Complete the rest of this statement:
In computer science, a computer is a tool a computer scientist uses, but computer science is not
about the tools.
instead, computer science is about _____

Answers

Answer 1

Answer:

Computer science is about how computers work, in terms of programming, design and data processing.

Explanation:

Computer science is a discipline that studies issues related to information technology and its use, including the storage, processing, presentation, and transfer of information.

The fringes of computer science extend to many other sciences: for example, usability research is closely related to psychology and bioinformatics to biology, among others. Digital media research, on the other hand, has links to media science and communications research. Computer science also has a strong interaction with computational science and information society research examining the wider effects of data processing in different areas.

Answer 2

Computer science is about the operation of computers in aspects of programmingdata processing and analytics, and designs area.

What is computer science?

Computer science is concerned with the operation of computers in aspects of programming, data processing and analytics, and designs area.

Computer science is a field that investigates challenges connected to information technology and its applications, such as data storage, analysis, presentation, and data transmission.

The periphery of computer science expands to many other fields, such as its user interface usability, which is strongly connected to bioinformatics, a field tied to biological analysis, psychology, etc.

Learn more about computer science here:
https://brainly.com/question/22654163


Related Questions

When a new user visits your proprietary site, what is typically the first method of interaction with them

Answers

Answer:

Log file entry notifying you of new user activity

Explanation:

Log files are records of the timeline of activities in a computer system. These files contain information about new users of a site as well as the activities they performed on the site.

The internet protocol address of the visitor, the time of visit, as well as the features clicked on, or accessed by him, example, videos or images are all registered in the log file. The owner of the site can use the information sourced from the log files to perform site analytics.

An alternative design for a canary mechanism place the NULL value just below the return address. What is the rationale for this design decision

Answers

Answer:

This is to prevent attacks using the strcpy() and other methods that would return while copying a null character.

Explanation:

Canary is a mechanism used to monitor and prevent buffer overflow. The alternative canary design that places a null value just before the return address is called the terminator canary.

Though the mechanism prevents string attacks, the drawback of the technique is that the value of the canary is known which makes it easy for attackers to overwrite the canary.

Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory, and the year the computer was purchased. Who/what are the individuals in this data set

Answers

Incomplete question. The Options read;

A. The year purchased

B. Brian's classmates

C. The amount of memory

D. The type of operating system

Answer:

B. Brian's classmates

Explanation:

Remember, the question is concerned about "the individuals" in the data set, so the year they purchased their computer, neither is the amount of memory of the computer and the type of operating system can be classified as individuals in the data set.

Hence, we can correctly say, only Brian's classmates are the individuals in this data set.

1. Discuss the pros and cons of human-computer interaction technology?
2. Discuss the ACID database properties in details ​

Answers

!

gcoo!!Exykgvyukhhytocfplanationufvhyg:

Write a function named average_value_in_file that accepts a file name as a parameter and reads that file, assumed to be full of numbers, and returns the average (mean) of the numbers in that file. The parameter, filename, gives the name of a file that contains a list of numbers, one per line. You may assume that the file exists and follows the proper format. For example, if a file named input.txt contains the following numbers

Answers

def average_value_in_file(filename):

   f = open(filename)

   total = 0

   count = 0

   for x in f.read().splitlines():

       total += int(x)

       count += 1

   return total/count

print(average_value_in_file("input.txt"))

I used an input file that looks like this:

1

1

1

1

One problem with dynamic arrays is that once the array is created using the new operator the size cannot be changed. For example, you might want to add or delete entries from the array similar to the behavior of a vector. This project asks you to create a class called DynamicStringArray that includes member functions that allow it to emulate the behavior of a vector of strings.
The class should have:
A private member variable called dynamicArray that references a dynamic array of type string.
A private member variable called size that holds the number of entries in the array.
A default constructor that sets the dynamic array to NULL and sets size to 0.
A function that returns size.
A function named addEntry that takes a string as input. The function should create a new dynamic array one element larger than dynamicArray, copy all elements from dynamicArray into the new array, add the new string onto the end of the new array, increment size, delete the old dynamicArray, and then set dynamicArray to the new array.
A function named deleteEntry that takes a string as input. The function should search dynamicArray for the string. If not found, return false. If found, create a new dynamic array one element smaller than dynamicArray. Copy all elements except the input string into the new array, delete dynamicArray, decrement size, and return true.
A function named getEntry that takes an integer as input and returns the string at that index in dynamicArray. Return "" string if the index is out of dynamicArray’s bounds.
Overload the operator[] so that you can get and change an element by an index integer. If the index is out-of-bounds, return a "" string.
A copy constructor that makes a copy of the input object’s dynamic array.
Overload the assignment operator so that the dynamic array is properly copied to the target object.
A destructor that frees up the memory allocated to the dynamic array.
Create a suitable test program to test your class.
You should name the project ASG10. When you zip up the project folder, ASG10, include all the files (.sln, .cpp, etc) and subdirectories (Debug, etc.).
**************************************************
Copy your DynamicStringArray from Assignment 10. Fix the program so all 13 tests work properly. Modify the definition of the overloaded operator [] and getEntry so they throw an OutOfRange exception if an index that is out of range is used. OutOfRange is an exception class that you define. The exception class should have a private int member and a private string member, and a public constructor that has int and string arguments. The offending index value along with a message should be stored in the exception object. You choose the message to describe the situation. Modify your test program and add tests that catch the new exception class.
You should name the project ASG14. When you zip up the project folder, ASG14, include all the files (.sln, .cpp, etc) and subdirectories (Debug, etc.).

Answers

Answer:

Un problema con las matrices dinámicas es que una vez que se crea la matriz utilizando el nuevo operador, no se puede cambiar el tamaño. Por ejemplo, es posible que desee agregar o eliminar entradas de la matriz de manera similar al comportamiento de un vector. Este proyecto le pide que cree una clase llamada DynamicStringArray que incluye funciones miembro que le permiten emular el comportamiento de un vector de cadenas.

La clase debe tener:

Una variable miembro privada llamada dynamicArray que hace referencia a una matriz dinámica de tipo cadena.

Una variable de miembro privada llamada tamaño que contiene el número de entradas en la matriz.

Un constructor predeterminado que establece la matriz dinámica en NULL y establece el tamaño en 0.

Una función que devuelve el tamaño.

Una función llamada addEntry que toma una cadena como entrada. La función debe crear una nueva matriz dinámica un elemento más grande que dynamicArray, copiar todos los elementos de dynamicArray en la nueva matriz, agregar la nueva cadena al final de la nueva matriz, incrementar el tamaño, eliminar el antiguo dynamicArray y luego establecer dynamicArray en el nueva matriz.

Una función llamada deleteEntry que toma una cadena como entrada. La función debe buscar la cadena en dynamicArray. Si no lo encuentra, devuelva falso. Si lo encuentra, cree una nueva matriz dinámica con un elemento más pequeño que dynamicArray. Copie todos los elementos excepto la cadena de entrada en la nueva matriz, elimine DynamicArray, reduzca el tamaño y devuelva verdadero.

Una función llamada getEntry que toma un número entero como entrada y devuelve la cadena en ese índice en dynamicArray. Devuelve la cadena "" si el índice está fuera de los límites de dynamicArray.

Sobrecargue el operador [] para que pueda obtener y cambiar un elemento por un índice entero. Si el índice está fuera de los límites, devuelve una cadena "".

Un constructor de copia que hace una copia de la matriz dinámica del objeto de entrada.

Sobrecargue el operador de asignación para que la matriz dinámica se copie correctamente en el objeto de destino.

Un destructor que libera la memoria asignada a la matriz dinámica.

Cree un programa de prueba adecuado para evaluar su clase.

Debería nombrar el proyecto ASG10. Al comprimir la carpeta del proyecto, ASG10, incluya todos los archivos (.sln, .cpp, etc.) y subdirectorios (Debug, etc.).

************************************************

Copie su DynamicStringArray de la Tarea 10. Corrija el programa para que las 13 pruebas funcionen correctamente. Modifique la definición del operador sobrecargado [] y getEntry para que generen una excepción OutOfRange si se usa un índice que está fuera de rango. OutOfRange es una clase de excepción que define. La clase de excepción debe tener un miembro int privado y un miembro string privado, y un constructor público que tenga argumentos int y string. El valor del índice infractor junto con un mensaje deben almacenarse en el objeto de excepción. Tú eliges el mensaje para describir la situación. Modifique su programa de prueba y agregue pruebas que detecten la nueva clase de excepción.

Deberías nombrar

Explanation:

A simple computer has a main memory and a disk but not a cache. If a referenced word is in main memory, 90ns are required to access it. If it is on disk but not in main memory, 10ms are needed to load it into main memory (this includes the time to originally check the main memory), and then reference is started again. The main memory hit ratio is 0.8. What is the average time in ns required to access a referenced word on this system

Answers

Answer:

The average time in ns to reference a work will be of 2,000,090.

Explanation:

80% of the time, you will need just to load from the main memory(when there is a hit), that is, a time of access of 90 ns.

20% of the time, you will have a miss, so you have to access the main memory(90 ns) plus the disk(10 ms = 10000000 ns).

So, the average time needed to reference a word will be:

[tex]t = 0.8*90 + 0.2*(90 + 10000000) = 2000090[/tex]

The average time in ns to reference a work will be of 2,000,090.

how do I make my own algorithms ​

Answers

Answer:

Step 1: Determine the goal of the algorithm. ...

Step 2: Access historic and current data. ...

Step 3: Choose the right model(s) ...

Step 4: Fine tuning. ...

Step 5: Visualise your results. ...

Step 6: Running your algorithm continuously.

Get a basic understanding of the algorithm.
Find some different learning sources.
Break the algorithm into chunks.
Start with a simple example.
Validate with a trusted implementation.
Write up your process.

Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.

Answers

Answer:

Explanation:

The following code is written in Java. It is a very simple three line statement (assuming that the random library was imported) that chooses a random integer value between 5 and 5000 and prints it to the screen using the println statement.

Random rand = new Random();

int randomNum = rand.nextInt((5000 - 5) + 1) + 5;

System.out.println(randomNum);

The random number generator is initialized and given a value between 5 and 5000. Since random number Generator will generate a number between 0 and the given value then subtracting 5 from the initial generated number makes sure that it is not more than 5000 and then adding 1 and 5 after wards makes sure that it is more than 5 always.

Provide an example of an IT project from your readings, experience, and/or other sources and discuss some of the challenges faced in its implementation. Suggest ways to overcome such challenges to achieve successful outcomes.

Answers

Answer:

kindly check the explanation.

Explanation:

Getting any project to be a successful one is not an easy task at all as many projects failed even before it nears completion stage. The Project Management Institute[PMI] states that only 69% [mean percentage] are able to complete and meet the original goals for and business intent of the project.

The reasons behind this failed IT projects are numerous, few of them are given below:

=> When estimates for the IT project is inaccurate. Th inaccuracy  do cause IT projects to not meet the target.

=> When the available resources are not enough and there is poor project management it causes the IT projects to fail.

=> When team members are not diligent. The procrastination of team members do lead to failed projects.

The ways that such problems can be overcome in order to to achieve successful outcomes is given below;

=> Someone should be held accountable. That is there should be a seasoned and qualify project manager to supervise the project and can be hold accountable for how things turns how to be.

=> The scope of the project should be flexible so that when things changes the plan can also change.

=> Making sure that all the estimates are accurate.

If background option when creating file. the color of the background is

Answers

Answer:

Light Grey.

Explanation:

I guess because mostly I have seen document background colour is Grey.

Light grey...........

For C++ ONLY please,
Write a for loop to print all NUM_VALS elements of vector courseGrades, following each element with a space (including the last). Print forwards, then backwards. End with a newline. Ex: If courseGrades = {7, 9, 11, 10}, print:
7 9 11 10
10 11 9 7
Hint: Use two for loops. Second loop starts with i-courseGrades.size() - 1 (Notes)
Note: These activities may test code with different test values. This activity will perform two tests, both with a 4-element vector (vector int> courseGrades(4)). See "How to Use zyBooks".
Also note: If the submitted code tries to access an invalid vector element, such as courseGrades at(9) for a 4-element vector, the test may generate strange results. Or the test may crash and report "Program end never reached', in which case the system doesn't print the test case that caused the reported message.
1 #include
2 #include
3 using namespace std; DIIDII
4
5 int maino {
6 const int NUM_VALS - 4;
7 vector int> courseGrades (NUM_VALS);
8 int i;
9
10 for (i = 0; i < courseGrades.size(): ++) {
11 cin >> courseGrades.at(i); /*
12 }
13
14 Your solution goes here */
15
16 return ;
17 }

Answers

Answer:

Replace the comment

/*Your solution goes here */

with

for (i = courseGrades.size()-1; i >=0 ; i--) {

cout<<courseGrades.at(i)<<" ";

}

Explanation:

This line iterates through courseGrade in reverse order

for (i = courseGrades.size()-1; i >=0 ; i--) {

This prints each element of courseGrade in reverse followed by blank space

cout<<courseGrades.at(i)<<" ";

}

I added the full program as an attachment

Answer:

for (i = 0; i < NUM_VALS; i++) {

cout << courseGrades [i] << " ";

}

cout << endl;

for(i = NUM_VALS - 1; i >= 0; --i) {

cout << courseGrades[i] << " ";

}

cout << endl;

Explanation:

The code repeat 3 [forward 50 right 120] creates which shape?
a square
a circle
a pentagon
a triangle

Answers

Answer:

Triangle. D

Explanation:

I have no Idea, I was searching for the answer like most of you guys are doing. But my best guess is Triangle

Answer:

D. A triangle is your answer

Explanation:

The triangle is the only shape in this list that has 3 sides.

Answerer's Note:

Hope this helped :)

describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach

Answers

Incomplete question. Here's part of the missing question;

The EducationS Review, a fictional company, is hit with a data breach that is making headlines. The Olianas-based educational service and test preparation provider inadvertently exposed files of at least 100,000 students in various parts of the country through its Web site. News of the breach was made public on Tuesday morning by a report in the local newspaper.

The files were exposed after the company switched the Internet service providers earlier this year. The sensitive information, which included personal data such as names, birth dates, ethnicities, and learning disabilities, as well as test performance, were easily accessed through a simple Web search and were available for at least seven weeks, according to the report. None of the information was password protected and was intended only to be viewed by EducationS authors.

Explanation:

It is important to note that the company did not make the information password protected, which creates a vulnerability.

Measures 1: only those with authentication password should have been allowed to access the information.

Measures 2:  prior to switching to a new internet service provider, an information risk assessment should have been done to ensure information security.

When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model. SaaS PaaS IaaS All of the mentioned

Answers

Answer:

The correct answer is B) PaaS

Explanation:

PaaS is short for Platform-as-a-Service.

It is a cloud computing architecture that provides the capability for customers (with a full suite of outsourced hardware, software, and other related infrastructure) to create, run and maintain applications less the arduous task of developing such platform on their own business place.

Of course, it helps to reduce associated costs as well. is a cloud computing model that provides customers a complete platform—hardware, software, and infrastructure—for developing, running, and managing applications without the cost, complexity, and inflexibility of building and maintaining that platform on-premises.

Facilities included in a PaaSinfrastructure are

serversstoragenetworkingmiddlewaredevelopment toolsbusiness intelligence (BI) servicesdatabase management systems etc.

With a  PaaS one can complete the entire web application lifecycle which runs from building the application to testing it, deploying the software, managing and updating it.

Cheers

have you ever had to adjust your communicatio style to egage a customer or roommate? what was the situation and outcome?

Answers

Answer: When I was the HR of my bank, one of our good customer was disappointed and was wanting to close his account. BM didn't want to loose him.Everybody tried to convince him but all in vain.Then ,I in my regional language and communication skills not only stopped him to close the account but also made him open a new account of his wife.

What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary search

Answers

Answer:

O(n²)

Explanation:

The worse case time complexity of insertion sort using binary search for positioning of data would be O(n²).

This is due to the fact that there are quite a number of series of swapping operations that are needed to handle each insertion.

Explain the iterative nature of the database requirements collection, definition, and visualization process.

Answers

Answer:

you can do a quizlet about it and you can get da answers from there

Explanation:

how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application domains

Answers

Answer and Explanation:

User Domain:

Risk

User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

The workstation domain has some software vulnerability that connects remotely and steals data. A workstation can fail because of lost data.

LAN domain

A worm can spread and infect the computer.LAN have some known software vulnerability. An unauthorized access of the organization workstation in

LAN WAN domain

LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems. Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

The boundary between the trusted and untrusted zones. Hacker can penetrate the IT infrastructure and gain access. Week ingress and egress filtering performance. A firewall with the ports open can allow access to the internet.

System Storage Domain:

A fire can destroy the data DOC can cripple the organization's email. A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

Communication circuit outage the connections Remote communication from the office can be unsecured VPN tunneling between the remote computer and router

Determine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
Distance =
(x2 – 21)2 + (y2 – yl)2

Answers

Answer:

2 feet

Explanation:

The stub: transmits the message to the server where the server side stub receives the message and invokes procedure on the server side. locates the connection on the computer. packs the parameters into a form transmittable over the hardware. locates the port on the computer.

Answers

Answer:

It does all of these

Explanation:

The stub is able to do all of what we have in this question. It can locate computer connections, locate ports on a computer, transit message to server etc.

in distributed computing, a stub is a piece of code that does the work of converting parameters that are passed between the client and the server at a time of remote procedure call.

The main objective of an RPC is to allow the client to call procedures remotely on another server.

Which of the following is NOT provided by the Device
Manager?
List of attached external peripheral devices
List of installed software with versions
List of attached internal peripheral devices
List of installed drivers
Submit

Answers

Answer:

well techincly in windows 10 the only thing that is in the device manager is the services and software it doesn't tell you what devices are connected only what is running and the prefrmance

of your machine

Explanation:

What symbol should you look for to determine who owns the intellectual property of a website?

Answers

Answer:

the logo of the company or corporation

Explanation:

Usually, the symbol that determines who owns the intellectual property is the logo of the company or corporation. The logo of a website is technically the logo of the brand which has the rights to all of the information represented on the site and ultimately the intellectual property of the site itself. Since there are various board members that usually make up the company that owns the intellectual property, the logo is a way of representing all of these members as a single entity.

Answer: D the copyright symbol

Explanation: I hope this helps you out

The index used by the OS to manage computer files is called _____.


RAM

API

GUI

FAT

Answers

Answer:

GUI

Explanation:

Answer:

FAT

Explanation:

Hope this helps!!!

What is the advantage of using shortcuts

Answers

Answer: There can be advantages and disadvantages.

for example, if you were in the woods with a pathway, and a clear way that might be faster and a shorter way of getting out. You may take the shortcut leading to where you didn't want to go leading to you getting lost or, it could be the same time but with more challenges.

An example of shortcuts to it's advantage is when you're reading a text and you don't understand the word. It's much easier when you hear it being read out to you when the reader uses tone to kind of give you a hint if the connotation is negative or positive, A good example of this is the word unique let's use this sentence "She was very unique, and that's what made her cool!" We can use the words "cool" to see that unique is a positive connotation! For the word cool can usually mean that something is real nice or it's something/someone you'd typically like to be around. So therefore these are just a few examples of the advantages and disadvantages of shortcuts.

Identify the letter of the choice that best matches the phrase or definition. Group of answer choices Having a current knowledge and understanding of computers, mobile devices, the web and related technologies [ Choose ] Thin, lightweight mobile computer with a screen in its lid and a keyboard in its base [ Choose ] An electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce information, and store the information for future use [ Choose ] A personal computer designed to be in a stationary location [ Choose ] A computer dedicated to providing one or more services to other computers or devices on a network [ Choose ] A computing device small enough to hold in your hand [ Choose ] An Internet-capable phone that usually also includes a calendar, an address book, a calculator, notepad, games, and several other apps [ Choose ] Any hardware component that allows you to enter data and instructions into a computer or mobile device [ Choose ] Any hardware component that conveys information from a computer or mobile device to one or more people [ Choose ] Where a computer keeps data, instructions, and information [ Choose ] Removable flash memory [ Choose ]

Answers

Answer:

1. Digital literacy.

2. Laptop.

3. Computer.

4. Desktop computer.

5. Server.

6. Mobile device.

7. Smartphone.

8. Input device.

9. Output device.

10. Storage media.

11. Memory card.

Explanation:

1. Digital literacy: having a current knowledge and understanding of computers, mobile devices, the web and related technologies.

2. Laptop: thin, lightweight mobile computer with a screen in its lid and a keyboard in its base.

3. Computer: an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce information, and store the information for future use.

4. Desktop computer: a personal computer designed to be in a stationary location.

5. Server: a computer dedicated to providing one or more services to other computers or devices on a network.

6.  Mobile device: a computing device small enough to hold in your hand.

7. Smartphone: an Internet-capable phone that usually also includes a calendar, an address book, a calculator, notepad, games, and several other apps.

8. Input device: any hardware component that allows you to enter data and instructions into a computer or mobile device.

9. Output device: any hardware component that conveys information from a computer or mobile device to one or more people.

10. Storage media: where a computer keeps data, instructions, and information. It includes hardware devices such as solid-state drive (SSD), hard-disk drive (HDD), optical drive, and flash drive.

11. Memory card: Removable flash memory. In terms of size, it has a width and height of about 1.5 inches.

How can innovation,including technology, be sustained in schools?

Answers

Answer:

Answered below

Explanation:

Schools can encourage and sustain innovation and innovative ideas in technology through teaching, exposure and awareness of the benefits of using technology in solving our everyday problems.

Students should be invited to participate in tech roundtables and think about problems encountered in their society or environment and figure out how technology can be applied in such situations to providing a solution to those problems.

This encourages new, innovative and creative ideas, enthusiasm and opportunities.

Write a code in C++ that can save 100 random numbers in an array that are between 500 and 1000. You have to find the average of the 100 random numbers. To find the average of the numbers, you have to use a functions. You are not allowed to use return, cin or cout statements in the functions.

Hint : you have to use function call by reference.

Answers

Answer:

#include <iostream>

#include <random>

//here we are passing our array and a int by ref

//to our function called calculateAverage

//void is infront because we are not returning anything back

void calculateAverage(int (&ar)[100], int &average){

 int sum = 0;

 for(int i = 0;i < 100; i++){

   //adding sum

   sum += ar[i];

 }

 //std:: cout << "\naverage \t\t" << average;

//calculating average here

 average += sum/100;

}

int main() {

 int value = 0;

 int average = 0;//need this to calculate the average

 int ar[100];

 //assign random numbers from 500 to 1000

 //to our array thats called ar

 for(int i = 0; i < 100; i++){

   value = rand() % 500 + 500;

   ar[i] = value;

   

 }

 calculateAverage(ar,average);

 // std:: cout << "\naverage should be \t" << average;

 

}

Explanation:

not sure how else this would work without having to pass another variable into the function but I hope this helps!

I commented out the couts because you cant use them according to ur prof but I encourage you to cout to make sure it does indeed calculate the average!

difference between Opacity and Alpha properties in CSS3?

Answers

Answer:

Opacity sets the opacity value for an element and all of its children; While RGBA sets the opacity value only for a single declaration. Opacity : The opacity property sets the opacity level for an element. ... The alpha parameter is a number between 0.0 (fully transparent) and 1.0 (fully opaque)

hope it helps

please mark me as brainliest.

follow me

Write a class named Octagon whose objects represent regular octagons (eight-sided polygons). Your class should implement the Shape interface defined, including methods for its area and perimeter. An Octagon object is defined by its side length

Answers

Answer:

Answered below

Explanation:

//Code is written using Kotlin programming language.

interface Shape{

var length : Double

fun area(length: Double)

fun perimeter (length: Double)

}

Class Octagon(var length: Double) : Shape{

val side: Int = 8

override var length: Double = length

override fun perimeter ( length: Double):Double{

return side * length

}

override fun area(length: Double): Double {

return 2*side**2(1+\Math.sqrt(2)

}

}

//Test class

Class Main{

fun main(){

val octagon = Octagon(2.5)

val perimeter = octagon.perimeter()

val area = octagon.area

print(perimeter, area)

}

}

Other Questions
Do you think that the Texas Supreme Court should have rejected to overturn Bidens victory? Why or why not? Evaluate: 8*6+(12-4)/2 32 kilometers in 2 minuteskilometers per minute Read the thesis statements. Then, use the drop-down menus to identify each underlined phrase as either the topic or the main point about the topic. The life cycle of the cicada is complicated and can last up to seventeen years. The narrator of "The Tell-Tale Heart" is both original and unsettling. Taking a gap year to do volunteer work before going to college is becoming a popular choice among young Americans. Which of the following expressions has a coefficient of 10 and a constant of 5A) 10x + 5 B) 10 + 5x C) 10 + 5 D) 10 + 5 what is the percent of decrease from 10 to 4 This is for the girl who needed help writing an essay I had to edit it so you could tell what it was saying, my phone wont get any darker. You might have to zoom in a little bit. :P A flower shop has 460 dozen roses. How many roses are in the flower shop? how to find the slope Write the slope-intercept form of the equation of the line. Please someone help me!! Which of the following statements is true about the star spangled banner?A) it was written by a British sailor during the bombardment of fort Mchenry.B) it was written by Andrew Jackson at the battle of New OrleansC) it was written by Francis Scott key at the battle of New OrleansD) it was written by Francis Scott key while observing the bombardment of fort mchenry. I NEED THIS IMMEDIATELY!!While at the zoo, Mohammad counted the number of sloths and meerkats he saw. After a few minutes, he counted 2 sloths and 6 meerkats. The ratio remained constant during the remainder of his dive. Use the ratio to complete the table below. Write an equation to model this relationship, where S represents the number of sloths and M represents the number of meerkats. What field of study is concerned with firearms and bullets? toxicology DNA analysis pathology ballistics Solve the system by substitution.-5x + 3y = 2y = 2x What is an accurate description of democracy?a.ruled by a kingb.ruled by a small groupc.ruled by no oned.ruled by citizens What is being said about the strength of American democracy what was the only way to ensure ratification ? What is the distance between the points (-4, 2) and (3, -5)? Plssss helppppp meeeeeee Which figure of speech does Henry David Thoreau use in the following example: "I grew in those seasons like corn in the night..."? (5 points) aPersonification bAlliteration cSimile dMetaphorpls give a exact answer for this and ill brainliyist you ;]