Write a program that prompts the user to enter two properties of the regular polygon: the number of sides and the length of each side. The program should then output the polygon's name followed by a number of sides, length of each side, perimeter, interior angle, apothem, and area. If the shape has fewer than 3 sides, the program will only report the name, number of sides, and length of each side. Numbers should be displayed with 4 digits of precision.

Answers

Answer 1

sides = int(input("Enter the number of sides: "))

length = float(input("Enter the length of each side: "))

This code prompts the user to enter the number of sides and the length of each side of a regular polygon. The input values are then stored in the variables sides and length, respectively.

The program starts by prompting the user to input two properties of the regular polygon: the number of sides and the length of each side. It then checks if the number of sides is less than 3. If it is, the program only prints the polygon name, number of sides, and length of each side, indicating that the shape has fewer than 3 sides.

If the number of sides is 3 or more, the program calculates the polygon's perimeter by multiplying the number of sides with the length of each side. It also calculates the interior angle of the polygon using the formula ((sides - 2) * 180 / sides). The apothem is calculated by dividing the length of each side by 2 times the tangent of π/sides. Finally, the area is calculated using the formula (perimeter * apothem) / 2.

The program then outputs the polygon's name (number of sides), length of each side, perimeter, interior angle, apothem, and area. All numerical values are displayed with four digits of precision using the `:.4f` format specifier.

Learn more about regular polygon

brainly.com/question/29722724

#SPJ11


Related Questions

Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.

Answers

Answer:

Redirection

Explanation:

This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.

Answer:

The  ismap  attribute is used in this case to identify the type of image map.

Explanation:

Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.

A personal idea is unique to the person who developed, discovered or created that idea.

Please select the best answer from the choices provided

Т (true)
F (false)

Answers

Answer:

True

All person have different ideas and discovery which make them unique in their own way

information security should be treated as a separate discipline and not integrated into all areas of information technology.

Answers

Information security should be treated as a separate discipline and not integrated into all areas of information technology: True

What is information security?

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

The types of security control.

In Cybersecurity, there are three (3) different types of security control and these include the following:

Management security.Physical security.Operational security.

Typically, information security is a field of computer science that should be treated as a separate discipline rather than being integrated into all areas of information technology

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

Information security should be treated as a separate discipline and not integrated into all areas of information technology. True or False?

what is a valid response when identity theft occurs

Answers

Answer:

Unsecure Passwords

Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which principal of programing should Alice review?

Hand coding
Line coding
Planning & Analysis
Sequencing

Answers

Answer:

Sequencing

Explanation:

I have taken the test

The line of the code to the right, will create a NumPy array from a list.

Answers

Answer:

True

Explanation:

What can you add to your presentation from the Insert tab?

Animations
Pictures
Variants
Transitions

Answers

Answer:

B. PICTURES

Explanation:

Answer:

I know its late but pictures is the answer.

Explanation:

I took the test and got it right.

Select the correct word to complete the sentence.
_______connections tend to be more reliable, secure, and faster than______
connections.
______connections tend to be more convenient than_______
allowing users to be more mobile.

Answers

Answer:

Wired, Wireless, Wireless, Wired

Explanation:

Answer:

Wired connections tend to be more reliable, secure, and faster than wireless connections. While wireless connections tend to be more convenient, allowing users to be mobile. Many businesses and homes use a combination of wired and wireless.

Explanation:

Edge 2022

Select the correct word to complete the sentence._______connections tend to be more reliable, secure,

Why is the list constructor commonly used to find an index of an array element? Select an answer: .
a. index returns the array value for a particular index.
b. The array must be stripped of redundant information.
c. Arrays are not ordered. .
d. index only works with lists.

Answers

The list constructor is commonly used to find an index of an array element because it is a data structure that is an ordered sequence of items in Python programming.

This implies that the elements are arranged in a specific order and can be accessed using an index, and a list in Python is simply a collection of items that are separated by commas, with the whole list being surrounded by square brackets ([ ]).

Moreover, lists are mutable, which means that they can be modified after they have been created by adding, deleting, or modifying elements in the list.

In addition, the indexing of list elements begins at 0, which means that the first element in the list has an index of 0, the second has an index of 1, and so on. This makes it easy to find the index of a specific element in a list using the list constructor and the index() method, which returns the index of the first occurrence of the specified element in the list.If the element is not present in the list, it raises a ValueError. For instance, given a list

L = [10, 20, 30, 40, 50],

To know more about constructor visit:

https://brainly.com/question/13267120

#SPJ11

Which of these is a rule for creating variable names?

Must start with a capital letter

Must start with a lowercase letter

Cannot include numbers

Cannot use an underscore to separate words

Answers

Answer:

Must start with a lower case letters

Please help me on this it’s due now

Please help me on this its due now

Answers

Answer:

All of the above because all the other factors are needed to be considered

A Question 1 (3 points) Retake question Listen ▶ Lyrics, melodies and underlying musical notes all refer to the.... sound recording copyright music copyright master recording mechanical license

Answers

Lyrics, melodies, and underlying musical notes all refer to the music copyright.

Copyright is the legal right that belongs to an artist, publisher, or producer to be the sole user of a literary, musical, dramatic, or artistic work. Copyright laws grant creators of original works exclusive rights to the use, distribution, and display of their works. Copyright infringement happens when someone uses a creative work without the owner's permission.

In the context of music, the term "copyright" refers to the protection provided to original songs and music compositions. Lyrics and musical notes that make up a song are both protected by copyright. This means that anyone who wishes to use, record, or reproduce the song or composition must first acquire the necessary rights or licenses.

The mechanical license, master recording, and sound recording copyright are all related to the music industry and refer to different types of licenses and rights granted to music producers, artists, and copyright owners.

The mechanical license is granted to anyone who wants to create a cover or new version of a song. The master recording refers to the final version of a song that is used for commercial purposes, and the sound recording copyright refers to the protection provided to the sound recording of a song or musical composition.

To learn about copyright here:

https://brainly.com/question/357686

#SPJ11

compare client/server and peer to peer network architecture in terms of cost,efficiency and network performance

Answers

Both client/Server and P2P network architectures have their advantages and disadvantages. Choosing the right architecture will depend on the specific needs of the organization, including the size of the network, available resources, and the level of control required.

Client/server and peer to peer (P2P) are two common network architectures that are used to connect devices in a network. In terms of cost, P2P networks are more cost-effective as they do not require a centralized server or infrastructure to operate. On the other hand, client/server networks require a dedicated server, which can be expensive to purchase, maintain and operate.

In terms of efficiency, client/server networks are generally more efficient as they provide centralized control over data and resources. This means that access to data and resources can be managed more easily, and it is easier to monitor network activity. However, P2P networks are more decentralized and offer more flexibility, making them suitable for smaller networks with limited resources.

When it comes to network performance, client/server networks generally provide faster and more reliable performance due to the centralized nature of the architecture. P2P networks, on the other hand, can suffer from slower performance as data is distributed across multiple devices, and there is no centralized control over network resources.

Overall, both client/server and P2P network architectures have their advantages and disadvantages. Choosing the right architecture will depend on the specific needs of the organization, including the size of the network, available resources, and the level of control required.

To Learn More About Server

https://brainly.com/question/27960093

SPJ11

1.) a.) Write a Temperature class to represent Celsius and Fahrenheit temperatures. Your goal is to make this client code work:
The following output must be met with no errors:
>>> #constructors
>>> t1 = Temperature()
>>> t1
Temperature(0.0,'C')
>>> t2 = Temperature(100,'f')
>>> t2
Temperature(100.0,'F')
>>> t3 = Temperature('12.5','c')
>>> t3
Temperature(12.5,'C')
>>> #convert, returns a new Temperature object, does not change original
>>> t1.convert()
Temperature(32.0,'F')
>>> t4 = t1.convert()
>>> t4
Temperature(32.0,'F')
>>> t1
Temperature(0.0,'C')
>>> #__str__
>>> print(t1)
0.0°C
>>> print(t2)
100.0°F
>>> #==
>>> t1 == t2
False
>>> t4 == t1
True
>>> #raised errors
>>> Temperature('apple','c') #doctest: +IGNORE_EXCEPTION_DETAIL
Traceback (most recent call last):
...
ValueError: could not convert string to float: 'apple'
>>> Temperature(21.4,'t') #doctest: +IGNORE_EXCEPTION_DETAIL
Traceback (most recent call last):
...
UnitError: Unrecognized temperature unit 't'
Notes:
In addition to the usual __repr__, you should write the method __str__. __str__ is similar to __repr__ in that it returns a str, but is used when a ‘pretty’ version is needed, for example for printing.
Unit should be set to ‘C’ or ‘F’ but ‘c’ and ‘f’ should also be accepted as inputs.
you must create an error class UnitError that subclasses Exception (it doesn’t have to anything additional to that). This error should be raised if the user attempts to set the temperature unit to something other than ‘c’,’f’,’C" or ‘F’
convert – convert does not actually change the current temperature object. It just returns a new Temperature object with units switched from ‘F’ to ‘C’ (or vice-versa).
if the user tries to set the degree to something that is not understandable as a float, an exception should be raised (you can get this almost for free)

Answers

The class needs a conversion method to switch between Celsius and Fahrenheit, as well as an error class to handle invalid temperature units.

To meet the requirements, we can define the Temperature class as follows:

class UnitError(Exception):

   pass

class Temperature:

   def __init__(self, value=0.0, unit='C'):

       self.value = float(value)

       self.unit = unit.upper()

       if self.unit not in ['C', 'F']:

           raise UnitError(f"Unrecognized temperature unit '{unit}'")

   def convert(self):

       if self.unit == 'C':

           converted_value = (self.value * 9/5) + 32

           converted_unit = 'F'

       else:

           converted_value = (self.value - 32) * 5/9

           converted_unit = 'C'

       return Temperature(converted_value, converted_unit)

  def __str__(self):

       return f"{self.value}{self.unit}"

   def __repr__(self):

       return f"Temperature({self.value},{self.unit})"

The Temperature class has an initializer that takes the temperature value and unit as arguments. It converts the value to a float and stores the unit in uppercase. If an unrecognized unit is provided, it raises a UnitError.

The convert method checks the current unit and performs the conversion accordingly. It returns a new Temperature object with the converted value and unit, without modifying the original object.

The __str__ method returns a formatted string representation of the Temperature object, displaying the value and unit.

The __repr__ method returns a string representation that can be used to recreate the Temperature object.

With the implementation of the Temperature class, the provided client code should work as expected, producing the desired output without any errors.

Learn more about method here:

https://brainly.com/question/30076317

#SPJ11

What is output? objects = {} objects['a'] = 'Chair' objects['b'] = 'Table' objects['c'] = 'Sofa' objects.clear() print(objects) a. {'a':'Chair', 'b':'Table', 'c':'Sofa'} b. {'Chair', 'Table', 'Sofa'} c. {} d. {'a', 'b', 'c'}

Answers

The output will be an empty dictionary since all the key-value pairs were removed using `objects.clear()`. So, the correct answer is (c) {}.

The output of the given code snippet is:

```
objects = {}
objects['a'] = 'Chair'
objects['b'] = 'Table'
objects['c'] = 'Sofa'
objects.clear()
print(objects)
```

Step 1: Create an empty dictionary called `objects`.
Step 2: Add key-value pairs 'a':'Chair', 'b':'Table', and 'c':'Sofa' to the `objects` dictionary.
Step 3: Use the `clear()` method to remove all the key-value pairs from the `objects` dictionary.
Step 4: Print the `objects` dictionary.

You can learn more about output at: brainly.com/question/13736104

#SPJ11


Fill is the inside color of a shape.
O
a. True
B. False

Answers

Answer:

True.

Explanation:

Fill describes the color of the area inside a designated shape. This statement is true.

the correct answer is true

does anyone like using acellus better than actual school? if so, are the final exams hard?

Answers

Some students may prefer using Acellus for its flexibility and personalized learning experience, while others may prefer attending physical schools. The difficulty level of final exams on Acellus can vary depending on the course and a student's preparation, but the platform offers resources to help students succeed.

It is possible that some students may prefer using Acellus over attending actual school. Acellus is an online learning platform that provides students with a flexible and personalized learning experience. The platform offers a wide range of courses and allows students to learn at their own pace, in their own time, and in a way that suits their individual learning style. This can be particularly appealing to students who struggle in traditional classroom settings, such as those with learning disabilities or those who prefer self-directed learning.

That being said, preferences can vary among individuals. While some students may prefer the flexibility and personalization offered by Acellus, others may prefer the structure and social interaction of attending a physical school.

As for the difficulty of final exams on Acellus, this can depend on the specific course and a student's preparation. Final exams are designed to assess the knowledge and understanding gained throughout the course, and the level of difficulty can vary accordingly. However, Acellus does provide students with a range of tools and resources to help them prepare for exams, including practice quizzes and tests, instructional videos, and interactive learning activities.

In summary, while some students may prefer using Acellus over attending actual school, preferences can vary among individuals. Final exams on Acellus can be challenging, but with adequate preparation and the right tools and resources, students can succeed and achieve their academic goals.

Know more about the Acellus click here:

https://brainly.com/question/28219281

#SPJ11

Answer: Yes I don't mind it.

Explanation: The exams are easy because you have brainly to literally give you all the answers. Its real easy because you can do it whenever you feel like it. For me I work during day to get that money up. Then do the school late after work at home. But anyways exam's are easy. Just sometimes long.

A Web application is configured to run on multiple servers. When a web server goes down, the user connected to it needs to re-login to the application. What could be the likely cause for this behavior?

a) Session state maintained by individual servers and not shared among other servers.

b) Browser cookies not shared between servers.

c) Server IP address changes

d) The user has to re-authenticate due to security reasons.

e) Browser using sticky session cookies

Answers

The likely cause for this behavior is that the application is not configured to use a shared session state across all servers. Without a shared session state, each server is responsible for maintaining its own session information, and when a server goes down, any user connected to it will need to log in again.

What is Server?
A server is a computer system or application that provides functionality for other programs or devices, called clients. A server can be used for many different tasks, such as serving web pages, hosting databases, serving files, and running applications. Servers are typically located on the network and are connected to the other computers on the network. Generally, servers are more powerful than regular desktop computers and have more storage capacity, allowing for the storage of large amounts of data.

To know more about Server
https://brainly.com/question/27960093
#SPJ4

What can handle work that is hard on a person and could cause repetitive injuries?

Answers

The robot which can handle work that is hard on a person and could cause repetitive injuries is a: Cobot.

Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing and handling tasks that are exclusively designed to be performed by humans or with human intelligence.

A cobot is an intelligent robot that is designed and developed to perform and handle work that may be too hard (difficult) and hazardous for a person or could cause repetitive injuries to him or her.

Read more: https://brainly.com/question/21656851

TRUE OR FALSE:
a video on how to repair your computer is a credible source.

Answers

Answer:

false

Explanation:

anyone can make videos ,people make mistakes

Answer:

false

Explanation:

Checks or safety procedures are put in place to protect the integrity of the system is referred to as?

Answers

answer:

system controls

Choose which type of translator you would use to develop a program written in a high-level programming language. Give three reasons to support your choice.​

Answers

Answer:

Compilers

Explanation:

A compiler takes the source code as a whole and translates it into object code all in one go. Once converted, the object code can be run unassisted at any time. This process is called compilation.

Compilers have several advantages:

-Compiled programs run quickly, since they have already been translated.

-A compiled program can be supplied as an executable file. An executable file is a file that is ready to run. Since an executable file cannot be easily modified, programmers prefer to supply executables rather than source code.

-Compilers optimise code. Optimised code can run quicker and take up less memory space

hope this helped :D

The type of translator that you would use to develop a program written in a high-level programming language is known as Compiler.

What is a high-level programming language?

The high-level programming language may be defined as a significant abstraction from the details of computer operation. It is designed to be easily understood by humans and for this reason, they must be translated by another software

A compiler significantly accepts the source code as a whole and successfully translates it into object code all in one go through the process of compilation. Compilers have several advantages. Some of them are as follows:

It compiled programs that run because they are already being successfully translated.A compiled program can be directly interpreted as an executable file that typically executes all essential and necessary functions.These compilers optimize code which improves performance, Reduced system load, protection for source code and programs, and improves productivity and quality.

Therefore, the type of translator that you would use to develop a program written in a high-level programming language is known as Compiler.

To learn more about Compiler, refer to the link:https://brainly.com/question/27049042

#SPJ2

g i r l s o n l y j o i n
id= ons jcuv jke

Answers

at least 20 characters long

a tech company currently has an on-premises infrastructure. they are currently running low on storage and want to have the ability to extend their storage using the aws cloud. which aws service can help them achieve this requirement?

Answers

This tech company can use AWS Storage Gateway help them achieve their requirement. In order to ensure data security, you can utilize the service to store data for scalable and affordable storage.

Why does technology provide services?

Technology as a Service, in contrast to conventional means of acquisition, does not result in ownership. It gives you access to or allows you to use the technology while it is still functional and offers more flexibility and scalability as your demands or those of your company change or as you develop.

What is a service and what does it do?

Services are fundamentally intangible actions that can be identified independently and satisfy needs. They don't actually become the owner of anything after their purchase. Services entail a real-world interaction between the service provider and the client.

To know more about service visit-

https://brainly.com/question/14720546

#SPJ4

What is iteration?????

Answers

Answer:

Iteration is a program repeated untill a condition is met

Explanation:

Explanation:

Iteration in programming means repeating steps, or instructions, over and over again. This is often called a ‘loop’.

Iteration is the repetition of a sequence.

Algorithms consist of instructions that are carried out (performed) one after another. Sometimes an algorithm needs to repeat certain steps until told to stop or until a particular condition has been met.

Which language gives instructions on how text should appear on a web page?
__Blank__ language gives instruction on how text should appear on a web page.

Answers

Answer:

HTML

HTML stands for HyperText Markup Language, so HTML gives you a way to “mark up” your text with tags that tell the browser how your text is structured.

Answer:

Markup language

Explanation:

Write a sub program to find the factors of a supplied number

Answers

Answer:

There are two options I can think of for you,

(Qbasic Code)

To Find the Factors of Given Number:

CLS

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END

To Find the Factors of Given Number Using COMMON SHARED:

DECLARE SUB factor ()

COMMON SHARED n

CLS

CALL factor

END

SUB factor

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END SUB

Which statement describes lossless compression?
OA. It is a method that converts temporary files into permanent files
for greater storage capacity.
B. It is a technique that accesses memory addresses to retrieve data.
C. It is a method that results in the loss of all the original data in a
file.
D. It is a technique that allows all of a file's data to be restored from
compressed data.
its d

Answers

D. It is a technique that allows all of a file's data to be restored from

compressed data. Lossless compression shrinks the image without sacrificing any crucial information.

More about lossless compression

A type of data compression known as lossless compression enables flawless reconstruction of the original data from the compressed data with no information loss. Since most real-world data exhibits statistical redundancy, lossless compression is feasible.

By utilizing a sort of internal shorthand to denote redundant material, lossless compression "packs" data into a smaller file size. Depending on the type of information being compressed, lossless compression can reduce an initial file that is 1.5 MB to roughly half that size.

Learn more about lossless compression here:

https://brainly.com/question/17266589

#SPJ1

Which of the following IP addresses ranges is reserved for Automatic Private IP Addressing?
a)169.254.0.1 - 169.254.255.254
b)255.255.0.0 169.254.0.0
c)121265594/525
d)None of these

Answers

The IP addresses ranges is reserved for Automatic Private IP AddressingThe correct answer is (a) 169.254.0.1 - 169.254.255.254.

The Automatic Private IP Addressing (APIPA) is a method that enables computers to self-assign IP addresses without the use of a DHCP server. When a computer is not able to obtain an IP address from a DHCP server, APIPA assigns an IP address that is within a reserved range of IP addresses.APIPA automatically assigns the following range of IP addresses:169.254.0.1 – 169.254.255.254.

IP addresses that fall outside the range of APIPA are considered to be valid, global IP addresses, so none of the other options are reserved for Automatic Private IP Addressing.255.255.0.0 169.254.0.0 is an invalid address as it contains a subnet mask and a default gateway.121265594/525 is not a valid IP address as it is not within any of the three classes of IP addresses.Hence, option (a) 169.254.0.1 - 169.254.255.254 is the only range of IP addresses reserved for Automatic Private IP Addressing.

Learn more about IP addresses: https://brainly.com/question/14219853

#SPJ11

in the event of a duplicate mac address shared by two hosts on a switched network, what statement is accurate?

Answers

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

What are the characteristics of OSPF?The following characteristics of OSPF: A large OSPF routing domain may support several hundred routers and a variety of network sizes. Rapid convergence—Promptly announces routing adjustments in response to changes in network topology. Loop-free: Uses the SPF method to compute routes without creating loops.An Interior Gateway Protocol (IGP) for the Internet, the OSPF (Open Shortest Path First) protocol is one of a family of IP Routing protocols that is used to disseminate IP routing information throughout a single Autonomous System (AS) on an IP network.

To learn more about  OSPF  refer,

https://brainly.com/question/28563937

#SPJ4

Other Questions
Question 1-9Which of the following describes impacts of warming oceans due to climate change?A) increased erosionB) decreased ice shelvesC) increased methane into the atmosphereD) decreased carbon diffused into the ocean A 50 mW laser beam is polarized horizontally. It then passes through two polarizers. The axis of the first polarizer is oriented at 30 degrees from the horizontal, and that os the second is oriented at 60 degrees from the horizontal. What is the power of the transmitted beam A manager wants to rearrange the shelves into 3 identical rows of short and tall shelves in each row Explain the conditions of Russia during the First World War Write the decimal equivalent of 35/99Question 6 options:A. There is no decimal equivalentB. 0.3535C. 0.3535....D. 0.35 Studies of cores obtained from continental glaciers and deep-sea sediment indicate that. Given h (x)=(g*f) (x), where h(x)= 2x - x - 6x + 3 and g(x)=2x-1, algebraically determine f(x) (2 marks) 100 Points For all graphs, be sure to correctly and completely label all axes and curves and use arrows to indicate the direction of any shifts.Assume that an economy is in a short-run macroeconomic equilibrium and experiences a negative demand shock.What will happen to real output and the price level as a result? Explain.Using a correctly labeled graph of the money market, illustrate the impact of the negative demand shock.What will happen to the price of previously issued bonds? Explain.What is one policy action that the central bank could take to offset the change in the nominal interest rate from part (b)? Assume a limited reserves system.Assume that the required reserve ratio is 5 percent. If the central bank wants to increase the money supply by $80 billion, what is the specific open-market operation (type and minimum value) that the central bank needs to conduct? A swimming pool can be filled at the rate of 25 liters per minute using a special pump. How many hours will it take to fill a pool that holds 5,000 liters of water? Round to the nearest hunredth. item 5 productivity is defined as: multiple choice A. output sold per hour. B. output produced per worker.C. workers employed per hour.D workers per unit of output. ABCD is a rhombus. Find m In response to aerobic exercise training, stroke volumeincreases due to:a. a reduced afterload.b. an increased preload.c. greater myocardial contractility.d. all of the above. Which is the best strategy for helping your community reduce noise pollution?A. Relocate to an area that is quiet and peaceful.B. Ban parades and street festivals from the neighborhood.C. Choose manual over motorized equipment for yard work. The maximum number of people allowed in a park is 8 people for every unused12-by-12-foot area. What is the maximum number of people allowed in this park?Explain the first day of shooting a movie, a director uses 30% of a film reel. The strip offilm used was 90 meters long.What is the standard length on a film reel? please help!! i will give brainliest! 3/10 divided by 2/4 What is the quotient of these fractions in the lowest terms ? What is x in : f(x)=7? A pyramid has a height of 10 inches and a base with an area of 21 square inches.Find the volume of the pyramid.35 in 370 in?210 in105 in 3 opposite of -1oposite of 0the opposite of the opposite of -7