1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
2 years ago
10

The height of a small rocket y can be calculated as a function of time after blastoff with the following piecewise function: y 5

38.1454t 1 0.13743t 3 0 # t , 15 y 5 1036 1 130.909(t 2 15) 1 6.18425(t 2 15)2 2 0.428(t 2 15)3 15 # t , 33 y 5 2900262.468(t 233)216.9274(t 233)2 1 0.41796(t 233)3 t . 33 Develop a well-structured pseudocode function to compute y as a function of t. Note that if the user enters a negative value of t or if the rocket has hit the ground (y # 0) then return a value of zero for y. Also, the function should be invoked in the calling program as height(t). Write the algorithm as (a) pseudocode, or (b) in the high-level language of your choice.
Computers and Technology
1 answer:
SOVA2 [1]2 years ago
5 0

Answer:

High level Language

understand

Explanation:

rocket is 0...4433456u888

You might be interested in
Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the
Semenov [28]

Answer: Access Quick Access commands using the More button

Explanation:

In order for Robyn to ensure that a command she frequently uses is added to the Quick Access toolbar, then she needs to Access Quick Access commands using the More button.

This can be done by clicking on Customize Quick Access Toolbar. Then, Robyn will then click More Commands then he'll click on file tab in the Choose commands from the list. The command will then be chosen and then click on Ok and it'll be added.

7 0
3 years ago
a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
Slav-nsk [51]

My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

<h3>What does revoke certificate mean?</h3>

Certificate revocation is the process by which one can  invalidate a TLS/SSL and this is one that is often done before its scheduled expiration date.

Note that A certificate need to be revoked immediately  and as such, based on the case above, My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about network administrator from

brainly.com/question/4264949

#SPJ1

8 0
2 years ago
Points!!!!!!!! pls help
siniylev [52]
D. Rasterize

This answer makes the most since
7 0
3 years ago
Read 2 more answers
Write the document type declaration markup statement for an HTML5 file. Be sure to include the appropriate opening and closing b
GREYUIT [131]

Answer:

<!DOCTYPE html>

Explanation:

<!DOCTYPE html> is used in the HTML5. It is the document type declaration markup statement for an HTML5 file.

4 0
3 years ago
Because some countries have poor traditional telephone services, companies and consumers have resorted to Group of answer choice
maw [93]

Answer:

a. leap frogging

Question:

Because some countries have poor traditional telephone services, companies and consumers have resorted to Group of answer choices leap frogging. express package services. satellite telephones. fiber-optic telephones. voice over internet protocol (VOIP) services.

3 0
3 years ago
Other questions:
  • _ is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of v
    10·1 answer
  • In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment
    5·1 answer
  • A structure that specifies which of a number of permitted data types (e.g. integers) that may be stored in its instances is:
    6·1 answer
  • Renee is creating a multimedia presentation for a website that requires user interaction. Which multimedia type is Renee using?
    5·2 answers
  • What is the difference between a sequential program and an event-driven program?
    9·1 answer
  • __________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t
    9·1 answer
  • You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
    12·2 answers
  • What does it mean when a computer can't break the rules
    10·2 answers
  • Is there any quantum computer in India?​
    9·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!