1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
2 years ago
12

Write a program to get radius of circle and then print it's circumference​

Computers and Technology
1 answer:
s344n2d4d5 [400]2 years ago
8 0

\tt r=(int(input("Enter \:the\: value\: for \;radius:\:")))

\tt A=3.14*r**2

\tt C=2*3.14*r

\tt print("Area\:of\:the\:circle:",A)

\tt print ("Circumference\:of\:the\:circle:",C)

Output:-

\tt Enter\: the\:value\:for\: radius: 2

\tt Area\:of\:the\:Circle:12.56

\tt Circumference\:of\:the\:Circle:12.56

You might be interested in
What software tool can you use to see the applications that are currently running?
Soloha48 [4]

Answer:

You can use the task manager to see what programs are currently running.

Explanation:

7 0
2 years ago
Read 2 more answers
Internet is a boon or curse
tangare [24]
It really depends on what you're using it for such as looking up a recipe or an answer to a question. If you're using it for illegal purposes or looking up things that are seen as morally wrong by other people it can make the internet seem like a bad thing. But the internet wasn't created with that intended purpose so again it's just your own personal opinion.
4 0
3 years ago
ICT4AD was meant to modernize the civil service through E-governance implementation.
astra-53 [7]

ICT4AD work through E-governance implementation fail as a result of:

  • Lack of Infrastructure.
  • High cost of running its affairs as it needs  huge public expenditure.
  • Issues with Privacy and Security and others.

<h3>What is the aim of e-governance?</h3>

The objectives of e-Governance is created so as to lower the level of corruption in the government and to make sure of  fast administration of services and information.

Conclusively, It is known to fail due to the reasons given above and if they are worked on, the service would have prospered.

Learn more about civil service from

brainly.com/question/605499

7 0
1 year ago
Why hasn't 3D printing been more publicly used?
marshall27 [118]

Answer:

Probably because it's really expensive and not well known.

Explanation:

Some metals and plastic are not able to be altered for 3D printing, which makes this harder for some people to get hold of. Most of the materials are also not able to be recycled, which makes it harder.

3 0
2 years ago
What is meant by key distribution center ( KDC)?
erastovalidia [21]

Answer: A. A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon

Explanation: key distribution center ( KDC) is a system that is used to provide access to a particular network user who shares data which are either private or regarded as sensitive.

It is a form of encryption that allows multiple system within the same network through the use of uniquely secured tickets used to setup a secure connection which gives room for data to be shared.

KDC makes use of cryptographic techniques to prove the validity of a user and grants a ticket permission access. The user present the ticket of permission to the system which then validates it and grant access to the user.

Example of security system that adopts KDC include kerberos.

4 0
2 years ago
Other questions:
  • Write a program to prepare the monthly charge account statement for a customer of CS CARD International, a credit card company.
    11·1 answer
  • Many web browsers, including internet explorer, edge, chrome, and safari, have a(n) ____ option to browse the web without leavin
    12·2 answers
  • You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP addre
    13·1 answer
  • Write a function named times_ten. the function should accept an argument and display the product of its argument multiplied time
    13·1 answer
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • 4. Write an interface ObjectWithTwoParameters which has a method specification: double area (double d1, double d2) which returns
    9·1 answer
  • The ____________________ chip handles the functions of the keyboard controller.
    12·1 answer
  • A solid understanding of __________ is the foundation of verbal communication
    7·1 answer
  • Cómo se hacían antes las cosas que hoy en día se hacen apoyadas en aplicaciones y software?
    10·1 answer
  • Choose all of the items that represent functions of an operating system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!