PROBLEM 2 (CONDITIONAL) Write a C program to input 3 sides of a triangle and check whether a triangle is Equilateral, isosceles or Scalene. Equilateral triangle: An equilateral triangle is a triangle in which all three sides are equal. In he familiar Euclidean geometry, equilateral triangles are also equiangular; that is, all three nternal angles are also congruent to each other and are each 60°. Isosceles triangle: An isosceles triangle is a triangle that has two sides of equal length.
Q: Describe the most significant characteristics of classes and constructors that should be remembered.
A: Things to keep in mind while taking classes: A class is a blueprint or prototype that is specified…
Q: Explain briefly how generics make ArrayList more flexible
A: Introduction: In Java, an arrayList is used to store a collection of elements that is dynamically…
Q: What tactics have been shown to be the most successful in terms of firewall administration?
A: Introduction: Instructions on How to Implement Best Firewall PracticesEvery time you make a change…
Q: denial-of-ser
A: A botnet is various Internet-associated gadgets, every one of which runs at least one bots. Botnets…
Q: This kind of assault is referred to as a "distributed denial of service attack," and it may be…
A: Distributed Denial of Service (DDoS) A DDoS attack is an attack on a computer system or on a…
Q: Justify the requirement for business continuity methods in each situation. For one week, the local…
A: Start: Some firefighting techniques concentrate on cooling the fire to eliminate the heat required…
Q: Assume you're a systems analyst working on a comprehensive test plan. Describe the testing…
A: Explanation: analyzer of information systemsA system analyst is someone who gathers and organises…
Q: Is it possible to copy electrical signals from one Ethernet to another using a repeater device? Why?
A: The following is the response: A repeater device is used to copy electrical signals from one…
Q: How quickly can data move over an Ethernet local area network?
A: Introduction: Ethernet is a networking technology that is widely used in wired Local Area Networks…
Q: What is a computer system? Explain its components.
A: Introduction What is a computer system? Explain its components.
Q: Objective: At the end of the exercise, the students should be able to • Create a simple game that…
A: Step 1import java.util.*; import java.io.*; public class Main { publicstaticvoid main(String[] args)…
Q: A detailed explanation of a dual alternative decision structure is available.
A: Solution for the above question is given in step 2:-
Q: rtual memory?
A: Virtual Memory is a storage mechanism which offers client a deception of having an extremely huge…
Q: Computer sciencei.Explain the three persistence protocols that can be used with CSMA.
A: The Answer is in Below steps
Q: What are the most common C++ function types? Define three common types of functions in C++ using a…
A: Introduction A function is a block of statements that can be reusable and part of our program Based…
Q: What are the many types of firewalls available and how are they used?
A: Introduction: This question will enlighten you on the various types of firewalls available,…
Q: Write a program that asks the user to enter a word that contains the letter a. The program should…
A: C++ Program for above : #include <iostream> using namespace std; int main() { // get…
Q: What does the term "data mining" actually imply? What role does data mining play in profit-seeking…
A: Data mining is the process of analyzing huge amounts of observational data in order to uncover…
Q: What do you believe the student should be doing right now to compete for IT jobs in the near future?
A: Introduction: The field of information technology (IT) is evolving at an alarming rate. While some…
Q: What exactly is SDLC?Fill in the blanks with the names of their various phases.
A: SDLC stands for Software Development Life Cycle. It involves the steps that are taken in building…
Q: event simulation
A: Discrete event simulation is a strategy used to portray the many kinds of processes in a given…
Q: Is maintaining net neutrality necessary? Appropriately justify your response.?
A: Introduction Net Neutrality is a theory that argues that Online service providers should give and…
Q: The standard deviation, S of a set of data is given by the following equation: EN(X-X)2 S = where…
A: Hello student Greetings Hope you are doing great. Thank You!!!
Q: Why does an operating system give specialized calls to access directory items?
A: Introduction : Because the vast majority of operating systems prohibit any programme the ability to…
Q: Give an example of a Named Entity Recognition application. In the context of the reference…
A: Information extraction systems: Named entity recognition focuses on determining the specific meaning…
Q: Which sort of routing route (static or dynamic) would you employ for a simple network? Why would one…
A: Intro Static routing is very good while the user using the basic network. If the user uses a very…
Q: In our definition of a secure channel, what are the two things that an eavesdropper is “allowed” to…
A: A secure channel is a means of data transmission that is resistant to overhearing and tampering.
Q: Why is discrete event simulation so important?
A: Encryption: Simulation of discrete events. A stochastic mathematical modelling tool is discrete…
Q: What kinds of applications can you create with JAVA? What kinds of applications have been created…
A: INTRODUCTION: Here we need to tell the applications of java and java programming language used as…
Q: Explain why accessors to private types are preferable than making the types public for the three…
A: Introduction: Briefly put, an accessor method controls access to an attribute by allowing users to…
Q: What influence will information technology have on the business processes of the organisation?
A: Technology has changed the working style of business organisations. It has become technology…
Q: using System; class Program { static void Main() { string text = "civic";…
A: Loop in C# It is used to run the loop statements for particular number of times. It is purely depend…
Q: B. Using Algebraic manipulation, simplify the following function. H(A.B.C.D)=(B +C )(A + D) D(AC+AB)
A: Simplify this function we use, Demorgan Theorm, Involution Law, Distribution, Distributive Law,…
Q: GIVE ME SOME EXAMPLES OF THE POSITIVE AND NEGATIVE OF ARTIFICIAL INTELLIGENCE
A: Introduction GIVE ME SOME EXAMPLES OF THE POSITIVE AND NEGATIVE OF ARTIFICIAL INTELLIGENCE
Q: What is an Internet Protocol address, and how do you get one? Is it true that mnemonic addresses are…
A: Introduction: An IP address, or simply a 'IP' address, is a specific address that identifies a…
Q: Is it Possible to Define System Characteristics?
A: Start: The system is a linked and designed collection of interdependent components that work…
Q: erface lay
A: Solution - In the given question, we have to define the network interface layer.
Q: It is unclear how a single individual might coordinate a distributed denial of service attack.
A: A distributed denial of service (DDoS) assault is one in which a gang utilizes numerous hacked…
Q: How would you sum up the evolution of wireless LAN technology in a few words?
A: Since the introduction of IEEE 802.11, some new IEEE wireless LAN protocols have emerged. IEEE…
Q: Is it true that Data Structures and Algorithms are no longer used in the age of Machine Learning?…
A: Introduction: If you need to tackle real-world problems and create a cool product or algorithm,…
Q: How about a comparison between RAM and ROM?
A: RAM and ROM are both types of computer memory.
Q: Investigate the significance of wireless networks in underdeveloped countries. For what reasons are…
A: Wireless networks allow your office: Justification A wireless network kind of computer network that…
Q: A PRIME number is a number whose factors are one and it itself. A COMPOSITE number is a number with…
A: INTRODUCTION: Here we need to create a C program that will input a number and determine if the…
Q: We'll demonstrate how to construct a botnet and how to use it in a DDoS attack in this post.
A: Introduction: The following points may be used in the construction of a botnet:
Q: In what ways may cloud storage and processing improve our lives?
A: NOTE :- Below i explain the answer in my own words by which you understand it well. The cloud…
Q: What is the cause of diskthrashing? What can you do to lessen the impact?
A: Disk thrashing(also called virtual memory thrashing) refers to a problem that occurs when the hard…
Q: ansport layer require
A: In linguistics, a segment is characterized as "any discrete unit in the surge of discourse that can…
Q: Explain in clearly what Intensive and Extensive reading are.
A: Definition of extensive studyingextensive reading can be defined as a informal reading done for…
Q: What's the difference between a prototype and a proof of concept?
A: A Prototype is often seen as the same thing as a a proof of concept but that's only because both of…
Q: Discuss how the Hough Transform feature extraction approach uses a voting mechanism to discover…
A: Introduction: The Hough transform is a feature extraction approach that is used in image analysis,…
Step by step
Solved in 4 steps with 3 images
- (Physics) a. The weight of an object on Earth is a measurement of the downward force onth e object caused by Earth’s gravity. The formula for this force is determined by using Newton’s Second Law: F=MAeFistheobjectsweight.Mistheobjectsmass.AeistheaccelerationcausedbyEarthsgravity( 32.2ft/se c 2 =9.82m/ s 2 ). Given this information, design, write, compile, and run a C++ program to calculate the weight in lbf of a person having a mass of 4 lbm. Verify the result produced by your program with a hand calculation. b. After verifying that your program is working correctly, use it to determine the weight, on Earth, of a person having a mass of 3.2 lbm.General math) a. Write a C++ program to calculate and display the midpoint coordinates of the line segment connecting the two endpoints given in Exercise 1a. Use the fact that the coordinates of the midpoint between two points with the coordinates x1,y1)and(x2,y2)are((x1+x2)/2,(y1+y2)/2). Your program should produce the following display (replacing the underscores with values your program calculates): ThexmidpointcoordinateisTheymidpointcoordinateis b. How do you know the midpoint values your program calculates are correct? c. After verifying the output your program produces, modify it to determine the midpoint coordinates of the line connecting the points (2,10) and (12,6). d. If your program doesn’t already do so, change its output to this: The x coordinate of the midpoint is xxx.xx The y coordinate of the midpoint is xxx.xx The xxx.xx denotes placing the calculated value in a field wide enough for three places to the left of the decimal point and two places to the right of it.(General math) a. Write a C++ program to calculate and display the value of the slope of the line connecting two points with the coordinates (3,7) and (8,12). Use the fact that the slope between two points with the coordinates (x1,y1)and(x2,y2)is(y2y1)/(x2x1). b. How do you know the result your program produced is correct? c. After verifying the output your program produces, modify it to determine the slope of the line connecting the points (2,10) and (12,6). d. What do you think will happen if you use the points (2,3) and (2,4), which results in a division by zero? How do you think this situation can be handled? e. If your program doesn’t already do so, change its output to this: The value of the slope is xxx.xx The xxx.xx denotes placing the calculated value in a field wide enough for three places to the left of the decimal point and two places to the right of it.
- Computer Science f(x)= Sin(x) – x 3 + C Where C = Max [0.15, (69/100)] x20, (x is in radian). Apply the false position method three iterations to find the root of the function (Decide the starting values of Xl and Xu yourself)(General math) The volume of oil stored in an underground 200-foot deep cylindrical tank is determined by measuring the distance from the top of the tank to the surface of the oil. Knowing this distance and the radius of the tank, the volume of oil in the tank can be determined by using this formula: volume=radius2(200distance) Using this information, write, compile, and run a C++ program that accepts the radius and distance measurements, calculates the volume of oil in the tank, and displays the two input values and the calculated volume. Verify the results of your program by doing a hand calculation using the following test data: radius=10feetanddistance=12feet.(Practice) a. To convert inches (in) to feet (ft), the number of inches should be multiplied by which of the following conversion factors? i. 12 in/1 ft ii. 1 ft/12 in b. To convert feet (ft) to meters (m), the number of feet should be multiplied by which of the following conversion factors? i. 1 m/3.28 ft ii. 3.28 ft/1 m c. To convert sq.yd to sq.ft, the number of sq.yd should be multiplied by which of the following conversion factors? i. 1 sq.yd/9 sq.ft ii. 9 sq.ft/1 sq.yd d. To convert meters (m) to kilometers (km), the number of meters should be multiplied by which of the following conversion factors? i. 1000 m/1 km ii. 1 km/1000 m e. To convert sq.in to sq.ft, the number of sq.in should be multiplied by which of the following conversion factors? i. 144 sq.in/1 sq.ft ii. 1 sq.ft/144 sq.in f. To convert minutes (min) to seconds (sec), the number of minutes should be multiplied by which of the following conversion factors? i. 60 sec/1 min ii. 1 min/60 sec g. To convert seconds (sec) to minutes (min), the number of seconds should be multiplied by which of the following conversion factors? i. 60 sec/1 min ii. 1 min/60 sec
- (Practice) Run Program 7.10 to determine the average and standard deviation of the following list of 15 grades: 68, 72, 78, 69, 85, 98, 95, 75, 77, 82, 84, 91, 89, 65, and 74.1. Supposed a ball is thrown straight up in the air with an initial velocity of 50 feet per second and an initial height of 5 feet. How high will the ball be after 3 seconds? Note: The height after t seconds is given by the expression - 16t+vot+ho, where ve is the initial velocity and he is the initial height.(General math) a. Design, write, compile, and run a C++ program to calculate the volume of a sphere with a radius, r, of 2 in. The volume is given by this formula: Volume=4r33 b. Manually check the values computed by your program. After verifying that your program is working correctly, modify it to determine the volume of a cube with a radius of 1.67 in.
- (Oceanography) The pressure, P, exerted on an underwater object can be determined by this formula: P=gh is the density of water, which is 1.94slug/ft3 . g is the acceleration caused by Earth’s gravity, which is 32.2ft/sec2. h is the object’s depth in the water in feet. a. Determine the units of P by calculating the units resulting from the right side of the formula. Check that your answer corresponds to the units for pressure listed in Table 1.1. b. Determine the pressure on a submarine operating at a depth of 2500 feet.(Automotive) a. An automobile engine’s performance can be determined by monitoring its rotations per minute (rpm). Determine the conversion factors that can be used to convert rpm to frequency in hertz (Hz), given that 1rotation=1cycle,1minute=60seconds,and1Hz=1cycle/sec. b. Using the conversion factors you determined in Exercise 7a, convert 2000 rpm into hertz.(Physics) a. Design, write, compile, and run a C++ program to calculate the elapsed time it takes to make a 183.67-mile trip. This is the formula for computing elapsed time: elapsedtime=totaldistance/averagespeed The average speed during the trip is 58 mph. b. Manually check the values computed by your program. After verifying that your program is working correctly, modify it to determine the elapsed time it takes to make a 372-mile trip at an average speed of 67 mph.