1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
2 years ago
10

The height of a small rocket y can be calculated as a function of time after blastoff with the following piecewise function: y 5

38.1454t 1 0.13743t 3 0 # t , 15 y 5 1036 1 130.909(t 2 15) 1 6.18425(t 2 15)2 2 0.428(t 2 15)3 15 # t , 33 y 5 2900262.468(t 233)216.9274(t 233)2 1 0.41796(t 233)3 t . 33 Develop a well-structured pseudocode function to compute y as a function of t. Note that if the user enters a negative value of t or if the rocket has hit the ground (y # 0) then return a value of zero for y. Also, the function should be invoked in the calling program as height(t). Write the algorithm as (a) pseudocode, or (b) in the high-level language of your choice.
Computers and Technology
1 answer:
SOVA2 [1]2 years ago
5 0

Answer:

High level Language

understand

Explanation:

rocket is 0...4433456u888

You might be interested in
What sorts of routine, seemingly unimportant information would help you learn about or break into another company’s network?
tatuchka [14]

Answer and Explanation:

  • Reboot your Computer from which you need to break into.
  • With your remote Ethernet card embedded and the unprotected passageway will mate up in a flash. You likewise need to change the Service Set Identifier (SSID) on your Ethernet card to coordinate SSID on the system's passage. You can decide to physically constrain your DHCP settings to reestablish, however on the off chance that that gives you any trouble.we need to re-boot it.
  • The Third Man ran a sniffer program that caught the majority of the LAN traffic within this organization. It was transmitted through the remote passageway straight into the Third Man's PC. Passwords. Agreements. Email.
4 0
3 years ago
____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
Volgvan
Pretty sure answer is <span>E-mail spam</span>
4 0
3 years ago
What does Snap do?
Zinaida [17]

Answer:

Snap enables you to resize open windows,

Explanation:

Snap enables you to resize open windows, It is convenient when you want to see two windows simultaneously (side by side).

To do this, drag the desired window the left\right until the cursor reaches to the edge of the screen and then release the mouse.

The window will snap into place.

7 0
3 years ago
What is the value of j after this code is executed? int i = 6, int j=10; j+=i;
stich3 [128]

Answer:

16

Explanation:

+= is an assignment operator that adds a value to the existing value.

4 0
3 years ago
Technician A says that almost every part of a vehicle is somehow powered by or controlled by an electrical or electronic system.
Novay_Z [31]
I believe that both tech A and B are right.
8 0
3 years ago
Read 2 more answers
Other questions:
  • What will the output be from the following program?
    5·1 answer
  • What is one major component that would not be found in a tablet or phone, and how has modern computing made that component less
    13·2 answers
  • Syntax errors ________. a. result from an attempt to perform an operation that cannot executeb. are errors such as misspelled ke
    14·1 answer
  • When a file is transferred between two computers, two acknowledgment strategies are possible. In the first one, the file is chop
    5·1 answer
  • Which feature was the first app available on a cell phone? A. Game B.contact list C.email D.ringtone
    11·1 answer
  • A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
    12·1 answer
  • In cell j6, enter a formula to determine the cost of gas if the customer chose that option as indicated in column i. if the cust
    13·1 answer
  • How much is this worth in dollars​
    9·1 answer
  • 100 POINTS NEED THIS BEFORE 11:59 TODAY!!!!!!!!!!!!!!!
    8·1 answer
  • Why do we install doorbells in our house
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!