()

Read more about loops at:

brainly.com/question/15683939

7 0
3 years ago
What is the foundational domain for business
mr Goodwill [35]

a fundamental domain or fundamental region is a subset of the space which contains exactly one point from each of these orbits . It serves as a geometric realisation for the abstract set of representatives of the orbits . There are many ways to choose a fundamental domain .

hope this help

7 0
3 years ago
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be moni
chubhunter [2.5K]

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

8 0
4 years ago
Other questions:
  • What is an example of asynchronous communication
    7·1 answer
  •  When using cost-benefit analysis to determine the benefits of a community project, economists measure the value in terms of (A.
    14·1 answer
  • The website of an international human rights organization stores a large database of information and provides search functionali
    15·1 answer
  • To do a good job of searching periodicals at your library, you should use A) the Library of Congress Authorities webpage. B) web
    10·1 answer
  • Which of the following sections of a business plan comes first but should be written last?
    11·2 answers
  • In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following
    12·1 answer
  • A key requirement for the process of testing hypotheses in the scientific method is Group of answer choices experimenter bias. c
    9·1 answer
  • What will be the code in CSS, to set
    13·1 answer
  • What is the missing line of code?
    13·1 answer
  • Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!