Consider sending a file of 640Kbits from Host A to Host B over a circuitswitched network. Suppose that all links in the network use TDM with 24 slots and have a bit rate of 1.536 Mbps. Also suppose that it takes 500 msec to establish an end-to-end circuit before Host A can begin to transmit the file. How long does it take to send the file from A to B

Answers

Answer 1

It takes approximately 0.9167 seconds to send the file from Host A to Host B.

How long does it take to send a file of 640Kbits from Host A to Host B over a circuit-switched network, considering TDM with 24 slots, a bit rate of 1.536 Mbps, and a 500 msec circuit establishment time?

To calculate the time it takes to send a file from Host A to Host B, we need to consider the following factors:

File Size: The file size is given as 640 Kbits.

Transmission Rate: The transmission rate of the network is given as 1.536 Mbps.

TDM Slots: The TDM slots on each link are given as 24.

Circuit Establishment Time: The time taken to establish the end-to-end circuit is given as 500 msec.

First, let's calculate the time required to transmit the file content itself:

File Size = 640 KbitsTransmission Rate = 1.536 Mbps

Time to Transmit the File Content = File Size / Transmission Rate

= 640 Kbits / (1.536 Mbps)= 640,000 bits / (1,536,000 bits per second)= 0.4167 seconds

Next, we need to account for the circuit establishment time:

Circuit Establishment Time = 500 msec= 0.5 seconds

Finally, we add the transmission time and the circuit establishment time to get the total time taken:

Total Time = Time to Transmit the File Content + Circuit Establishment Time

= 0.4167 seconds + 0.5 seconds= 0.9167 seconds

Therefore, it takes approximately 0.9167 seconds to send the file from Host A to Host B.

Learn more about approximately

brainly.com/question/31695967

#SPJ11


Related Questions

Write a Python program to convert the characters to lowercase in a string

Answers

Answer:

Following is the program in the python language

st = 'sAN RaN'  #String

print(st.lower()) #display into the lowercase

Output:

san ran

Explanation:

Following are the description of program

Declared and initialized the string in the "st" variable .The lower function in python is used for converting the uppercase string into the lower case string .Finally in the print function we used lower function and display the  string into the lower case

what was tari's total standard machine-hours allowed for last year's output?

Answers

Tari's total standard machine-hours allowed for last year's output was not provided in the question. Therefore, I cannot give a specific number for the total standard machine-hours allowed.  Standard machine-hours allowed refers to the number of hours allocated for a specific task or production process based on predetermined standards.

It takes into account factors such as machine capacity, labor requirements, and materials used. Without knowing the specifics of Tari's production process and standards, it is impossible to determine the exact number of standard machine-hours allowed for last year's output.  To determine the total standard machine-hours allowed for last year's output, we would need to know the following information.

Tari's production process: What is the process for creating the output? This will help determine how many machine-hours are required to complete the task. Machine capacity: How many machines are available and what is their capacity? This will help determine the number of hours that can be allocated to each machine. Labor requirements: How many workers are needed to operate the machines and perform other tasks? This will help determine how many hours of labor are required. Materials used: What materials are used in the production process? This will help determine the amount of time required to process and handle the materials. Once we have this information, we can calculate the total standard machine-hours allowed for last year's output. However, since this information was not provided in the question, we cannot give a specific answer. To answer your question regarding Tari's total standard machine-hours allowed for last year's output, I will need some more information. Specifically, the standard machine-hours per unit and the total number of units produced last year. Once you provide that information, I can help you calculate the total standard machine-hours allowed.

To know more about allowed visit:

https://brainly.com/question/27281756

#SPJ11

A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files

Answers

Answer:

A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files? The user's device is rooted or jailbroken.

Input: you are given a spreadsheet where each row corresponds to a direct flight between a pair of airports. for example, (source airport: a departure at 8 am, destination airport: b estimated arrival 10:30 am). task: given a source s and a target airport t, our goal is to find a connected flight path that starts at s at 1 pm and arrives at t as early as possible. we must also ensure that the arrival at t is no later than 11 pm and the total layover does not exceed 4 hours. if no such path exists print 'null' example: input (s-1pm to a-3pm), (s-2pm to c-4pm), (a-4pm to b-7pm), (b-9pm to t-10pm), (c-8pm to t-9pm). output is s -> a -> b -> t . note that this path has a layover of 4 hours and the arrival time is 10 pm. the other path s -> c -> t is infeasible even with an earlier arrival time because its layover is 5 hours. give an efficient algorithm (to the best of your knowledge)

Answers

The process of doing laundry, the way we solve a long division problem, the ingredients for making a cake, and the operation of a search engine are all instances of algorithms.

An algorithm is a process used to carry out a computation or solve a problem. Algorithms are a precise list of instructions that, in either hardware-based or software-based routines, carry out predetermined operations step by step.

Algorithms are procedures for resolving issues or carrying out tasks. Algorithms include math equations and recipes. Algorithms are used in programming. All online searching is done using algorithms, which power the internet.

Learn more about algorithm here-

https://brainly.com/question/28724722

#SPJ4

a computer used as a component of a larger system is called question 2 options: an embedded system. a mainframe computer. a personal computer. a network. an operating system.

Answers

A computer used as a component of a larger system is called an embedded system. The correct option is a.

An embedded system is a computer system designed to perform specific tasks as part of a larger system or device. It is typically a microprocessor-based system that is built into and dedicated to a specific function. Embedded systems are used in a wide range of applications, such as automobiles, medical equipment, industrial control systems, and consumer electronics.

They are often designed to be low-power, compact, and highly reliable, and they may not have the same user interface or capabilities as a personal computer or other general-purpose computing device.

The correct option is a.

You can learn more about embedded system at

https://brainly.com/question/13014225

#SPJ11

list 20 specific purpose of application software​

Answers

Answer:

1. Word processing

2. Spreadsheet creation and analysis

3. Database management

4. Presentation creation and delivery

5. Graphic design and editing

6. Video editing

7. Music production

8. Web browsing

9. Email management

10. Project management

11. Time tracking and monitoring

12. Accounting and financial management

13. Inventory and supply chain management

14. Human resources management

15. Customer relationship management

16. Sales management

17. Marketing management

18. Education and training

19. Healthcare management

20. Scientific research and analysis

you need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. which port would you block to achieve this?

Answers

Port 80 would allow me to accomplish this if you needed to ban all unsecured web traffic using its default port from a certain network segment of the company network.

Hypertext Transfer Technology, a widely used internet communication protocol, is assigned port number 80. (HTTP). Uncoded web pages are transmitted and received on this network port by default.

What is the difference between port 80 and port 443?

While Port 443 supports HTTPS protocol, meaning all data traveling or between server and browser remains encoded, Port 80 supports HTTP protocol, meaning data traveling between the browser and server stays in text format.

To know more about browser click here

brainly.com/question/28504444

#SPJ4

How many screws secured the side panels

Answers

The answer to this question may significantly vary but normally there are two screws for each on each side of the panel on a mid-tower case.

What is the function of Screws?

The function of screws is to tighten the parts which are arranged in a complex arrangement. A Screw is a type of simple machine which visualize like an inclined plane that wounded around a complex arrangement with a pointed tip.

According to this question, very frequently there are two screws that can be secured to the side panels but there can be anywhere from one to six screws for the case is also seen in some kinds of systematic arrangements.

Therefore, the answer to this question may significantly vary but normally there are two screws for each on each side of the panel on a mid-tower case.

To learn more about Screws, refer to the link:

https://brainly.com/question/9620666

#SPJ1

rage against the machine’s sound is defined by

Answers

Rage Against the Machine's sound is defined by a fusion of heavy metal, punk rock, and hip hop.  Rage Against the Machine's sound is defined by a blend of rap, rock, and metal music, characterized by powerful guitar riffs, politically charged lyrics, and strong vocal delivery.

Rage Against the Machine's music features Tom Morello's unique guitar style that incorporates unconventional techniques such as scratching, and DJ effects. This, combined with the politically charged lyrics of lead vocalist Zack de la Rocha and the heavy and fast-paced rhythm section of bassist Tim Comerford and drummer Brad Wilk, creates a sound that is aggressive, powerful, and highly influential in the alternative and rap metal genres.

Rage Against the Machine's sound is a long answer that can be attributed to their unique fusion of heavy metal, punk rock, and hip hop, along with the distinctive styles of each band member.  Rage Against the Machine's sound is defined by a blend of rap, rock, and metal music, characterized by powerful guitar riffs, politically charged lyrics, and strong vocal delivery.

To know more about Machine's sound visit:

https://brainly.com/question/11768492

#SPJ11

Lucia is using the American Psychological Association (APA) style guidelines to writer her research paper. What is her most likely topic?
physical sciences
literature
social sciences
biology
ANSWER IS SOCIAL SCIENCES

Answers

Answer:

its C

Explanation:

According to the above scenario, Lucia's subject in the research paper is social sciences. Thus, option second is correct.

What is a research paper?

A research paper is a longer essay in which you give your own interpretation, opinion, or argument. When writing an essay, you apply all you know and have pondered about a subject.

The purpose of a research paper is to draw on what others have said about a topic and engage the sources in order to intelligently present a distinct viewpoint on the problem at hand, not just inform the reader what others have said about a topic.

The examination of how humans communicate with one another is known as social science. Anthropology, economics, political science, psychology, and sociology are all fields of social science.

According to the given circumstance, Lucia's research paper topic is social sciences. As a result, option two is correct.

Learn more about research paper here:

https://brainly.com/question/946785

#SPJ2

Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False

Answers

Answer:

I may be wrong but im pretty sure its true

Explanation:

True <3

what is the function of the desiccant bag inside an accumulator

Answers

the desiccant bag inside an accumulator functions as a moisture absorber, preventing the accumulation of moisture and maintaining a dry internal environment. This helps to protect the system components and ensure the optimal performance of the accumulator.

The function of the desiccant bag inside an accumulator is to absorb moisture or humidity that may be present in the system. The desiccant bag serves as a drying agent and helps to maintain the dryness of the internal environment of the accumulator.

Accumulators are hydraulic or pneumatic devices that store and release energy in the form of fluid pressure. They often contain a gas or fluid separated by a diaphragm or bladder. Moisture or humidity can be detrimental to the operation and performance of the accumulator, as it can cause corrosion, degradation of system components, and affect the efficiency of fluid or gas transfer.

The desiccant bag, usually filled with a moisture-absorbing material such as silica gel, is placed inside the accumulator to absorb any moisture that may enter the system. It helps to prevent the formation of condensation, which could lead to the accumulation of water droplets or moisture in the accumulator.

By absorbing moisture, the desiccant bag helps to maintain the dryness of the internal environment, ensuring the efficient and reliable operation of the accumulator. Regular inspection and replacement of the desiccant bag is necessary to ensure its effectiveness in moisture absorption.

To know more about desiccant ,visit:

https://brainly.com/question/30373591

#SPJ11

An article in the Transportation Research Part E Journal ["Arc Routing Problems to Restore Connectivity of a Road Network" (2016)] considered ways of re-establishing the connectivity of road networks after a natural disaster − earthquake. Estimates of the probabilities of a randomly chosen road being under light debris, moderate debris, and heavy debris conditions after different disaster magnitudes are shown in the following table. Disaster magnitude is equally likely to be low, moderate or high. Given that a road had light debris after an earthquake, what is the conditional probability that the disaster magnitude was low? Round your answer to two decimal places (e.g. 98.76). P=

Answers

The conditional probability that the disaster magnitude was low, given that a road had light debris after an earthquake, is approximately 0.33.

It applies Bayes' theorem to calculate the conditional probability of the disaster magnitude being low, given that a road had light debris after an earthquake.

Here's a summary of the solution:

Let P(A) be the probability that the disaster magnitude was low, and P(B) be the probability that a road has light debris.

P(A) = P(disaster magnitude is low) = 1/3 (since disaster magnitude is equally likely to be low, moderate, or high)

P(B) = P(Light debris) = 0.2 (given in the table)

The conditional probability P(A|B), which represents the probability of the disaster magnitude being low given that a road had light debris after an earthquake, is calculated using Bayes' theorem:

P(A|B) = P(B|A) * P(A) / P(B)

Where:

P(B|A) is the probability of light debris given that the disaster magnitude was low (from the table) = 0.2

Substituting the values:

P(A|B) = (0.2 * 1/3) / 0.2

P(A|B) = 0.33 (approximately)

Note: The solution provides a clear explanation of the steps involved and uses Bayes' theorem to calculate the required conditional probability.

Understanding the concept and applying the formula correctly is crucial in solving such probability problems.

To know more about magnitude visit:

https://brainly.com/question/31022175

#SPJ11

what is the functions of network layer ?

Answers

Functions. The network layer provides the means of transferring variable-length network packets from a source to a destination host via one or more networks.

which of the following are true about wpa3? (choose all that apply.) a. uses tkip b. requires pmf c. backward compatible d. strongest wireless encryption standard e. has only the enterprise variation

Answers

It requires PMF, backward compatible, and strongest wireless encryption standard. The correct options are b, c, and d.

What is WPA3?

The third version of the Wi-Fi Alliance's security certification procedure is called WPA3, or Wi-Fi Protected Access 3.

The most recent version of WPA2, which has been in use since 2004, is WPA3. In 2018, the Wi-Fi Alliance started certifying goods that had been WPA3-approved.

It requires the strongest wireless encryption standard, PMF, and backward compatibility.

Thus, the correct options are b, c, and d.

For more details regarding WPA3, visit:

https://brainly.com/question/30353242

#SPJ1




The Halloween Store

For the little Goblin in all of us!





Welcome to my site. Please come in and stay awhile.

I started this web site because Halloween has always been my favorite holiday.But during the last year,
I started selling some of my favorite Halloween products, and they've become quite a hit


If you click on the Personal link, you can browse my favorite Halloween pictures,stories and films.
And if you join my e list, will keep you up-to-date on all Halloween things


Product Categories



  • Props

  • Costumes

  • Special Effects

  • Masks


My guarantee


If you aren't completly satified with everting you buy from my site, you can return it for full refund.
No Question asked !


Answers

Welcome to The Halloween Store, where the spirit of Halloween comes alive! We are dedicated to bringing you the best Halloween experience and providing a wide range of products to make your celebrations unforgettable.

Explore our website and immerse yourself in the world of Halloween. Click on the "Personal" link to discover my favorite Halloween pictures, stories, and films that will surely get you in the spooky mood. Don't forget to join our e-list to stay updated on all things Halloween.

Browse through our product categories to find the perfect items for your Halloween needs. We have a diverse selection of Props, Costumes, Special Effects, and Masks to help you create the perfect atmosphere for your Halloween festivities.

We want you to be completely satisfied with your purchases, which is why we offer a guarantee. If for any reason you are not happy with your purchase, you can return it for a full refund, no questions asked.

Thank you for choosing The Halloween Store. Get ready to unleash your inner goblin and have a wickedly fun time!

To learn more about website

brainly.com/question/31073911

#SPJ11

What is burning in Computers and technology

Answers

The reason the term "burn" is used is because the CD-writer, or burner, literally burns the data onto a writable CD. The laser in a CD-writer can be cranked up to a more powerful level than an ordinary CD-ROM laser. This enables it to engrave thousands of 1's and 0's onto a CD.

So that is why people talk about "burning" songs or files to CDs. They could just say they are "writing" the data to a CD, and it would make sense, but people seem to think "burning" sounds cooler.

Answer:

Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems. Burn-in may be conducted to ensure that a device or system functions properly before it leaves the manufacturing plant or may be part of a repair or maintenance routine.

Explanation:

hope this helps

Assignment 4: Divisible by Three
ProjectSTEM
hello! I have no clue at all how to do this and need help.

Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.
Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.

Answers

For iterating through a series, use a for loop. This functions more like an iterator method seen in other object-oriented programming languages and is less like the for keyword found in other programming languages.

How to write program in loop ?

A high-level, all-purpose programming language is Python. Code readability is prioritised in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports a variety of programming paradigms, such as functional, object-oriented, and structured programming.

A while loop in Python is used to repeatedly run a block of statements up until a specified condition is met. And the line in the programme that follows the loop is run when the condition changes to false.

We can write the code in a simple way like this below :

n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

 num = int(input("Enter number: "))

 if num % 3== 0:

     divisible += 1

     print(str(num)+" is divisible  by 3")

 else:

     notdivisible += 1

     print(str(num)+" is not divisible by 3")

print("You entered "+str(divisible )+" even number(s).")

print("You entered "+str(notdivisible )+" odd number(s).")

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ1

Answer:n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

    divisible += 1

    print(str(num)+" is divisible  by 3.")

else:

    notdivisible += 1

    print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")

Explanation:

For that one that's I'm on python <3

Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.

Answers

What I think the highest is carbon dioxide . Because we use a lot of CO2 in every single day . So image that for 365 . We use a lot of carbon dioxide . In which that is ruining our earth

If you spend time on social media, you probably see many infographics. How can you determine whether the information contained in them is trustworthy? When you create infographics, what can you do to make it more likely that the viewer will trust you?

Answers

Answer:

Provide sources.

Explanation:

Providing sources for your infographic would be the best I can think of.

Either a direct quote, a source for a graph, etc.

In demand paging, when an excessive number of pages are moved back and forth between main memory and secondary storage, it is called ____.

Answers

A thrashing occurs where an excessive number of pages are moved back and forth between main memory and secondary storage,

What is a thrashing?

This is a phenomenon that occurs when the virtual memory is rapidly exchanging data for data on hard disk often at the exclusion of most application-level processing.

Hence, in a computer, the thrashing occurs where an excessive number of pages are moved back and forth between main memory and secondary storage.

Read more about thrashing

brainly.com/question/12978003

#SPJ1

Type the correct answer in the box spell all words correctly.
karl has designed an interactive stories website for kids. he has implemented an alphabetical format for browsing through the stories. which
structure will he use for easy navigation?
kart implements a
structure for users to advance through the chapters.
reset
nexus

Answers

Kart should implement a main navigation structure for users to advance through the chapters.

The types of navigation.

In Computer technology, there are three main types of navigation used on websites and these include the following:

Structural navigationUtility navigationAssociative navigation

In this scenario, Kart should implement a main navigation structure for users to advance through the chapters on this interactive stories website for kids.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

miles is an it consultant. he is given the specifications of a networking project for the new campus of a multinational corporation. among the requirements, switches and wireless access points (waps) must interconnect all nodes, the network must use hardware firewalls, and it must support single sign-on (sso). which network infrastructure does he select that fulfills these requirements?

Answers

A consultant for IT, Miles. A multinational corporation's new campus's networking project's requirements are presented to him. You require a modem as your main piece of hardware. Your required modem will depend on the kind of Internet access you select.

What is Local Area Network?

In a Local Area Network, a hub connects various computers. A switch is a type of networking equipment that joins various LAN segments together. Additionally, packet filtering and forwarding between LAN segments are supported by switches. Based on the physical address included in the incoming message, Switch sends the message to the appropriate recipient. A Switch does not broadcast the message to the full network like a Hub does. It establishes the device to which the communication is addressed.

To learn more about communication from given link

brainly.com/question/22558440

#SPJ4

Check ALL of the correct answers.
What would the following for loop print?
for i in range(2, 4):
print(i)
2
2
3
4.
1

Help now please

Answers

Answer:

2,3,4

Explanation:

Starts at two, goes to four. Thus it prints 2,3,4

What 5 factors determine the seriousness of a gunshot wound?

Answers

Bullet size, velocity, form, spin, distance from muzzle to target, and tissue type are just a few of the many factors that can cause gunshot wound.

The four main components of extremities are bones, vessels, nerves, and soft tissues. As a result, gunshot wound can result in massive bleeding, fractures, loss of nerve function, and soft tissue damage. The Mangled Extremity Severity Score (MESS) is used to categorize injury severity and assesses age, shock, limb ischemia, and the severity of skeletal and/or soft tissue injuries. [Management options include everything from minor wound care to amputation of a limb, depending on the severity of the injury.

The most significant factors in managing extremities injuries are vital sign stability and vascular evaluation. Those with uncontrollable bleeding require rapid surgical surgery, same like other traumatic situations. Tourniquets or direct clamping of visible vessels may be used to temporarily decrease active bleeding if surgical intervention is not immediately available and direct pressure is ineffective at controlling bleeding.  People who have obvious vascular damage require rapid surgical intervention as well. Active bleeding, expanding or pulsatile hematomas, bruits and thrills, absent distal pulses, and symptoms of extremities ischemia are examples of hard signs.

To know more about wound:

https://brainly.com/question/13137853

#SPJ4

Which component is responsible for collecting and consolidating data from network devices that are being monitored with snmp?

Answers

Answer:

A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.

The availability and accessibility of storage are critical concerns for enterprise computing. Traditional direct-attached disk deployments within individual servers can be a simple and inexpensive option for many enterprise applications, but the disks -- and the vital data those disks contain -- are tied to the physical server across a dedicated interface, such as SAS. Modern enterprise computing often demands a much higher level of organization, flexibility and control. These needs drove the evolution of the storage area network (SAN).

SAN technology addresses advanced enterprise storage demands by providing a separate, dedicated, highly scalable high-performance network designed to interconnect a multitude of servers to an array of storage devices. The storage can then be organized and managed as cohesive pools or tiers. A SAN enables an organization to treat storage as a single collective resource that can also be centrally replicated and protected, while additional technologies, such as data deduplication and RAID, can optimize storage capacity and vastly improve storage resilience -- compared to traditional direct-attached storage (DAS).

SAN architecture

A storage area network consists of a fabric layer, host layer and storage layer.

what is acceleration?

Answers

Explanation:

Acceleration is the name we give to any process where the velocity changes. Since velocity is a speed and a direction, there are only two ways for you to accelerate: change your speed or change your direction or change both.

The rate of change of velocity is called acceleration.

In Java, write a pay-raise program that requests a person’s first name, last name, and current annual salary, and then displays the person’s salary for next year. people earning less than $40,000 will receive a 5% raise, and those earning $40,000 or more will receive a raise of $2,000 plus 2% of the amount over $40,000. a possible outcome is presented in the figure below.

Answers

Here's a sample Java code for the pay-raise program that meets the requirements you mentioned:

The Java Program

import java.util.Scanner;

public class PayRaiseProgram {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       // Request user's information

       System.out.print("Enter first name: ");

       String firstName = scanner.nextLine();

       System.out.print("Enter last name: ");

       String lastName = scanner.nextLine();

       System.out.print("Enter current annual salary: ");

       double currentSalary = scanner.nextDouble();

       // Calculate salary for next year based on the rules

       double nextYearSalary;

       if (currentSalary < 40000) {

           nextYearSalary = currentSalary * 1.05; // 5% raise

       } else {

           nextYearSalary = 2000 + (currentSalary - 40000) * 1.02; // $2,000 plus 2% raise

       }

       // Display the result

       System.out.printf("Next year salary for %s %s: $%.2f", firstName, lastName, nextYearSalary);

       scanner.close(); // close the scanner to free resources

   }

}

When you run this program, it will prompt the user to enter their first name, last name, and current annual salary. Then, it will calculate the salary for next year based on the given rules and display the result in the format of "Next year salary for [first name] [last name]: $[salary]". Here's an example output:

Enter first name: John

Enter last name: Doe

Enter current annual salary: 50000

Next year salary for John Doe: $51000.00

Read more about Java programs here:

https://brainly.com/question/25458754

#SPJ1

Write a program to find the Perimeter and Semi- perimeter of a traingle.(Python)

Answers

This Python program takes user input of the sides of a triangle, calculates its perimeter and semi-perimeter, and displays the results. The code is mentioned below.

Here is a Python program to find the perimeter and semi-perimeter of a triangle:

# input the sides of the triangle

triangleSide1 = float(input("Put the first side's length: "))

triangleSide2 = float(input("Put the second side's length: "))

triangleSide3 = float(input("Put the third side's length: "))

# calculate the perimeter

perimeter = triangleSide1 + triangleSide2 + triangleSide3

# calculate the semi-perimeter

s = perimeter / 2

# print the results

print("Perimeter of the triangle = ", perimeter)

print("Semi-perimeter of the triangle = ", s)

In this program, we first take input from the user for the lengths of the sides of the triangle. We then calculate the perimeter by adding the lengths of all three sides. The semi-perimeter is then calculated by dividing the perimeter by 2.

Finally, the program prints the values of the perimeter and semi-perimeter.

This program prompts the user to enter the length of the three sides of a triangle, stores them as triangleSide1, triangleSide2, and triangleSide3, respectively. It then calculates the perimeter of the triangle by adding the lengths of all three sides, and stores the result in the variable perimeter.

The semi-perimeter of a triangle is half of its perimeter, so we calculate it by dividing the perimeter variable by 2 and storing the result in the variable s. Finally, the program prints out the values of the perimeter and s variables to display the results to the user.

Learn more about Python program here:

https://brainly.com/question/19792191

#SPJ4

Please help me debug this code! (image attached code.org)

Please help me debug this code! (image attached code.org)

Answers

Answer:

if (getProperty("skyButton", "checked" == getColor("Blue", "checked"))

   console.log("correct match");

else

   console.log("not matched correctly);

Explanation:

Other Questions
what is the effect of parents education on Population management a pile of coins, consisting of only dimes and quarters, is worth 4 dollars and 55 cents. there are 7 more dimes than quarters in the pile. find the number of dimes and quarters in the pile. 4AFind the volume of the cylinder.Use 3.14 for THINT: 2.06 no comma in theanswer.12 yd-40 yd match the cell reference to its definition 9. What is the vertex of the function? f(x) = 3x - 8x + 10 Please help, this is the unit test T^TITS ALSO, WORLD AREA STUDIESPresident Eisenhower feared the spread of communism in Vietnam becausea.he believed communism in Vietnam would lead to a communist world.b.he feared being attacked by the National Liberation Front (NLF).c.H o Chi Minh was killing million of his own citizens.d.none of the above. president bidens team discovered classified ________ in his home and private office. Wildhorse sells softball equipment. on november 14, they shipped $4600 worth of softball uniforms to sarasota middle school, terms 1/10, n/30. on november 21, they received an order from douglas high school for $2100 worth of custom printed bats to be produced in december. on november 30, sarasota middle school returned $470 of defective merchandise. wildhorse has received no payments from either school as of month end. what amount will be recognized as accounts receivable, net on the balance sheet as of november 30 Find the y-intercept of the line y = -8/5x -4 Manufactures microprocessors and caters exclusively to private manufacturers that produce high-end computers. which type of market does abc directly target? Picture the scenery outside your classroom or bedroom window. Describe it in TWO ways using imageryonce using figurative language and once using literal language.(THIS IS CRITICAL THINKING!!!) Surface area=Help me please thanks Pretend that you have to give instructions to someone who has never used an internet search engine before. Explain how you would prepare for that and how you would deliver the oral instructions. Then write the step-by-step instructions for how to search a topic in an internet search engine.no links the popluation of a town in the year 2000 was 400.if the population in the town increaded to 500 in 2010, what is the percent increase in the population What is -2x=-8-2y in slope intercept form Which expression is equivalent to Each year, White Mountain Enterprises (WME) prepares a reconciliation schedule that compares its income statement with its statement of cash flows on both the direct and indirect method bases. In its 2016 income statement, WME reported $440,000 for the cost of goods sold. WME paid inventory suppliers $380,000 in 2016, and its inventory balance decreased by $41,000 during the year. In its reconciliation schedule, WME should:a. Show a $19,000 positive adjustment to net income under the indirect method for the increase in accounts payable.b. Show a $19,000 positive adjustment to net income under the indirect method for the decrease in accounts payable.c. Show a $19,000 negative adjustment to net income under the indirect method for the increase in accounts payable.d. Show a $19,000 negative adjustment to net income under the indirect method for the decrease in accounts payable. can someone tell me if these is Linear or Quadratic the capacity of an elevator is either 15 children or 11 adults. there are 9 children in the elevator how many adults can get on? Which technology has most lowered inventory costs in industry? tablet computers robotics satellite communications just-in-time manufacturing