1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
11

1.) Write the formula, which assigns double x to double n raised to the double z power.

Computers and Technology
1 answer:
andrezito [222]3 years ago
3 0

Answer:

1.) Write the formula, which assigns double x to double n raised to the double z power.

Answer: 2\times x → 2\times n^(2\times z<u>)</u>

2.) Write a formula, which will add 5 to the cube of double t times double n, and assign it to double x.

Answer: 5\plus 2\times t^3→2\times x

3.) Write a formula, which will assign double x to square root of the sum of the squares of the lengths of the two legs of a triangle. Declare double leg1, and double leg2, in order to find the hypotenuse. (Pythagorean Theorem)

Answer: 2\times x → \sqrt \{(l^2)_1 + (l^2)_2\}= hypotenuse

4.) Write a program that find the distance between two values on the number line by taking the absolute value of their difference. Assign the answer to double x. The two numbers have been declared as follows:

double num1, num2

Answer: length = \sqrt\{|num2 - num1\|} → 2\times x

Explanation:

.

You might be interested in
Cisco cyber security would classify this email?
Nookie1986 [14]

Cisco cyber security would classify this email as security threats.

<h3>How do Cisco cyber security classify email security threats?</h3>

They classify them as:

  • Malware Delivery via Spam.
  • Credential Theft
  • Business Email Compromise, etc.

Note that in the case above, Cisco cyber security would classify this email as security threats

Learn more about Cisco from

brainly.com/question/23388335

#SPJ12

8 0
2 years ago
Z-Wave and Zigbe use a _______________ networking topology to facilitate communication in homes, yet both also have hubs that ac
Nina [5.8K]

Answer: Mesh

Explanation:

Mesh network is network topology in which network nodes are directly connected with infrastructure nodes in active manner without following any hierarchy. This interconnection is made for continuous transmission of data through the network path.It can work even if any particular connection or node faces fault.

  • Z-wave commonly uses mesh topology for connecting the nodes to facilitate the home devices in wireless manner along with hub.
  • Zigbee also uses mesh topology for proving services at low cost to homes and other areas in wireless form also having router or hub as the linking device.
4 0
3 years ago
IMPORTANT HELP
balu736 [363]

Answer:

plz am so sorry I don't no it

Explanation:

Plz give me brainiest

6 0
3 years ago
Who are some of my emails not all deleting on my android i have to use my laptop to see them to delete them?
Leviafan [203]
It could be an issue with your email. Have you tried changing your passeord?
4 0
3 years ago
Read 2 more answers
Gregor installed a third stick of known-good RAM into his Core i7 system, bringing the total amount of RAM up to 3 GB. Within a
MA_775_DIABLO [31]

Answer:

The speed or quality was different.

Explanation:

The new ram that he installed most likely had a different rate, or was a different quality than the old ram.

5 0
3 years ago
Other questions:
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • What is code reuse meant to do?
    9·1 answer
  • no one can succeed in his or her career without relying on others for help or opportunities. It’s best, though,
    13·1 answer
  • What was ARPANET?
    14·1 answer
  • _____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
    14·1 answer
  • If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the l
    10·2 answers
  • A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a devic
    7·1 answer
  • Meats ages hair and feathers all contain this monomer
    13·1 answer
  • Which tab on the Ribbon contains the command to print a publication?
    10·1 answer
  • You conduct an experiment to find the probability of a flipped coin landing on
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!