Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write a program to find the area and perimeter of a circle of given radius
# include
void main()
{
float radius, area, perimeter, pi=3.14;
printf("\nEnter the radius of the circle :\>");
scanf("%f",&radius);
area=pi*radius*radius;
/* Area of a circle=Pr2*/
perimeter=2*pi*radius;
/* Area of a circle=2Pr*/ printf("\nThe area of the circle is :%.2f",area);
printf("\nThe perimeter of the circle is :%.2f\n",perimeter);
/* "%.2f" - prints values upto 2 decimal places*/
getch();
}
Q. The work function of a metal surface is 6.626 X 10-19 joule. Compute the frequency of the radiation? Work function W = hγ o The fre
This step of systems examination is one of the most difficult. In this stage systems specifications are identified by asking what, who, when, where and how. A few questions address
The slowest sorting procedure is Bubble Sort is the slowest sorting process.
Q. Show the Divide and Conquer approach? Divide and Conquer approach is the way of making a complicated problem easier. In this approach larger problem (System) is divided int
What types of data entry services do you perform? Our business is to understand what data you require entered and in what particular format. After an initial analysis is perfor
What is the Network Service Access Policy A high-level, issue-specific policy which defines those services that are allowed or denied from the restricted network. It also co
How Online Databases Work? An online or web-based database keeps data on a cloud of servers somewhere on the Internet, which is accessible by any authorized user with an Intern
Illustrate the benefits of Functional model Functional model shows how values are computed. This model describes decisions or object structure without regard for sequencing. I
Q. Fundamental differences between RISC and CISC architecture? Fundamental differences between RISC and CISC architecture. The following table lists following differences:
Perform multiplication with showing the contents of accumulator, B register and Y register during each step. (Accumulator, B, Y are 4-bit registers) B=06 Y=02
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd