1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
2 years ago
5

Write a qbasic program to find out the area of the square and cube​

Computers and Technology
1 answer:
Gekata [30.6K]2 years ago
5 0

Answer:

QBasic Programming REM PROGRAM TO DISPLAY AREA AND PERIMETER OF SQUARE CLS INPUT “ENTER LENGTH”; L A= L ^ 2 P = 4 * L PRINT “AREA OF SQUARE “; A

Explanation:

You might be interested in
N, or central processing unit, is also known as the
Rzqust [24]
CPU is the Answer to this question.
6 0
3 years ago
Read 2 more answers
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
3 years ago
_____ consists of the instructions that direct the operation of the computer system and enable users to perform specific tasks,
kaheart [24]

Answer:

Software

Explanation:

6 0
2 years ago
When it comes to credit scores, why is having a
inessss [21]

Answer:

credit karma

Explanation:

karma is -69

6 0
3 years ago
Complete the paragraph to explain how Angelina can notify readers that her report is just a draft.
iogann1982 [59]

Answer:

Background

Design

Page background

Custom

Explanation:

5 0
3 years ago
Other questions:
  • What is the very first thing a user usually must do to gain access to a secure computer?
    7·1 answer
  • The main devices in a rectifier are:
    14·2 answers
  • // This pseudocode should create a report that contains an
    14·1 answer
  • What are the five resources paid for by local taxes
    15·1 answer
  • An address has a house number, a street, an optional apartment number, a city, a state and a postal code. Define the constructor
    5·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • What is the importance of different camera angles ?
    9·2 answers
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
  • What can handle work that is hard on a person and could cause repetitive injuries?
    6·1 answer
  • Mention and discuss specific professional ethics related to augmented reality, artificial intelligence, and the internet of thin
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!