1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
2 years ago
6

Area Triangolo Rettangolo in c++

Computers and Technology
1 answer:
Leona [35]2 years ago
4 0

Answer:

#include <iostream>

using namespace std;

void askCat(int &cateto1, int &cateto2);

int AreaRett(int cateto1, int cateto2, int &area);

void stampaRisultato(int area);

int main()

{

  int cateto1, cateto2, area;

  askCat(cateto1, cateto2);

  area = AreaRett(cateto1, cateto2,area);

  stampaRisultato(area);

}

void askCat(int &cateto1, int &cateto2)

{

 cout << "Inserisci lunghezza cateto1: ";

 cin >> cateto1;

 cout << "Inserisci lunghezza cateto2: ";

 cin >> cateto2;

}

int AreaRett(int cateto1, int cateto2, int &area)

{

 area = (cateto1*cateto2)/2;

 return area;

}

void stampaRisultato(int area)

{

 cout << "L'area del triangolo rettangolo e': " << area << endl;

}

You might be interested in
Which part of the cryosphere comes directly from the atmosphere?
marin [14]
The answer to this question is C.
4 0
3 years ago
Read 2 more answers
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
_____ is a secret or illegal cooperation or conspiracy, especially in order to cheat or deceive others.A.CollusionB.Business eth
finlep [7]

The answer would be A.Collusion.

3 0
3 years ago
Mr. Andrews, the lead programmer for the game New Horizons, hires independent testers to check the game for stability and perfor
NikAS [45]
I think “D”, did I help?
5 0
2 years ago
Read 2 more answers
Why is hard disk called random access medium​
Effectus [21]

Answer:

Data is accessed in a random-access manner, meaning the individual blocks of data can be stored and retrieved in any given order or time.

Explanation:

5 0
1 year ago
Read 2 more answers
Other questions:
  • Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
    15·1 answer
  • How has technology fragmented the audience for sports and entertainment<br> commodities?
    10·1 answer
  • Write a program that displays in the title of the window the position of the mouse as the user moves the mouse around the window
    5·1 answer
  • The graph of which function has an axis of symmetry at x=-1/4​
    15·1 answer
  • Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
    9·1 answer
  • What are two advantages of encrypting data stored in the computer system?
    5·1 answer
  • A real-world problem that might be explained or predicted through the creation of a computer simulation
    7·1 answer
  • Identify traits of entrepreneurs. Check all of the boxes that apply.
    11·1 answer
  • Which of the following is used to move to end of the row?​
    8·1 answer
  • IM a bit confused on what this is asking for exactly.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!