Answer:
Here is the script:
function dd = functionDMS(dd)
prompt= 'Enter angle in DD form ';
dd = input(prompt)
while (~checknum(dd))
if ~checknum(dd)
error('Enter valid input ');
end
dd = input(prompt)
end
degrees = int(dd)
minutes = int(dd - degrees)
seconds = ( dd - degrees - minutes / 60 ) * 3600
print degrees
print minutes
print seconds
print dd
Explanation:
The script prompts the user to enter an angle in decimal degree (DD) form. Next it stores that input in dd. The while loop condition checks that input is in valid form. If the input is not valid then it displays the message: Enter valid input. If the input is valid then the program converts the input dd into degrees, minutes and seconds form. In order to compute degrees the whole number part of input value dd is used. In order to compute the minutes, the value of degrees is subtracted from value of dd. The other way is to multiply remaining decimal by 60 and then use whole number part of the answer as minutes. In order to compute seconds subtract dd , degrees and minutes values and divide the answer by 60 and multiply the entire result with 3600. At the end the values of degrees minutes and seconds are printed. In MATLAB there is also a function used to convert decimal degrees to degrees minutes and seconds representation. This function is degrees2dms.
Another method to convert dd into dms is:
data = "Enter value of dd"
dd = input(data)
degrees = fix(dd);
minutes = dd - degrees;
seconds = (dd-degrees-minutes/60) *3600;
The seriousness of the risks to your computer security is not to be a severe one. This is because Computer security risks are due to the handwork of malware such as, bad software, that can infect a computer, and make the hacker to destroy your files, steal your data, or even have access to your system without one's knowledge or authorization.
<h3>What are the risk results for information and computer security?</h3>
The term “information security risk” is known to be those damage that occurs due to an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.
Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.
Hence, The seriousness of the risks to your computer security is not to be a severe one. This is because Computer security risks are due to the handwork of malware such as, bad software, that can infect a computer, and make the hacker to destroy your files, steal your data, or even have access to your system without one's knowledge or authorization.
Learn more about computer security from
brainly.com/question/12010892
#SPJ1
The statement above is false; the motion of electrons can not be predicted precisely. Electrons move around the orbit shells at different energy levels in atoms. Previous research works had devised ways of measuring the angular velocity of electrons and means of tracking the movement of electrons in atoms but the movement of these electrons can not be predicted. They move in a random manner round the nucleus of an atom.<span />
Answer: The correct answer is to look up the unfamiliar words in a dictionary or online.
Explanation: When using context clues to better understand reading, Marlene will first read around the unfamiliar words, looking for clues before and after the unfamiliar words. If she still does not know the meaning of an unfamiliar word her next step is to look up the word in a dictionary or online.
Answer:
Below are the python Program for the above question:
Explanation:
keysList =[1,61,68,64]#key list items.
itemsList =[1,2,3,4]#item list items.
for x in range(len(keysList)):#for loop.
if(keysList[x]>60):#check the value to be greator.
print(itemsList[x],end=";")#print the value.
Output:
- The above code will print as "2;3;4;".
Code Explanation:
- The above code is in python language, in which the first and second line of the code defines a list. That list can be changed by the user when he wants.
- Then there is a or loop that scans the keylist items and matches the items that it is greater than 60 or not. If it then takes the location and prints the itemlist by the help of that location.