1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
15

Algorithm and flowchart to find the perimeter and area of square​

Computers and Technology
1 answer:
kupik [55]3 years ago
4 0

Answer:

I can give you the perimeter "algorithm" but not the flowchart.

Here you go:

p = w * 4

p = perimiter,

w = width/height

4 = the amount of sides needed.

perimeter = width * 4

to include both width and height, we would instead use:

perimeter = 2(width+height)

This also works with rectangles ^

--------------------------------------------------------------------------

To find an area, it is just width * height. This is also compatible with rectangles.

You might be interested in
While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an al
inna [77]

Answer: the corret answer C. The analyst has prefetch enabled on the browser in use.

Explanation:

The analyst has like an indicator which is prefetch enabled on the browser in use.

7 0
3 years ago
Call of duty vanguard, war zone , fornite, gta what’s your favorite
tia_tia [17]
Warzone easily but gta a close second
8 0
3 years ago
Which of the following is an anxiety disorder
Tju [1.3M]

Answer:Conversion disorder

Explanation:Its a mental condition that affects the nervous system.

3 0
3 years ago
Read 2 more answers
Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
Katyanochek1 [597]

If the question is asking whether it is true or false, the answer is false because worms are not responsible for disguising when they are sending data by using bogus ip addresses but it is the Trojan horses in which they are the one responsible for misleading users from the true intent or the real data.

5 0
3 years ago
_________ local variables retain their value between function calls.
SOVA2 [1]

Answer: static

Explanation:

variables when declared static gets called statically meaning whenever a function call is made it get stored and it is not required to get the variable again when the function is again called. There scope is beyond the function block

4 0
3 years ago
Other questions:
  • Many shops are simply plugging up their drains to keep from inadvertently violating the law and creating environmental contamina
    15·1 answer
  • When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
    5·1 answer
  • The number of bits per pixel is called what
    7·1 answer
  • Which statement regarding socializers is true?
    10·2 answers
  • ____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random in
    6·1 answer
  • This is your chance to become the instructor. After learning the looping and input validation concepts, create a problem to give
    13·1 answer
  • Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correc
    9·2 answers
  • Sum of 18/7 and 13/7 is *​
    14·2 answers
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • Atheel tests a program and gets a NameError. How can this be fixed?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!