1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
3 years ago
15

Write a python program to find the Area of Circle!GRADE 8 CBSE​

Computers and Technology
1 answer:
barxatty [35]3 years ago
6 0

Answer:

PI = 3.14

radius = float(input(' Please Enter the radius of a circle: '))

area = PI * radius * radius

circumference = 2 * PI * radius

Explanation:

i srs dont know i am so sorry i forgot but maybe this?

You might be interested in
Infrastructure as a Service (IaaS) replaces the _________ of the computer hierarchy with an Internet-based infrastructure.
snow_tiger [21]

Answer:

Digital level logic through machine level

Explanation:

Infrastructure as a Service can be regarded as computing cloud services that allows computation, storage, server in the cloud.it helps the user to access infrastructure in the cloud

Digital level logic which is in digital circuit that allows boolen expression, it allows signals as well as sequence to be expressed in form of numbers, it is usually view as been complicated but not.

It should be noted that Infrastructure as a Service (IaaS) replaces the Digital level logic through machine level of the computer hierarchy with an Internet-based infrastructure.

5 0
3 years ago
Explain the types of network architecture with their merits and demerits
Tasya [4]

Answer:

First and foremost, what is network architecture? It's basically the physical and logical design which refers to the software, hardware, protocols and the media of transmission of data. Simply put, it refers to how computers are organized and how tasks are allocated among these computers. The two types of widely used network architectures are peer-to-peer aka P2P and client/server aka tiered.

Peer-to-Peer Architecture

In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is no real hierarchy in this network, all computers are considered equal and all have the same abilities to use the resources available on this network. Instead of having a central server which would act as the shared drive, each computer thats connected to this network would act as the server for the files stored on it.

8 0
2 years ago
A programmer writing code in class Point attempts to override the following inherited method:public boolean equals( Object o ) {
Mrrafil [7]

Answer:

a. A syntax error occurs because the method signatures do not match.

Explanation:

The method signature does not match as the method argument is wrong and so the compiler would issue a syntax error. Trying to override an inherited method from a class and not getting the method syntax correct would mean that the overide operation would not be successful as there would be a syntax error therefore it is paramount that the method argument is properly inputted in the above statement in order to successfully overide the inherited class method.

3 0
3 years ago
Is 583 a string or a number?
Rasek [7]
It is a number that is the answer
3 0
3 years ago
Read 2 more answers
By the time of the appearance of "Paulus", __________was widely recognized as the most famous living composer.
aleksklad [387]

Answer:

The real answer is <u>"it was Felix Mendelssohn who"</u> (which is not available)

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Unfortunately none of these answers are correct. Answer two "would" be correct if the sentence continued and didn't end with a period. The rest of the answers are all grammatically incorrect. The only grammatically correct answer would be <u>"it was Felix Mendelssohn who"</u> which is a mix of the first two available answers but not a single available answer.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Other questions:
  • A ________ is a set of programs that manipulate the data within a database.
    12·1 answer
  • How can investors receive compounding returns
    13·1 answer
  • You are going to write a program for Computer test which will read 10 multiple choice questions from a file, order them randomly
    11·1 answer
  • Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked an
    6·1 answer
  • Molly, a technician, has been tasked with researching an emulator for the software developers to test cross-platform application
    13·2 answers
  • Description:
    7·1 answer
  • What percentage of teens plays video games?<br><br> A.97%<br> B.100%<br> C.74%<br> D.50%
    12·2 answers
  • CORRECT ANSWER GETS BRAINLIEST
    8·2 answers
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • What is it called when two or more devices connect together?.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!