Does the keeper have to sound the horn

Assignment Help Basic Computer Science
Reference no: EM131338767

Boat Safety The Cape Hatteras lighthouse on the North Carolina coast was built in 1870 and rises 208 feet above sea level. From the top of the lighthouse, the lighthouse keeper observes a yacht and a barge along the same line of sight. The angle of depression for the yacht is 20°, and the angle of depression for the barge is 12° 30. For safety purposes, the keeper thinks that the two sea vessels should be at least 300 feet apart. If they are less than 300 feet, she plans to sound the horn. How far apart are these vessels? Does the keeper have to sound the horn?

Reference no: EM131338767

Questions Cloud

Spot rate between us and japanese yen : Find out the cross rate between US$ and British Pound Sterling(£) if the spot rate between British Pound Sterling and Japanese Yen(¥) is ¥121/£ and the spot rate between US$ and Japanese Yen is ¥85/$.
Government budget deficit influence the loanable funds : How does a government budget deficit influence the loanable funds market and why does a decrease in the deficit lower the real interest rate?
Determine beta and the expected return on proposed portfolio : The expected risk-free rate (Treasury bills) is 6 percent and the market risk premium is 8.8 percent. Determine the beta and the expected return on the proposed portfolio.
Calculate the holding period return on a before-tax basis : Mary and Nick Stalcheck have an investment portfolio containing 4 vehicles. It was developed to provide them with a balance between current income and capital appreciation. Calculate the holding period return on a before-tax basis for each of these f..
Does the keeper have to sound the horn : If they are less than 300 feet, she plans to sound the horn. How far apart are these vessels? Does the keeper have to sound the horn?
Compute the expected return from the portfolio : You are considering investing in two securities, X and Y. - Compute the expected return from the portfolio and The standard deviation of returns from the portfolio.
Difference between mediation and arbitration : This assignment has two parts. The first is to explain in your own words the difference between mediation and arbitration in the context of conflict resolution - giving a real world example of each. The second is to explain in your own words why..
Summarize the process you will take to accomplish directions : MGT 173:Consider Chap. 15-16 Expanding HR Horizons and Implementing Strategy in your project. Throughout this course you have been provided a comprehensive overview of Human Resource Management. We've explored methods of how organizations gain sus..
What is the length of a side of the pentagon : The apothem of a regular pentagon is 10.8 centimeters.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Computer forensics examiners

This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part..

  Initial value problem and plot its graph

Find the solution for the given initial value problem and plot its graph y"'-y"+y'-y=0; y(0)=2, y'(0)=-1, y"(0)=-2

  Prove that if a graph for cc is constructed and has no loops

The discussion of acyclic creates imposes constraints on the types of created subjects but not on the types of created objects. Why not?

  Does this information make it easier to compute a maxflow

Does this information make it easier to compute a maxflow? Develop an algorithm that uses a given mincut to speed up ubstantially the search for maximum-capacity augmenting paths.

  What can be achieved by rivalry of neural network

What animal group will a bat be assigned to by the network modeled in the Example 02 program?

  What is the value of alpha[4]

What is the value of alpha[4] after the following code executes? int alpha[5] = {0}; int j; alpha[0] = 2; for (j = 1; j

  Identify and explain some different types of risks

Identify and explain some different types of risks that a network environment might face.

  Create a procedure named findthrees that returns 1

Create a procedure named FindThrees that returns 1 if an array has three consecutive values of 3 somewhere in the array.

  System capabilities for the company

Please include title page and reference page with references. This term paper needs to be in APA style. Include page numbers at the top right corner of each page.  The title page includes: title, name, date, course title, and professor's name. Also, ..

  Differentiate best uses of active directory

Differentiate between best uses of Active Directory versus New Technology File System permissions.

  Major activities of an operating system

What are the three major activities of an operating system in regard to memory management?

  Write a function that convert any angles outside of interval

Suppose that an array contains angles in degrees. Write a function that converts any angles outside of the interval [0,360] to an equivalent angle in that interval. For example, an angle of 380.5 degrees should be converted to 20.5 degrees.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd