Answer:
#include <iostream>
using namespace std;
int main()
{
float radius = 5.4;
float circumference = 2 * 3.14 * radius;
float area = 3.14 * radius * radius;
cout<<"the circumference of the circle is "<<circumference<<endl;
cout<<"the area of the circle is "<<area<<endl;
return 0;
}
Explanation:
Include the library iostream for using the input/output instructions.
create the main function and define the variable with value. Then,
use the formula to calculate the circumference and are of circle.


here, choose 
after that, display the result.
Note: All variable define in float type.
Answer:
Like when your doing an application for a job or anything important lol
Explanation:
Answer:
Creating a Table
1) Click the Insert tab on the Ribbon
2) Click on Table
3) Highlight the number of columns and rows you’d like
OR
4) Click Insert Table
5) Click the arrows to select the desired number of columns
6) Click the arrows to select the desired number of rows
7) Click OK
Answer:
Buisness,creation,advertising.
Incomplete question. Here's the full question:
Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.
This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?
<u>Explanation:</u>
Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.
For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.