1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
14

To assign length and breadth to display area of a rectangle​

Computers and Technology
1 answer:
Ivahew [28]3 years ago
4 0

Answer:

In Python:

Length = float(input("Length: "))

Breadth = float(input("Breadth: "))

Area = Length * Breadth

Print(Area)

Explanation:

Get values for length and breadth

<em>Length = float(input("Length: "))</em>

<em>Breadth = float(input("Breadth: "))</em>

Calculate area

Area = Length * Breadth

Print area

Print(Area)

You might be interested in
Who invented napier bone and when​
Alinara [238K]

Answer:

<u>Inventor :</u>   John Napier in Year 1617

Explanation:

He was also the inventor of logarithms (which was  invented to aid calculation known as 'Napier's Bones' in 1617.

7 0
3 years ago
Read 2 more answers
based on your completed tables for ping requests and replies, which field do you think helps the network identify the appropriat
Ilia_Sergeevich [38]

Ping, a computer network management tool, is used to determine whether a host is reachable on an IP network. ARP protocols To begin, launch Wireshark and the ecet-375 Web Browsing. Pcap capture file. This capture file was created while browsing the Internet.

<h3>What does ping operates mean?</h3>
  • Ping sends an ICMP Echo Request to a predefined network interface and then waits for a response. A ping signal is sent to the specified address when a ping command is issued.
  • The destination host sends the echo reply packet in response to receiving the echo request.
  • A ping is the time it takes for a small data set to be communicated from your device to an Internet server and back to your device (latency is the more accurate technical word). Ping times are measured in milliseconds.
  • Ping is the most commonly used TCP/IP command for troubleshooting connectivity, reachability, and name resolution.
  • This command displays Help content when run without any parameters. You can also use this command to verify the computer's name as well as its IP address.

To learn more about ping operates, refer to:

brainly.com/question/14366813

#SPJ4

7 0
2 years ago
Name a wireless technology tat may work with one device and not another?
Oliga [24]

Answer:

WPAN/Bluetooth, Coexistence, High Rate WPAN, Low Rate WPAN,  mesh Networking, Body Area Networks, and Visible Light Communication.

7 0
2 years ago
Can someone please give me Python test 3 it would help me tremendously
Ket [755]

Question 1:  To tell what will happen when an if-statement is false.

Question 2: The = should be ==

                    elseif should be elif

                    The else should have a :

Question 3: All algorithms can only do number calculations.  

Question 4: and

Question 5: To make a follow-up True/ False decision

Question 6: if (text1 > 15):

Question 7: if (text1 == 78):

Question 8: if (num1 != num2):

Question 9: >=

Question 10: 4

Question 11: 3

Question 18: a < b and a != b  

Question 19: !=

Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.

5 0
3 years ago
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
Other questions:
  • Write a copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *thi
    15·1 answer
  • After installation of SSL certificate website asking for username and password.
    6·1 answer
  • Which leadership function involves keeping group members focused on the issue at hand?
    6·1 answer
  • To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security
    13·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to sever
    12·1 answer
  • My sister put my phone in the microwave and I'm pretty sure the battery blew up. I'm too scared to open the microwave. What do I
    11·1 answer
  • Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas
    9·1 answer
  • 1. PIN
    10·1 answer
  • 2.11 (Separating the Digits in an Integer) Write a script that inputs a five-digit integer from the user. Separate the number in
    12·1 answer
  • Write a program that creates a two-dimensional array named height and stores the following data:
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!