1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
2 years ago
15

WAp to input the radius and print the area of circle

Computers and Technology
1 answer:
Sergeu [11.5K]2 years ago
7 0

Program:-

\tt r=float(input("Enter\:the\:value\:for\:radius\:of\:circle"))

\tt x=3.14*\:r**2

\tt print("Area\:of\:Circle=\{x\}")

<h3>Sample run:-</h3>

\tt r=3

\tt Area\:of\:the\:circle=28.26

You might be interested in
When was internet created in which year​
fiasKO [112]

Answer:

it was invented in 1983

3 0
3 years ago
Read 2 more answers
In 3 to 5 sentences, describe whether or not files should be deleted from your computer. Explain you answer.
daser333 [38]
I mean if your trying to delete like important files I dont think they should be deleted but that is My opinion. But if you do delete them then u could always got to the recycle bin in ur computer to get it back. I hope this helps !!
7 0
3 years ago
Read 2 more answers
I'm trying to move the figure a little away from, the column line and every time I move it and click ok it goes back to being be
Luba_88 [7]

Answer:

Try to click the center button layout.

Explanation:

8 0
3 years ago
Explain how can you protect your computer from malware
rosijanka [135]
Trend micro security for your Mac or pc or trend micro mobil security for your android or iOS Mobil device?

Hope this helps!
6 0
3 years ago
Read 2 more answers
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
Other questions:
  • During the past decade ocean levels have been rising faster than in the past, an average of approximately 3.1 millimeters per ye
    14·1 answer
  • If you want an app to reach the largest possible audience, which two platforms should you use?
    7·1 answer
  • Which audio editing effect uses the option ""Get Profile"" to execute its function?
    6·1 answer
  • If I want to have an estimate of the number of people who visited my website, which metric should I use?
    5·2 answers
  • What was the first fully computer animated feature film?
    13·1 answer
  • Why is the cost of a software project not directly related to the cost of development?
    13·1 answer
  • Cash cows are always in
    7·1 answer
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • he degree of operating leverage is equal to: Group of answer choices FC / OCF. VC / OCF. 1 FC / OCF. 1 VC / OCF. 1 Picture FC /
    9·1 answer
  • How are comments in a Java program treated by the compiler?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!