Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write a program to find the area and perimeter of a circle of given radius
# include
void main()
{
float radius, area, perimeter, pi=3.14;
printf("\nEnter the radius of the circle :\>");
scanf("%f",&radius);
area=pi*radius*radius;
/* Area of a circle=Pr2*/
perimeter=2*pi*radius;
/* Area of a circle=2Pr*/ printf("\nThe area of the circle is :%.2f",area);
printf("\nThe perimeter of the circle is :%.2f\n",perimeter);
/* "%.2f" - prints values upto 2 decimal places*/
getch();
}
Why a function can n ot call a task As functions doesn't consume time,it can do any operation which doesn't consume time. Mostly tasks are written that consumes time. So a ta
Ask question #Minimumstate and explain thevenins theorem as applicable to electrical circuits 100 words accepted#
Would you like to easily automate your MS Access database through menu driven selections? This can be accomplished by producing a form with customized buttons that point to macr
Q. Describe about Digital Audio Tape? The most proper tape for backing up data from a disk today is Digital Audio Tape (DAT). It employs a 4mm tape covered in a cartridge. It e
Explain the working of light pens Light pens still exist, but due to several disadvantages they are not as popular as other input devices that have been developed. For example,
Q. Explain Functional Roles of Information System? Functional Roles of Information System 1 Lower Costs - a) Use IT to significantly reduce the cost of business proce
Subroutine are the part of implementing processes (like any process can call a subroutine for achieve task), whereas the interrupt subroutine never be the part. Interrupt subroutin
Handling Multiple Devices Interrupt Priority Continue to accept interrupt requests from higher priority components Disable interrupts from component at the sa
Fingerprint- Biometric computer security systems First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and the
What are difference between Mealy and Moore state machine? Difference between Mealy and Moore state machine: 1) Mealy and Moore models are the fundamental models of state ma
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd