1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
10

Write a method that takes two circles, and returns the sum of the areas of the circles.

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
7 0

Answer:

public static double areaSum(Circle c1, Circle c2){

 double c1Radius = c1.getRadius();

 double c2Radius = c2.getRadius();

 return Math.PI * (Math.pow(c1Radius, 2) + Math.pow(c2Radius, 2));

public static void main(String[] args){

 Circle c1 = new Circle(6.0);

 Circle c2 = new Circle(8.0);

  areaSum(c1,c2);

 }

Explanation:

You might be interested in
What is ‘Software Testing’?
SCORPION-xisa [38]

Answer: Software testing can be referred as an as activity that one execute in order to verify whether the results match expected results and also to make sure that software system is without any defect. It also tends to involve execution of few software component in order to evaluate several properties.  This majorly helps to identify gaps, error or requirements that are missing in respect to actual requirements.

5 0
3 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
Is nanotechnology is good or bad? and why?
LenKa [72]

Answer:

Nanoparticles do hold out much environmental promise. The same reactivity that makes them harmful in the body also means they can break down dangerous chemicals in toxic waste – or anywhere, for that matter. And their use in electronics drastically reduces power demand, which could cut greenhouse gases.

6 0
3 years ago
Read 2 more answers
The part of the computer that provides acess to the internet is called?
Eva8 [605]

<u>Answer:</u>

<em> </em><em>Modem is an hybrid device,</em><em> which is responsible for modulating and demodulating information. </em><em>It is a transmission medium and also it is a hardware tool used for connecting to internet.</em>

<u>Explanation:</u>

What is modulation?, let us understand. The <em>process of converting analog to digital signal is called modulation and demodulation is vice-versa.</em> The computer connects internet classically using telephone wire.

The <em>telephone wire understands only analog signal and a computer understands only digital signal.</em> So Modem’s role is to take care of this aspect while <em>connecting to the internet.</em>

3 0
3 years ago
What did major networks do to combat audience erosion in the 1990s?
S_A_V [24]

Answer: I think is 3. They acquired cable channels. They acquired cable operators.

Explanation:

6 0
4 years ago
Other questions:
  • Each phase of the system development life cycle is accomplished as a discrete, separate step. (1 point) (Points : 1.5) True
    7·1 answer
  • If a user copies the formula D15 into D16, what would the formula read in D16?
    15·2 answers
  • 2) Describe how data becomes knowledge.​
    10·1 answer
  • Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per
    10·1 answer
  • Computer input is the process of translating physical signals (light, sound, movement) into which of the following?
    8·2 answers
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • Assume that print_error_description is a function that expects one int parameter and returns no value. Write a statement that in
    11·1 answer
  • Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers r
    8·1 answer
  • Plz answer me will mark as brainliest​
    8·1 answer
  • Text and graphics that have been out of copied are stored in area called the _____
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!