Answer:
System.out.println("Enter length:");
Scanner scan = new Scanner(System.in);
Double x = scan.nextDouble();
System.out.println("Enter 2 lengths:");
Double a = scan.nextDouble();
Double b = scan.nextDouble();
Rectangle rect = new Rectangle(x);
Rectangle rect2 = new Rectangle (a,b);
if (rect2.equals(rect)){
System.out.print("Congruent Rectangles");
}
else {
System.out.print("Different Rectangles");
}
}
}
Explanation:
HELP!!!!!
Your colleague has made a suggested change to an important document you are both working on. You disagree with their suggested change. They will be reviewing the changes you make before the final version of the document is submitted to your boss. You both work remotely and are in radically different time zones. What is the best step to take next?
The Quick Access tool bar allows you to customize the actions or commands you frequently use.
True
False
WHERE DO I GO TO DO THIS AND WHAT DO I WRITE?????
Write a pseudocode plan for your program.
Write the code for your program.
Test your program. Run it at least three times with different inputs.
Save your program as a .txt file for you cannot upload a .py file.
Evaluate your project using this rubric.
What to Submit
Submit the .txt file holding your program.
You can just look up "python ide online" on google and paste this code:
n = -1
count = 0
while n < 0:
n = int(input("We're checking to see if a number is prime or not! Enter a positive number: "))
if n % 2 == 0:
if n == 2:
print("{} is a prime number".format(n))
else:
print("{} is not a prime number".format(n))
else:
for x in range(n, 1, -1):
if n % x == 0:
count += 1
if count > 1 or n == 1:
print("{} is not a prime number".format(n))
else:
print("{} is a prime number".format(n))
I've written some code that checks to see if a number entered by the user is a prime number or not.
Sorry, but I'm not too good with pseudocode plans and all that. I hope this helps.
Answer:
import math
print("Let's solve ax² + bx + c = 0")
a = int(float(input('Enter a value for a: ')))
b = int(float(input('Enter a value for b: ')))
c = int(float(input('Enter a value for c: ')))
D = b*b-4*a*c
if (D<0):
print("Sorry, this equation has no solutions.")
elif (a == 0):
if (b == 0):
if (c == 0):
print("Every value of x is a solution")
else:
print("Sorry, this equation has no solutions")
else:
x = -c/b
print("The one solution is x={:.3g}".format(x))
elif (D==0):
x = (-b + math.sqrt(D)) / (2*a)
print("The one solution is x={:.3g}".format(x))
else:
x1 = (-b + math.sqrt(D)) / (2*a)
x2 = (-b - math.sqrt(D)) / (2*a)
print("This equation has two solutions: x={:.3g} or x={:.3g}".format(x1, x2))
Explanation:
Above is another little program to use the quadratic formula.
In a science study group, Leonardo explains how atoms make up molecules. Talia repeats what Leonardo says in her own words. How is Talia practicing active listening? She is reflecting on what has been said. She is politely disagreeing with Leonardo. She is asking Leonardo a lot of questions. She is focused on only important information.
Answer:
A she is reflecting on what leonardo said but in her own words
Explanation:
Answer:
A: She is reflecting on what has been said.
Explanation:
Edge 2020
Any application that wants to be displayed on the web must use the HTTP protocol
True
False
Answer:
true
Explanation:
Jon wants to set up a trihomed DMZ. Which is the best method to do so? A. use dual firewalls B. use a single firewall with only two interfaces C. use a single three-legged firewall with three interfaces D. use dual firewalls with three interfaces
Answer:
The correct option is C) Use a single three-legged firewall with three interfaces
Explanation:
DMZ is an acronym for a demilitarized zone.
A DMZ network is one is situated between the internal network and the Internet. It is supported by an Internet Security and Acceleration (ISA) server.
The interfaces you'd get with the DMZ network are
A public network (Internet Protocol-IP) address with a public interfaceAn internal network interface with a private network (IP) address A DMZ interface with a public network (IP) addressUnlike the back-to-back DMZ settings, a trihomed DMZ is unable to use private IP addresses. To use the trihomed DMZ, public IP addresses are a must suitable requirement.
Cheers!
Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above
Identify an advantage of writing HTML code manually.
You do not have to learn HTML.
You can figure out how the markup affects the function of the site.
You can see rendered HTML as you go.
Answer:
1. You retain 100% control over your site and where it is hosted
2. Free WYSIWYG sites aren’t really free
3. You make yourself seem irrelevant to clients
4. You understand your own code
5. Your own code is nearly always more efficient
6. Your own code is more secure
7. It’s easier to iterate your own code
8. Your own code is original
9. Writing your own code helps you grow as a developer
Explanation:
You can choose the points you want. let me know if you need any further information.☺️
Please rate if you happy
Brailliest if you want
Answer:
B. You can figure out how the markup affects the function of the site.
Explanation:
its the correct answer :)
A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet
ermano envia foto de lo que necesitas yo te ayudo
"prevention is better than cure" Justify this statment.
Answer:
Hope
you like it and helpful
CSS is a language that controls the way content on a web site appears. It uses_______ _____to
change the look of a page.
Answer:
I'm not sure what the answers are, but when someone is making a website from scratch, they tend to use CSS HTML and JS(javascript)
hope i helped ;)
Which term means an unsecure protocol used when remotely accessing a computer?
Transmission Control Protocol (TCP)
Secure Shell (SSH)
Telnet
Internet Protocol (IP)
Answer:
9Internet Protocol (IP)
Answer:
The answer is Secure Shell (SSH)
WILL MARK BRAINLIEST FOR ANYONES ANSWER!
What things would you consider if you were to make a dream computer with $5,000?
Speed:
Reliability:
Cost comparisons:
Ease of use:
Graphics and streaming media capabilities:
lastly, why you made these choices.
Answer:
just know that bit gonna be running when I make mine Imma have 720 fps btw today sponsored is nord VPN
If you're driving a car and know there's a motorcyclist around you, you should______. A. Not change your driving B. Check your blind spots frequently C. Remind them to wear a helmet D. Make wider turns than normal
b check your blind spots frequently i guess not sure
what format can be applied to text in excel?
You can apply accounting format,date,numbers, currency, percentage or even fraction
WRITE IN YOUR OWN WORDS:
What is a possible sign that your computer has been hijacked by Botware?
Answer:
One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.
Explanation:
why is hip hop and rap so popular
Answer:
its popular because hip hop and rap is a way for people to express themselves whether it be their feelings or something that happened in their life and it also evolved from different people
i emailed someone and im sure that they emailed back however it says nothing has arrived in my inbox what do I do
Answer:
report it or check ur spam mail or refresh the page
Explanation:
good luck figuring it out :)
Stay at least _____ behind the vehicle ahead of you at all times.
A. 3 seconds
B. 4 seconds
C. 3 car lengths
D. 4 car lengths
Answer:
B 4 seconds
Explanation:
You should stay 4 seconds away from a vehicle at all times at the same speed as the other vehicle or vehicles.
What does it mean to be proactive about internet safety?
Spending as little time online as possible to reduce the risk of problems.
Predicting problems before they happen so you can avoid them.
Finding the best way to solve a current problem so you can use it later.
Facing up to the consequences of your mistakes so you can learn from them.
Answer:
Predicting problems before they happen so you can avoid them.
Explanation:
You should avoid causing trouble, or partaking in it. Being safe on the internet helps reduce bullying, threats, depressing behavior, etc.
Question 5 of 25
Critics argue that socializing online:
O A. makes us socially savvy and aware.
B. limits the number of posts we read.
C. dilutes the quality of our relationships.
O D. decreases a user's popularity.
Answer: d
Explanation; Hopes this helps!!
Critics argue that socializing online dilutes the quality of our relationships. Thus, option C is correct.
What is socializing online?Online socializing refers to the exchange of information between individuals or groups that uses social media platforms to access and alter material including photos, status updates, music, videos, and more.
Socialization on the Internet describes how individuals communicate and the tools they employ to do so. Socialization refers to a culture's peculiar practices, dialect, and language.
They can increase understanding of already-held interests while introducing young people to new concepts and ideas. Additionally, by assisting users in learning about various cultures' ways of life and thinking, they can help users widen their perspectives.
Online socializing, according to critics, degrades the caliber of our connections. Option C is correct as a result.
Learn more about online here:
https://brainly.com/question/19546714
#SPJ5
The ______ is designed to store audio data on computers and/or digital music players.
A. waveform
B. audio file format
C. sample rate
D. bandwidth
Answer:
audio file formats of computer
A spreadsheet software program requires that users predefine each field’s data type. The software program is most likely programmed using a language that is
open.
predefined.
strongly typed.
weakly typed.
Answer:
Pretty sure its weakly typed
Answer:
strongly typed
Explanation:
I need help pleaseeee
Answer:
The Answer is C. Hope you get it right, Good Luck!!!
Answer:
The answer is B
Explanation:
To create a list, paragraph, or unordered list, you should use HTML code, whereas in CSS coding, you can change the overall font size of a tag using the font-size=(number) tag.
¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?
Answer:
In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help
The complete process for learning through repetition is to read, write, say, rest and revisit the information. Please select the best answer from the choices provided T F
Answer:
True.
Explanation:
The complete process for learning through repetition is to read, write, say, rest and revisit the information.
This ultimately implies that, when an individual indulge in learning through repetition, he or she would is strengthening the single memory trace and as such enhancing the learning process.
Hence, learning through repetition such as reading, writing, saying, resting and revisiting the information is very effective because it engages and activates the visual, auditory, tactile and kinesthetic neural pathways to the brain.
Additionally, it is advisable to wait for about ten (10) minutes in between the repetition process when learning through repetition.
Answer:
True
Explanation:
Just took the quiz.
what type of formula uses data from multiple worksheets
a. abstract formula
b. hyper formula
c. 3D formula
d. unbounded formula
Answer: I think its 3D formula
Explanation: ...
Which component in a CPU is responsible for transferring
data from one functional component to another?
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
Answer:
a,b,c,e
Explanation:
Answer:
Quit your bickering in the replies on the other answer, this is correct.
Explanation:
Who you think is better? Ninja or TFue ,btw do you know who icebear is?
Answer:
no, no i dont think i will.
Explanation: