in python Simple geometry can compute the height of an object from the object's shadow length and shadow angle using the formula: tan(angleElevation) = treeHeight / shadowLength. Given the shadow length and angle of elevation, compute the tree height.

Sample output with inputs: 0.4 17.5
Tree height: 7.398881327917831

Answers

Answer 1

Answer:

import math

angle = float(input('Enter Angle: '))

shadowLength = float5(input('Enter Shadow Length: '))

tree_height = math.tan(angle)*shadowLength

print('Tree Height = {}'.format(tree_height))

Explanation:

From the equation given, the first step is to derive the equation for calculating the Tree Height.

In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.

The program then prompts the user to input values for angle and shadow length.

The inputted values are converted to floats and used in the equation that was derived for Tree height.

Three height is evaluated and the result is printed to the screen

In Python Simple Geometry Can Compute The Height Of An Object From The Object's Shadow Length And Shadow

Related Questions

A computer science degree does not typically give students the necessary skills to easily learn a new computer language. True or False.

Answers

Answer:

False

Explanation:

the ____ is a type of chart which displays the information as a series of data points​

Answers

Answer:

Scattered Chart

Explanation:

Hope it helps you

to group worksheets together press and hold the _____ key​

Answers

Answer : to group worksheets together press and hold Ctrl key.

Match each number system to set of symbols used to represent numbers in that system.
binary
hexadecimal
Digits
the digits 0 to 9
0 and 1
decimal
the digits 0 to 9 and the letters from A to F
Reset
Next
Number System
>

Answers

Answer:

1. The digits 0 to 9 --> decimal

3. 0 and 1 --> binary

2. The digits 0 to 9 and the letters from A to F --> hexadecimal


Which of the following are the functions of an OS?
An OS is responsible for managing and coordinating activities on a computer. The OS delegates booting of a system to other parts of the
system. The OS allocates computer memory and CPU time to various applications and peripheral devices. After this, the CPU manages the
peripheral devices, while the OS acts as an Interface between the user and the peripherals.

Answers

Answer:

The OS allocates computer memory and CPU time to various applications and peripheral devices. After this, the CPU manages the peripheral devices, while the OS acts as an Interface between the user and the peripherals.

What device that will have the most network ports.

Answers

Answer:

switch device

Explanation:

because its purpose is to connect many devices.

Answer: SWITCH DEVICE

Explanation:

How does the CPU interface with the device to coordinate the transfer?

Answers

Explanation:

The CPU can initiate a DMA (Direct Memory Access) operation by writing values into special registers that can be independently accessed by the device, The device initiates the corresponding operation once it receives a command from the CPU.

Question: 4/8
List all the tests that you would do in order to test the
isosceles function that receives as parameter the length of
the three sides of one triangle (integer numbers) and returns
one Boolean (true when the triangle is isosceles and false
either when it is not or when it is not possible to build a
triangle because of the lengths of the sides).
Test case example: islsosceles (3,2,3)--> TRUE. Keep the
same format for the proposed test cases.
Clarification: a triangle is isosceles when it has at least two
equal sides.

Answers

The generated test cases for the function assuming another developer coded the function is given below in a C++ program.

THE CODE

#include <iostream>  

#include <iomanip>

#include <string>

using namespace std;

// define the data type "triangletype" with {values}

enum triangleType { scalene, isosceles, equilateral, noTriangle };

// Prototype function which returns the position of triangleType{value}

// Example: Scalene = 0, isosceles = 1, etc. These are zero indexed.

triangleType triangleShape(double a, double b, double c);

// Prototype function which takes the integer value of the

// triangle type and outputs the name of triangle

string shapeAnswer(int value);

int main() {

   double inputA;

   double inputB;

   double inputC;

   cout << "To determine whether a triangle is either:" << endl;

   cout << setw(50) << " - Scalene" << endl; // Unequal in length

   cout << setw(52) << " - Isosceles" << endl; // Two sides equal length

   cout << setw(54) << " - Equilateral" << endl; // All sides equal

   cout << setw(57) << " - Not a triangle" << endl;

   cout << "Enter side A: ";

   cin >> inputA;

   cout << "Enter side B: ";

   cin >> inputB;

  cout << "Enter side C: ";

   cin >> inputC;

   cout << "The triangle is " << shapeAnswer(triangleShape(inputA, inputB, inputC)) << endl;

}

triangleType triangleShape(double a, double b, double c) {

   triangleType answer;

   if ( c >= (a + b) || b >= (a + c) || a >= (b + c) ) {

       answer = noTriangle;

   }

   else if (a == b && b == c) {

       answer = equilateral;

   }

   // Test the 3 options for Isosceles equality

   else if ( (a == b) && (a != c) || (b == c) && (b != a) || (a == c) && (a != b) ) {

       answer = isosceles;

   }

   else {

       answer = scalene;

   }

   return answer;

}

string shapeAnswer(int value) {

   string answer;

  switch (value) {

   case 0:

       answer = "Scalene";

       break;

   case 1:

       answer = "Isosceles";

       break;

   case 2:

       answer = "Equilateral";

       break;

   case 3:

       answer = "Not a triangle";

       break;

   default:

       break;

   }

   return answer;

}

Read more about C++ programs here:

https://brainly.com/question/20339175

#SPJ1

Which menu option allows you to change the display to close-up, single, or multiple pages?

Answers

What is the question asking for?……

Describe the word paraphernalia in your own words​

Answers

Answer:

miscellaneous articles especially the equipment needed for a particular activity

A ______________ is responsible for transferring: Power, Data, Memory location and clock timing.

Answers

Answer:

Control Unit

Explanation:

Control unit is responsible for coordinating various operations using timing signals. The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the processor. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to the instructions that have been sent to the processor.

Answer:

I am pretty sure its the cpu.

Explanation:

Identify two clues a tester can take from the code when writing tests.

Answers

The two clues that a  tester can take from the code when writing tests are:

Always write tests before the code needed to pass them.The test prepares for the code's intended behavior.

What do code tests do?

In order to find flaws or problems throughout the software development process, code-based testing requires running over every line of code in a program.

The program is tested against specific test cases to determine whether it executes the necessary functionalities. Static and structural testing are two further subcategories of code-based testing.

Therefore, the evidence that a  tester can use in a program if they are writing some kinds of codes are those based on the code written.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

What are the 3 constraints for mineshaft headgear

Answers

The  3 constraints for mineshaft headgear

The ore, or metal often run out. There is issue of  Incompetence or faulty parts.Their structure can be complicated.What is Mine headgear constructions about?

Mine headgear constructions is known to be one that tends to aid the wheel method that is often used for suspending any kind of winding cables that moves workers and ore up as well as  down deep level shafts.

Note that the  The  3 constraints for mineshaft headgear

The ore, or metal often run out. There is issue of  Incompetence or faulty parts.Their structure can be complicated.

Learn more about mineshaft headgear from

https://brainly.com/question/24554365

#SPJ1

who is know as father of computer

Answers

Answer:

Babbage is sometimes referred to as "father of computing." The International Charles Babbage Society (later the Charles Babbage Institute) took his name to honor his intellectual contributions and their relation to modern computers.

Answer: Charles Babbage

The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?.

Answers

The miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.

What is Microprocessor?

A Microprocessor may be defined as a kind of miniature electronic device that significantly stores the arithmetic, logic, and control circuitry mandatory to carry out the functions of a digital computer's central processing unit.

Microchips are silicon devices that remarkably function as the central processing unit in the computer. These chips possess numerous electronic components which are utilized to carry out specific mathematical operations.

Along with this, these chips also migrate data from one memory location to another with the support of microprocessors.

Therefore, the miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.

To learn more about Microprocessors, refer to the link:

https://brainly.com/question/13164100

#SPJ1

Your question seems incomplete. The most probable complete question is as follows:

The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?

microchipelectronic circuitvacuum tubetransistor

You join Mountain Water Co – an expanding bottled water company as an information security officer. The company wants to do a lot of advertising of its bottled water products through its website. The CEO asks you to review the company website and report if it is secure. After talking to the webmaster you find out the following:


The Web server accepts all connections


No authentication is required

Self-registration is allowed

The web server is connected to the Internet

Is the situation secure? Select all that apply.


a.

Yes. There is no threat to a bottled water company so it is secure.


b.

There is insufficient information available to answer this question.


c.

No. Anything that is connected to the Internet is insecure.


d.

No. The system is allowing everyone to register. Only individuals who are associated with the company should be able to register.


e.

No. If there is no authentication, then anyone with access to the website online can access it. For good security only individuals with certain authorized roles should access a website.

Answers

In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.

What is meant by computer security?

Computer security is known to be a term that can be called cybersecurity. This is seen as a form of  protection of computer systems as well as information from any kind of harm, theft, as well as any form of unauthorized use.

Note that Computer hardware is seen to be protected by the same ways or methods that one uses to protect other valuable things.

In the above, there is no method of authentication and as such, In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.

Learn more about Computer security from

https://brainly.com/question/25720881

#SPJ1

Which of these is logically equivalent to x OR y?
NOT (x AND y)
NOT (NOT X AND NOT y)
O NOT X AND NOT Y
(x AND NOT Y) OR (NOT x AND y)

Can someone who actually knows plsssss reply now plsss help

Answers

Answer:

NOT (NOT x AND NOT y)

Explanation:

This is DeMorgan's theorem. Look that up for more details.

[tex]{\displaystyle {\overline {A\cdot B}}={\overline {A}}+{\overline {B}}} \newline \newline{\displaystyle {\overline {A+B}}={\overline {A}}\cdot {\overline {B}}}[/tex]

So

[tex]{A + B}=\overline{{\overline {A}}\cdot{\overline {B}}}}[/tex]

You can also compare them by creating a truth table.

[tex]\begin{tabular}{ c | c | c } x & y & x OR y \\ 0 & 0 & 0 \\ 0 & 1 & 1 \\ 1 & 0 & 1 \\ 1 & 1 & 1 \\\end{tabular}[/tex]

Dynamic Computer Programs Quick Check (Help pleasee!!)

Which best explains why many organizations want computer programs that are adaptable to different computing platforms? (1 point)

A. maintenance costs are lower across a single platform

B. lower maintenance costs, better user experience, and higher agility

C. not important to most companies

D. able to switch between platforms with no negative impact on user experience

2.why were different devices developed over time?

A. Computing and technical advances

B. To use different software

C. Experiment with new platforms

D. To integrate connectivity in new devices

3. What determines if a program is scalable?

A. Having the ability to be downloaded to different platforms

B. Accessible libraries

C. Memory storage

D. Stability during changes, upgrades, overhauls, and resource reduction

4. What is the difference between a single platform and a dynamic adaptive platform?

A. All programs that make use of the internet devices are dynamic

B. On a single platform, a device only functions in one type of environment like on the cloud or hardware whereas a dynamic adaptive platform can be downloaded from the could or installed on the hardware or accessed remotely via mobile

C. Single and dynamic platforms are the same, so there is no difference

D. Single platforms exclusively make use of networking tools

5. How does the concept “garage collector” affect a programs scalability?

A. The concept of scalability is itself invalid

B. Memory management does not impact scalability

C. The garage collector or (memory management) idea is not a valid concept

D. A good garage collector frees up more memory so programs can transition effortlessly into other platforms

Answers

The answer choice that best explains why many organizations want computer programs that are adaptable to different computing platforms is D. ability to switch between platforms with no negative impact on user experience.

The main reason why different devices were developed over time is A. Computing and technical advances

The answer choice that determines if a program is scalable is D. Stability during changes, upgrades, overhauls, and resource reduction

The difference between a single platform and a dynamic adaptive platform is B. On a single platform, a device only functions in one type of environment like on the cloud or hardware whereas a dynamic adaptive platform can be downloaded from the could or installed on the hardware or accessed remotely via mobile

What is a Computer Program?

This refers to the set of instructions that are given to a computer system to be able to execute specific tasks.

Hence, we can see that the way the concept “garage collector” affects a program's scalability is D. A good garage collector frees up more memory so programs can transition effortlessly into other platforms

Read more about computer programs here:

https://brainly.com/question/23275071

#SPJ1

HELP ASAP 100 points as i need answer soon

You join Mountain Water Co – an expanding bottled water company as an information security officer. The company wants to do a lot of advertising of its bottled water products through its website. The CEO asks you to review the company website and report if it is secure. After talking to the webmaster you find out the following:
The Web server accepts all connections


No authentication is required

Self-registration is allowed

The web server is connected to the Internet

Is the situation secure? Select all that apply.


a. Yes. There is no threat to a bottled water company so it is secure.


b. There is insufficient information available to answer this question.


c. No. Anything that is connected to the Internet is insecure.


d. No. The system is allowing everyone to register. Only individuals who are associated with the company should be able to register.


e. No. If there is no authentication, then anyone with access to the website online can access it. For good security only individuals with certain authorized roles should access a website.

Answers

Answer:

yes

Explanation:

but you need to open the website before asking this question

The ______________ and Internet connectivity provide the communication path and connection to the network.

Answers

Answer:

I chose router for this one too. I don't know if both the answers are router, but I got an A so it was either one was wrong or both were right.

Explanation:

The router and Internet connectivity provides the communication path and connection to the network.

What is internet connectivity?

Dial-up telephone lines, broadband connections that are constantly on, and wireless devices are all examples of "Internet connectivity," which is the phrase used to describe how individuals connect to the Internet. The most recent of them is a wireless connection to the Internet.

One or more packet-switched networks or subnetworks can be connected using a router. By sending data packets to their intended IP addresses, it manages traffic between different networks and permits several devices to share an Internet connection.

The router is a transformation of information from one to another packet.

Therefore, the router is the provider of connection to the network.

To learn more about internet connectivity, refer to the below link:

https://brainly.com/question/13600794

#SPJ2

Assume that your company provides IT systems integration consultancy for mid-size
manufacturing, distribution and logistics companies in the country. Having recommended and
implemented a Management Information Systems (MIS) for one on your leading clients, and
taken part in the training session of the MIS conducted by the vendor, develop a process model
with the appropriate tool set for the activities that must be performed by the sales ordering
module of the MIS to capture customer’s sales order for a named client. (Note: Your solution
must include (but not limited to) an explanation of the sales module of the MIS and the steps
involved in the sales order activities).
Discuss how information systems are useful for organizations?

Answers

Every company needs records of its actions in order to identify the root of issues and implement appropriate fixes. Storage of operational data, communication logs, documents, and modification histories can be done with the help of information systems.

Why is information system important?

By supplying organizations with information they can use to make informed decisions, information systems may help them make better judgments. An organization might, for instance, employ an information system to gather sales data, which will show which products are selling well and which are not. The things to promote or delete can then be decided using this data.

By processing data from company inputs to produce information that is valuable for managing your operations, information systems become important. You can either add more data to make the information more accurate or use the information in innovative ways to boost the usefulness of the information system.

By enabling managers and other organization leaders to store data in folders and documents that can be seamlessly shared with the right personnel, information systems help disseminate information.

Learn more about information systems on:

https://brainly.com/question/14688347

#SPJ1

Question 8
T
Many states are reducing property taxes for homeowners and extend financial aid for renters in the form of tax
credits.

Answers

Answer: Hey! What's the question?

Explanation:

list any three specification technology​

Answers

Answer:

descriptive, performance and detailed.

2. Five batch jobs A through E, arrive at a computer center at almost same time. They have estimated running times of 10, 8, 4, 2, and 6. Their priorities are 3, 5, 2, 4 and 1 respectively with 5 being the highest priority. For each of the scheduling algorithms determine the average turnaround time and waiting time. ((5+5+5+5) [Unit 2: process management]
a. Round Robin (Quantum=2)
b. FCFS
c. Priority Scheduling
d. SJF

Answers

I think the answe will be C

Answer the following questions in your own words.
[tex] \\ \\ [/tex]
1. What is the difference between tools and equipment?

2. Describe the word paraphernalia.​​

Answers

1. A tool is something more specific, used to do work. Tools are always equipment, but a pice of equipment is not always a tool. For instance a hammer and a saw are tools, and if you’re planning to build something they are part of your equipment for the job

2. The separate real or personal property of a married woman that she can dispose of by will and sometimes according to common law during her life

What is it called when a programmer includes a step in an algorithm that
allows the computer to manage its data so that the programmer can return to
it later?
OA. Sequencing
OB. Selection
C. Iteration
OD. Storage

Answers

Explanation:

sequencing is thecorrect answer .

Answer:

D.storage

just did it

Explanation:

your University wants to create a new department for university alumni. Every
employee has their own system credentials and they can use these credentials on any system inside the
building. how can you ensure the system authorization, availability and monitoring.

Answers

The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.

What is system credentials?

The system credentials is seen as a kind of Credentials that is known to be used for the verification of peoples identity as well as been used as a tools for authentication.

Note that they can be part of a certificate or other authentication act that helps to know the identity of a user's and as such, The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.

Learn more about system credentials from

https://brainly.com/question/4670419

#SPJ1

Given positive integer num_insects, write a while loop that prints, then doubles, num_insects each iteration. Print values ≤ 100. Follow each number with a space.


Sample output with input: 8

8 16 32 64

Answers

Using the knowledge in computational language in python it is possible to write a code that given positive integer num_insects, write a while loop that prints, then doubles, num_insects each iteration.

Writting the code:

num_insects = int(input('Enter num: '))

while (num_insects > 0) and (num_insects <= 100):

  print(num_insects, end='\n') # New line

  num_insects = num_insects * 2

See more about python at brainly.com/question/12975450

#SPJ1

Priya received an e-mail that appears to be from a social media website she has an account with. The e-mail asks her to confirm that she received the e-mail by replying with her password.
What should Priva do?
O ignore the e-mail and delete it © reply with her password © replv without including her password
O ask her friends how they responded

Answers

She should immediately ignore the email and delete it.

QUESTION 1
Match the description with the type of application is represented.
Application is capable of working offline
A Application is distributed and can run on more than one
machine
C.
B.
Application includes a client in the form of a web page
Application is designed to run a device like a smartphone
Application designed such that different parts of the
program runs on multiple computers
A. Distributed application.
B. Mobile application
C. Web application
D. Standalone application
E. Client-Server application

Answers

The matchup are:

Application is capable of working offline - D. Standalone application Application is distributed and can run on more than one machine - A. Distributed application.Application includes a client in the form of a web page - E. Client-Server applicationApplication is designed to run a device like a smartphone - B. Mobile application.Application designed such that different parts of the program runs on multiple computers - C. Web application.

What is a distributed application architecture?

This is know n to be when one or more local or remote clients tend to communicate with one or more servers that are known to be located on various computers connected by a network make up a distributed application.

Note that  Business operations can be carried out from any location through the use of this kind of application.

Therefore, Application is capable of working offline - D. Standalone application

Application is distributed and can run on more than one machine - A. Distributed application.Application includes a client in the form of a web page - E. Client-Server applicationApplication is designed to run a device like a smartphone - B. Mobile application.Application designed such that different parts of the program runs on multiple computers - C. Web application.

Learn more about Web application from

https://brainly.com/question/1254352
#SPJ1

Other Questions
A reconnaissance plane flies 615 km away fromits base at 918 m/s, then flies back to its baseat 1377 m/s.What is its average speed?Answer in units of m/s. What were some ways that traveling the world challenged the ways Europeans through about society resentment over domestic and foreign policy, economic issues, and tax issues led to shay's rebellion in 1786. Maps that adjust the size of area units based on the values of the data they depict are called a. flow-line maps. b. choropleth maps. c. cartogram maps. d. topographic maps. If angle YXZ measures 90 degrees, which statement is true?O. segment XZ is perpendicular to segment WYO. WX =XYO. segment XZ is a perpendicular bisector of segment WYO. X is the midpoint of segment WY In this part of the story the author , Paulo Coelho, states, Love is like a dam. What does this simile mean? Which question can help us avoid a decision that would injure our self-esteem?Multiple Choicea. Is it legal?b. Is it balanced?c. How will it make me feel about myself?d. How can I avoid taking the blame? Study the graph below, it represents a motion with 3 distinct parts. Pay particular attention to label on the y-axis. Using at least 1 complete sentence, describe what is happening during each part of the motion. [your answer must include words and phrases that describe motion. Suggested examples are things like accelerating, constant velocity, backward, forward, at rest, stop] At the end of the poem, the whole town comes out to see the drowned Lady of Shalott and to read her name on the tragic shipwreck. In the context of this poem, what can we learn from tragedy? Is there a lesson in this tragic poem, or some other purpose? Cite evidence from this text, your own experience, and other literature, art, or history in your answer. Do I have to do anything with number 2-3? If yes let me have the answer iron(Fe) has a bcc crystal structure, an atomic radius of 0.124nm, and an atomic weight of 55.85g/mol. what is the theoretical density Josie makes fruit punch by mixing fruit juice and lemonade in the ratio 3 : 2 She needs to make 40 litres of punch for a party. How much of each ingredient does she need? Fruit juice = litres Lemonade = litres [4] what the zero functions? f(x)=x^4-3x^3-4x^2 A survey of 800 school employees yielded the following information 430 were instructors 595 were full time faculty and 340 of the instructors were full time the local taco hut charges the same price for everything on its menu: $3 will buy a taco, or a burrito, or nachos. you buy the taco and think that if you had not purchased the taco, you would have purchased the burrito. the opportunity cost of the taco is: Which of the following are studied as a part of human geography?AgricultureEconomicsLandformsMigrationWaterWeather Which of the following describes braking from a brake chamber containing a power spring?A spring released and air-applied parking brakeA spring applied and air-released parking brakeA spring released and air-applied service brakeA spring applied and air-released service brake The Sugar Sweet Company will choose from two companies to transport its sugar to market. The first company charges $5500 to rent trucks plus an additional fee of $200.25 for each ton of sugar. The second company charges $5041 to rent trucks plus an additional fee of $225.75 for each ton of sugar. Suppose you are transported to a planet with twice the mass of earth, but the same radius of earth. Your weight would __________ by a factor of __________. a company's balance sheet shows cash of $37,000, accounts receivable of $43,000, equipment of $76,000, and equity of $85,000. what is the amount of liabilities?