given sphereradius, compute the volume of a sphere and assign spherevolume with the result. use (4.0 / 3.0) to perform floating-point division, instead of (4 / 3) which performs integer division. volume of sphere

Answers

Answer 1

The Java program for the radius of the Sphere is as shown below.

How to create a Java Program?

/*

Given sphereRadius and piVal, compute the volume of a sphere and assign to

sphereVolume. Use (4.0 / 3.0) to perform floating-point division, instead of

(4 / 3) which performs integer division.

Volume of sphere = (4.0 / 3.0) π r^3

*/

int main() {

  const double piVal = 3.14159;

  double sphereVolume = 0.0;

  double sphereRadius = 0.0;

  //sphereRadius = 1.0;

cout << "Sphere Radius: ";

cin >> sphereRadius;

  /* Your solution goes here  */

double sphereCube = sphereRadius * sphereRadius * sphereRadius;

sphereVolume = (4.0 / 3.0) * piVal * sphereCube;

  cout << "Sphere volume: " << sphereVolume << endl;

  return 0;

Read more about Java Program at; https://brainly.com/question/18554491

#SPJ1


Related Questions

Pradeep and his cousin went to the corner store to buy candy. His cousin paid and told Pradeep he could pay him back. "You owe me 4⁄5 of a dollar," laughed his cousin. "How much is that?" Pradeep asked. "You tell me!" his cousin replied. How much does Pradeep owe his cousin?

Answers

Answer:

"It is 80 cents"

Explanation:

In order to calculate how much this actually is, we would need to multiply this fraction by the value of a whole dollar which is 1. We can divide the fraction 4/5 and turn it into the decimal 0.80 which would make this much easier. Now we simply multiply...

0.80 * 1 = $0.80

Finally, we can see that 4/5 of a dollar would be 0.80 or 80 cents. Therefore Pradeep would answer "It is 80 cents"

computing is the provision of IT services on demand.
a. Mobile
O b. Utility
O c. Portable
O d. Grid

Answers

Answer:

The correct option is;

b. Utility

Explanation:

The pay-and-use or utility computing is an IT service provisioning service whereby the IT or computing service provider makes available infrastructure and other resources required for completing IT related tasks and offer charges based on the extent of usage by the customers in a model based on utility so as to maximize efficiency

Therefore, utility computing is the provision of IT services on demand

True or false binary code is a base ten system

Answers

Answer:

false it is a two base system

Which of the following is the biggest issue facing wireless communication today?
O deregulation
O cost of technology
O monopoly of services
O threats to privacy
** if you can help me with this unit pls comment

Answers

Answer:

threats to privacy

Explanation:

To identify the effect in a text, you can ask yourself which question?

A. What happened?

B. Why did this happen?

C. How did the person feel?

D. Where did this happen?

Answers

Answer:

why did this happen?

Explanation:

effect means what caused it so You should ask why did this happen or (what caused it)

A. What happened? I’m sorry if this is wrong

while developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. the programmer forgets to remove this functionality prior to finalizing the code and shipping the application.

Answers

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. the programmer forgets to remove this functionality prior to finalizing the code and shipping the application. This describes the backdoor security weakness.

When developing a network application, it's important to be careful of potential security weaknesses. One such weakness is known as a "backdoor." This is when a programmer includes code that allows them to access the running program without authentication. This can be used to capture debugging data, but it also leaves the program open to potential attacks.

Forgetting to remove this functionality prior to finalizing the code and shipping the application is a serious mistake. If an attacker finds the backdoor, they can exploit it to gain access to the program or data. This can lead to data loss or theft, and in some cases, ransomware attacks.

To avoid these risks, it's important to carefully check your code for any potential backdoors before shipping it. If you do find one, make sure to remove it and secure the program before releasing it to the public.

Learn more on backdoor security weakness here:

https://brainly.com/question/27996068

#SPJ4

What are the three control statements in Qbasic?​

Answers

Answer:

branching statement

looping statement

the application you attempted to authenticate to is not authorized to use cas. contact your cas administrator to learn how you might register and integrate your application with cas.

Answers

If you're seeing this error message, it means that the application you're trying to authenticate with is not authorized to use CAS. CAS is a Central Authentication Service that allows applications to securely authenticate users.

If you're the administrator of the application in question, you'll need to register and integrate your application with CAS. This process is usually pretty straightforward, and there are plenty of resources available to help you get started.

If you're not the administrator, you'll need to contact the CAS administrator to resolve the issue. In most cases, they'll be able to help you get set up with the necessary credentials.

Learn more on CAS here:

https://brainly.com/question/26986135

#SPJ4

WILL GIVE BRAINLIEST! The command simplify is used if you only want the first two digits of a decimal to appear in the interpreter.

true

false

Answers

Answer:

falsee?

Explanation:

Answer:

Yes its false i believe

Explanation:

Copying materials from a source text without using____ is considered plagiarism.
A)quotation marks
B)the internet
C)a computer
D)punctuation

Answers

Answer:

A) quotation marks

Explanation:

When copying materials from a source text, using quotation marks allows you to identify which part is from the author of the source.

A) quotation marks

When directly quoting a text piece, always use quotation marks

explain why the existence of these potentially confounding variables prevents drawing the conclusion that moderate drinking is the cause of reduced risk of heart disease

Answers

The explanation of the existence of these potentially confounding variables prevents drawing the conclusion that moderate drinking is the cause of the reduced risk of heart disease is given below:

This is because the confounding variables that need to be considered are the associations are the frequency of alcohol consumption, drinking pattern shows a relationship between the pattern of drinking and different beverages.

What is a Confounding Variable?

This refers to the third variable that has an effect on both the independent and dependent variables

Hence, we can see that The explanation of the existence of these potentially confounding variables prevents drawing the conclusion that moderate drinking is the cause of the reduced risk of heart disease is given below:

This is because the confounding variables that need to be considered are the associations are the frequency of alcohol consumption, drinking pattern shows a relationship between the pattern of drinking and different beverages.

Read more about confounding variables here:

https://brainly.com/question/10863424

#SPJ1

Why is the term RAW image file generally used to describe a variety of file formats, which are sometimes known as digital raw captures?

Select one:
a. because RAW files are fluid and can be whatever the photographer wants them to be
b. because RAW files were designed to encompass everything other than JPEG
c. because RAW files are proprietary
d. because RAW files are non-proprietary

Answers

Answer:

c. because RAW files are proprietary.

Explanation:

When scanners and digital cameras are used to capture images that are uncompressed or minimally processed image file, it is known as a RAW image file.

Generally, this file type are usually very large in size because of their lossless quality and does not have any alteration and as such have not been processed; thus, cannot be printed.

The term RAW image file is generally used to describe a variety of file formats, which are sometimes known as digital raw captures because RAW files are proprietary.

a. What is MS-Word ? Write its uses.

Answers

Answer:

MS word is Microsoft word and you can use MS Word in daily life and business to create professional-looking documents such as resume, letters, applications, forms, brochures, templates, business cards, calendars, reports, eBooks, and newsletters in speed with high quality.

Explanation:

Answer:

MS-Word is the popular word processor developed by Microsoft corporation, USA which allows us to create documents like notes, letters, memos, reports, etc.

uses of Ms - word are:-it helps us to prepare a document in nepali language.It provides many facilities to format a document .it helps to create documents.it is helpful in inserting tables, pictures and charts in a document .

hope it is helpful to you ☺️

Date:
Pages
who invented Pascaline? Explain its features​

Answers

Answer:

I jus need mo pointssssssssssssssssss

blaise pascal invented it. it’s the first calculator to be produced in and quantity and actually used.

I need help..
I am just trynna see if I can make an app
But it says
Debug Signing Certificate
And literally I know nothing about it
So if somebody can give me an example
I'll be very grateful
But please no cheating
And copying as well

Answers

Answer:

which app are u using u should use Android studio or if u are using mac book use xcode

The quick access toolbar can be customized, but the ribbon can not be customized. True or false?.

Answers

It is false that the quick access toolbar can be customized, but the ribbon can not be customized.

Based on the support website:

There are several commands in the resizable Quick Access Toolbar that are unrelated to the ribbon tab that is now shown. The Quick Access Toolbar can be moved from one of the two potential positions, and buttons that correspond to instructions can be added to the Quick Access Toolbar.Your ribbon can be customized to display tabs and commands in the order you like, hide or reveal the ribbon, and conceal instructions you don't use frequently. A customized ribbon can also be imported or exported.

Learn more about quick access toolbar https://brainly.com/question/17441291

#SPJ4

what is a thoughtware​

Answers

Explanation:

plzz write it and plzzzz Mark me brainliest

The physical parts of a computer are called application software.

Answers

Ok so what was the question

Answer:

false

Explanation:

You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows some accounts have been compromised, with their login and passwords overwritten by the hackers. They need to reset the accounts that the hackers have changed the passwords on. However, they don't have access to the passwords directly, and the change records were corrupted by the attack. They need students and staff to confirm their passwords by logging into a secure site. If the login fails, they'll know your account was compromised and reset your account immediately.
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments phone number and call them about the email.
b.) This is a serious issue, and the email came from the head of IT. The site also shows that it's secure. The longer it takes to reset accounts, the longer the hackers will have access to your account. Follow the instructions in the email from the head of IT.

Answers

Answer:

a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.

Explanation:

This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.

Hope this helps!

What is the "middle" value for the "vertical-align" property based on?
a) a line's x-height
b) the height of the age
c) the shortest element on a line
d) the number of elements on a line

Answers

Answer: a) a line's x-height.

Explanation: The middle of the parent element is calculated by taking the x-height, halving it, and adding it to the baseline. Therefore, the "middle" value for the "vertical-align" property must be also based on the line's x-height.

1) which of the following is not a characteristic of valuable information?

A) irrelevant B) Up-to-date

C) Accurate D) Reliable

2) Which of the following is another name for primary storage?

A) CPU B) ROM

C) RAM D) CD drive

3) One of the following is smallest unit of memory?

A) Bit B) Byte

C) kilobyte D) megabyte

Answers

Answer

1. A

2. C

Explanation:

1. Information that is irrelevant is not a characteristic of valuable information.

2. Another name for primary storage is RAM (Random Access Memory).

3. Bit is the smallest unit of memory.

Computers are electronic devices that help process and store information. They also help in making our lives easier with their fast computational ability and process.

Computers have become one of the most important devices in our daily lives. This electronic device is also made up of different parts that all play a huge part in how well the device functions. Random Access Memory or RAM is the primary storage of a computer. And in accessing any information, irrelevant details are not part of valuable information. And in terms of memory, bit is the smallest unit, followed by byte, kilobyte, megabyte, gigabyte, and so on.

Thus, the correct answers are options A), C), and A).

Learn more about computers here:

brainly.com/question/23781325

What would a match() property that passed the expression /^[0-9]/ check for?
A.
all strings that do not contain numerals
B.
all strings that contain only numerals
C.
all numeric values
D.
all strings that contain numerals but start with ^
E.
a string that contains only one numeral between 0 and 9

Answers

Answer:

E

Explanation:

I took the test

Answer:

B.  all strings that contain only numerals

Explanation:

Information stored on CD-ROM disc must be read and then erased.True or false?​

Answers

Answer:

False

Explanation:

A method of changing unproductive thoughts into constructive ones is called

meditation.
visualization.
positive self-talk.
deep breathing.

Answers

A method of changing unproductive thoughts into constructive ones is called meditation. Hence, option A is correct.

What is unproductive thoughts?

An inclination or habit is a mindset that doesn't offer any benefits, effects, or results. Such a mindset pulls the client's focus away from his goals, fulfillment, and empowerment. Negative thoughts may be part of an unproductive mindset.

Overthinking, sometimes referred to as rumination, is when you keep returning to the same idea or event in your mind until it starts to interfere with your life. The two primary forms of overthinking are worrying about the future and brooding on the past.

People who have previously faced difficulty for which they were unprepared may get into the habit of catastrophizing.

Thus, option A is correct.

For more information about unproductive thoughts, click here

https://brainly.com/question/16875515

#SPJ6

Answer:positive self talk

Explanation:

as the interval of time during which every runnable task should run at least once. the linux cfs scheduler identifies as the interval of time during which every runnable task should run at least once. virtual run time targeted latency nice value load balancing

Answers

The Linux CFS scheduler identifies option B - targeted latency as the interval of time during which every runnable task should run at least once.

What is target latency in CFS?

The CFS scheduler is known to be made up of a target latency, and this is said to be the minimum amount of time that is known to be the ideal form to an infinitely small timeframe which is needed for all  runnable task to be able to get at least a single  turn on the processor.

Note that the CFS is seen as a kind of an implementation of  a detailed form of classic scheduling algorithm known to be called weighted fair queuing.

Therefore, based on the above, The Linux CFS scheduler identifies option B - targeted latency as the interval of time during which every runnable task should run at least once.

Learn more about latency from

https://brainly.com/question/14170094
#SPJ1

The Linux CFS scheduler identifies ____ as the interval of time during which every runnable task should run at least once

A. virtual run time

B. targeted latency

C. nice value

D. load balancing

HI IM DORAS SISTER AND IM ASKING IF YOU GUYS COULD HELP ME FIND MY SISTER PLS AND THANK YOU.

Answers

?????????????????????????????????????????

Answer:

BRO SHES IN SWIPERS CRIB

Explanation:

I JUS SAW YOUR GIRLLLL

3 advantages

of building in SDLC​

Answers

Answer:

better management control over the entire development project transparency and visibility of all process. clarity of requirements

Old systems can be useful when designing new computer software.
True or False

Answers

True! Just ask Apple incorp
correct answer:
True

The following program is run. Then the user click the "bottomButton TWO TIMES, What will be displayed in the console
1
onEvent("topButton","click", function ()
2
console.log("aaa"
3
4.
console.log("bbb");
5
onEvent( "bottomButton", "click", function() {
6
console.log("ccc");
7
)

Answers

Answer:

10

Explanation:

if a lockout relay becomes defective, it should be replaced with an exact duplicate, sometimes called a(n)?

Answers

Impedance relay is a condition where a lockout relay becomes defective, it should be replaced with an exact duplicate.

A locking relay can be defined as an electromechanical relay that locks its output contacts. As the name suggests, this relay once operated locks the circuit. Locking means the circuit cannot be normalized until and unless this relay is reset.

Lockout relay works when the safety switches are closed, the resistance through them is very small. In this case, I show a 0.1-ohm resistance through the safety circuit. Since the total circuit resistance is only 10 ohms, the potential difference across the switches is only 0.24V. that way, the coil of the locking relay cannot be energized enough.

Learn more about Lockout relay here brainly.com/question/28171151

#SPJ1

Other Questions
what's an example of conflict with nature Which of these is a primary source about the discovery of the New World? A book written and researched by a noted historian An article written by an archaeologist who excavated in the Caribbean A journal written by Christopher Columbus on one of his voyages A document sent to New World miners by a Spanish official Remember : anything can be graphed using an ______ how many moles are there in 1578 grams of Ba3(C6H6O7)2 When I was eight years old, I dreamed of going to middle school. Iwatched my older brother swagger out of the middle school doorsevery afternoon and secretly wished I could be in such a cool place.Now that I'm in seventh grade, I have changed my wish. I long for thesimplicity of elementary school.In elementary school, I had one teacher. My typical middle school daybrings me face-to-face with six teachers! One is my PE teacher, whoconstantly teaches us the rules of different sports - gone are the daysof PE classes filled with running around, fun games, and freedom. Inaddition, each of my five other teachers assigns homework, whichmeans a seriously heavy backpack to carry home every afternoon. Myelementary teacher sent home only a single folder with homeworkeach day. Oh, to be eight years old again!Which statement best describes how text structure contributes to thedevelopment of ideas in this passage?A:The compare and contrast structure draws attention to the difficult effects of attending middle school B: the compare and contrast structure emphasizes the differences between middle school and elementary school Please answer this math question ( I NEED IT ASAP ) a longitudinal sound wave travels from left to right through the air in a room. in what directions do the air particles vibrate as the wave passes? What happens when light from the sun passes through any type of matter Dog, that beemer was flyin' !Don't blow your cool with me, or lll popyou in the snout!Excessive consumption of confectionsmay result in dental deterioration.I believe the driver of that B.M.W. mayhave been exceeding the speed limit.If you grow impatient with me, I may feelobligated to resort to violent measures.Too much candy rots your choppers.Formal LanguageInformal Languagedag and dop answer heredrag and diop answer here substances being tested:CH, OHOHOHsucroseOHsimple-sugar components:fructoseCH, OHCH, OHOHOHCH.OHCH, OHOHOHglucoseCHOHOHOHOHlactoseCH,OHOHCHOHgalactoseUse the molecular structures to predict which of the six solutions will test positive for glucose. Write yourprediction in the answer space. Provide the reasoning behind your prediction. What is over 1/31/4? What does the term sphere used in paragraph most likely refer to 1. Why is physics sometimes called the fundamental science?Because it explains the basics of all sciencesBecause it examines the rules that govern the universeBecause it does not require experiments or the scientific methodBecause it was developed before any other branch of scienceBecause it is the easiest branch of science to understand Which of the following angles would not be congruent to the measure of 7? HELPPP!!! What is the missing side length, x, in thisright triangle?XA.5 metersB. 10 meters26 m24 m4C. 12 metersD. 43 meters Need help with Radical Rational Exponents and with work plz. When did WW1 officially begin? What events do we consider to be the spark to the powder keg igniting the war? if 1.240.94 correct to 2 significant How did Galileo Galilei contribute to the Scientific Revolution? A. He created a barometer to improve weather predictions. B. He discovered the appearance of craters on the planet Jupiter. C. He influenced physics with the three laws of planetary motion. D. He improved the telescope to study planets and other objects in space. Noah drops a rock with a density of 1.73 g/cm into apond.Will the rock float or sink? Explain your answer.