1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
6

Write an algorithm for finding the perimeter of a rectangle

Computers and Technology
1 answer:
Svet_ta [14]3 years ago
6 0
A formula could be 2a+2b
You might be interested in
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
Serggg [28]

Answer:

Alumni Groups

Business Organizations

Explanation: i made a 100 on lesson

7 0
3 years ago
The mac group does not replace the primary functions of eocs or other dispatch organizations. True or False
Oxana [17]

Answer:

TRUE

Explanation:

MAC - multi-agency coordination is a group of executives or administrators that have the authority to control agency funds or resources while EOCs -  Emergency operation centers are in charge of carrying out of emergency tasks that requires preparedness or disasters, they ensure that work continues even in case of emergency and disasters.

7 0
3 years ago
The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
Genrish500 [490]

Answer:

Backup copy

Explanation:

system restore point is called a backup or backup copy of the system, this point keeps the inicial setting or configuration on the software, we usually use this tool when we're having some issues with the software, usually during the installation process  of a new software, letting us to save the data and off course with this point created the user could revert the issues or fix the problems occuring in the configuration.

5 0
3 years ago
PHP is based on C rather than ______.
Maksim231197 [3]

Answer:

2b2t

Explanation:

2b2t

8 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
Other questions:
  • An array UnsortedInt consists of integers in random order. Another array SortedInt consists of a sorted list of integers.
    13·1 answer
  • The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
    11·1 answer
  • Write a Student class in Java which has a name, id_number, year (e.g. 2) and
    9·1 answer
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • (5 points) Create a user-defined data structure (i.e., struct) called Point that represents a two-dimensional Cartesian coordina
    5·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
    12·2 answers
  • Write a program to create a customer bill for a company. The company sells only five products: TV, DVD player, Remote Controller
    12·1 answer
  • Data is best described as
    10·2 answers
  • How is data written to a blockchain?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!