Find the length of a side of the hexagon

Assignment Help Basic Computer Science
Reference no: EM131338758

A regular hexagon is inscribed in a circle with diameter 6.4 centimeters.

a. What is the apothem of the hexagon?

b. Find the length of a side of the hexagon.

c. Find the perimeter of the hexagon.

d. The area of a regular polygon equals one half times the perimeter of the polygon times the apothem. Find the area of the polygon.

Reference no: EM131338758

Questions Cloud

Important part of becoming a business professional : Discussion: Pricing-One of the 4 P's Being up to date with current events is an important part of becoming a business professional. In marketing, it is part of an important responsibility to continuously scan the external environment for opportuni..
Analyze the effects that each of the transactions will have : ACC500- Analyze the effects that each of these transactions will have on the following six components of the company's financial statements for the month of September.
Find the length of a leg of the triangle : Each base angle of an isosceles triangle measures 42° 30. The base is 14.6 meters long.
Usa national debt been increasing for decades : Why has the USA national debt been increasing for decades? Think about the spending that the country has done in the past 10 years. What has it spent money on and why?
Find the length of a side of the hexagon : The area of a regular polygon equals one half times the perimeter of the polygon times the apothem. Find the area of the polygon.
Research and knowledge of the ongoing relationship : In expanding the research and knowledge of the ongoing relationship between the United States and China, write a paper to summarize currency market intervention and decide whether this is a useful tool. Explain your rationale.
Find the length of the escalator : The escalator at St. Petersburg Metro in Russia has a vertical rise of 195.8 feet. If the angle of elevation of the escalator is 10° 21 36, find the length of the escalator.
Washington mutual in the financial crisis : For the fall of Washington Mutual in the financial crisis in 2008, Discuss how securitization and falling home prices contributed to the demise of this company.
Percent annual coupon bonds with maturity : Johnny Cake Ltd. has 12 million shares of stock outstanding selling at $21 per share and an issue of $60 million in 8 percent annual coupon bonds with a maturity of 17 years, selling at 94.5 percent of par. What is its WACC?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a menu driven program

Write a menu driven program that allows the user to enter five numbers and then choose between finding the smallest , sum or average of the numbers.

  Explaining multiple client computers and servers

In network with multiple client computers, servers, switches and wireless access points, write down resources must be scanned for possible vulnerabilities.

  Convert the unsigned decimal to the indicated base

Convert the unsigned decimal to the indicated base: 34.50 to octal 37.150 to hexadecimal 73.5 to binary

  Write a program that processes the test data.

This student did not answer question 9. The exam has 20 questions, and the class has more than 150 students. Each correct answer is awarded two points, each wrong answer gets -1 point, and no answer gets 0 points.

  What is the transitive closure of r

Let R be the relation {(a, b) | a divides b} on the set of integers. What is the symmetric closure of R? What is the transitive closure of R?

  Describe common challenges that you will find

Product evaluation is an important step to ensure that a product will meet the quality, features, and overall design that is acceptable to the consumer. Imagine that you are an evaluator for a new product. Describe common challenges that you will ..

  What types of traffic analysis information could eve learn

Eve is eavesdropping on the communications. What types of traffic analysis information could Eve learn by eavesdropping on the encrypted channel? Describe a situation in which information exposure via traffic analysis is a serious privacy problem.

  Model and design an information system

Generate a narrative for a business to analyze, model and design an Information System. The company is:Amazon. You can simplify and take assumptions to develop the Information System appropriate for the selected business.

  Example of a problematic programming situation

Suggest one (1) example of a problematic programming situation or scenario that the use or implementation of a compound if statement could resolve. Justify your respond.

  Brief description of traditional project management approach

A discussion of the types of projects for which traditional project management approaches would be best suited, versus the types of projects for which non-traditional project management approaches would be more effective.

  Should the item be purchased or manufactured

Should the item be purchased or manufactured? Also, what are the total costs of options A and B. Should the item be purchased or manufactured? What is the total cost of Option A and total cost of Option B? Should the item be purchased or manufactured..

  Comment on the performance and scalability of this scheme

Comment on the performance and scalability of this scheme.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd