1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
12

Write a pseudocode to calculate the volume of a cylinder​

Computers and Technology
1 answer:
Alinara [238K]3 years ago
7 0

Answer:

10.50, height = 15.01, and pi = 3.1415.

You might be interested in
Your iphone is not configured to allow calls using this mac
Tema [17]

Answer:

Make sure you have an iCloud account and that your computer is logged into that account.

Explanation:

4 0
3 years ago
All of the following are ways to save money on transportation except :
Lisa [10]
The options listed are not related to the question. and if they were related in any sense then I would say the cheapest thing on the list is a phone card so I guess you can buy that and save the most for your travel as you can use phone cards anywhere as they have 1800 numbers which are free from any public phone. 
7 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
How do you convert hexadecimal to denary
Aloiza [94]

Answer:

Add the hex value to the appropriate base-

16 place-value column: 2 in the 16 column; D in the 1 column.

Work out the hex digits and their representation in denary-

2 = 2 in denary; D = 13 in denary.

Multiply with the place value: 2 x 16 = 32; 13 x 1 = 13.

Add the values together: 32 + 13 = 45 in denary.

Explanation:

Check out GCSE Computer Science Revision for more info.

6 0
2 years ago
Why did the creation of ARPANET help with this critical need?
charle [14.2K]
<span>Scientists needed a way to work together to share their research and findings. Especially after a nuclear exchange.</span>
8 0
3 years ago
Other questions:
  • What type of scientists studies tree rings to determine the history of an area?
    9·2 answers
  • In 125 words describe the steps to active listening.
    6·1 answer
  • Build a state diagram for the “book” based upon the following information of the library.
    6·1 answer
  • In PumaMart system, why an initial offer is not necessary at the beginning of negotiation?
    6·1 answer
  • The word “Intrapersonal”means----------------------.Within the personSelf talkExtrovertOutgoing person
    10·2 answers
  • To print factorial of any<br>input number <br>QBASIC​
    6·1 answer
  • How do you change your grade level
    10·1 answer
  • Which of the following statements best describes the relative amount of content held by digital libraries vs. the amount held by
    15·1 answer
  • Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it
    7·1 answer
  • The sum of these 9 numbers is 36. 2, 2, 6, 2, 1, 8, 7, 5, 3 What is the mean of these 9 numbers?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!