1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
muminat
3 years ago
15

## Inputs

Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
7 0

<em># Recieving two coordinate pairs</em>

x1 = int(input("Please provide X1:\t"))

y1 = int(input("Please provide Y1:\t"))

x2 = int(input("Please provide X2:\t"))

y2 = int(input("Please provide Y2:\t"))

<em> </em>

<em>## Calculations </em>

<em> </em>

<em> </em>

<em># distance formula</em>

xDif = x2 - x1

yDif = y2 - y1

radical = xDif**2 + yDif**2

distance = radical ** (1/2) # meters

<em>## Outputs</em>

if(distance>50):

   print("The points are very far apart\n")

elif(distance<5 and distance>0):

   print("The points are fairly close\n")

elif(distance==0):

   print("These point are the same\n")

<em>#Informing the user of distance between the two coordinate pairs</em>

print("Distance between points:", distance, "meters")

You might be interested in
(03.04 MC) While working in a group, two members are not getting along. You ask each one what is happening, and they both say th
solniwko [45]

Answer:

Agree upon the problem Brainstorm possible

Explanation:

7 0
3 years ago
Read 2 more answers
30 POINTS! PLEASE ANSWER QUICK!!!
SpyIntel [72]

Answer:

your doctype comes first.

Explanation:

The first thing you should make sure to have in any HTML document you create is a "document type definition (DTD)" declaration.

it defines what elements and attributes are allowed to be used in a certain flavor of HTML

6 0
3 years ago
Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same sock
LenaWriter [7]

Answer:

The processor and the motherboard goes bad.

Explanation:

Computer system component upgrade allows the enhancement of the component specification. Every computer system comes with a specific quality, size or speed of its various components like the storage drives size, the memory size, the processor speed and even the software components like the operating system.

An upgrade must be compatible with the system configuration like upgrading the processor. If the upgrade is compatible, the processor speed can be increased, but when an upgrade of the processor is not compatible with the chipsets, this could damage the processor and motherboard.

3 0
4 years ago
A list that is not sorted by numbers is called a?
Feliz [49]

Answer:

An unordered list(HTML)

6 0
4 years ago
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a c
tatuchka [14]

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

<u>Advantage:- </u>

  • Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
  • Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
  • Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

<u>Disadvantage:-  </u>

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

4 0
4 years ago
Other questions:
  • Assume you're using a three button mouse. to access shortcut menus you would
    10·1 answer
  • Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
    14·1 answer
  • cd to the directory called final that is located within my home directory. While viewing the file called mypasswd you notice tha
    12·1 answer
  • In Java. Write a program that creates an integer array with 50 random values, prompts the user to enter the index of an element
    5·1 answer
  • A Variable can only hold numbers<br><br> True<br><br> False
    15·2 answers
  • 7. Four more than negative eleven times a number is 26.​
    7·2 answers
  • In cell K8, create a formula using the SUM function that calculates the total of the range D17:D20 and subtracts it from the val
    6·1 answer
  • Which gases are carried by red blood cells? Select two options.<br> science question
    14·2 answers
  • What when can you expect technology to be effective?
    12·1 answer
  • The int function can convert floating-point values to integers, and it performs rounding up/down as needed.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!