answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valkas [14]
1 year ago
7

Assign to avg_owls the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4 3

Computers and Technology
1 answer:
kobusy [5.1K]1 year ago
6 0

Answer:

Explanation:

I'm going to add a python program for this example, step by step:

  • We declare 4 variables for our zoo, zoo quantity, and the average.
  • We make the operation for the average where sum the zoo and divide with the quantity
  • In the last step, we print the variable avg_owls.

num_owls_zoo1 = 1

num_owls_zoo2 = 2

num_owls_zoo3 = 3

num_owls_zoo4 = 4

zoos = 4

avg_owls = 0.0

avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos

print('Average owls per zoo:', int(avg_owls))

You might be interested in
As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 employees who work fro
Strike441 [17]

Answer:

To provide remote network access to the users to work, the network administrator can use virtual private network (VPN) along with some firewall to protect the system from hackers and other security threats.

Explanation:

Virtual Private Network (VPN) can be used to provide remote access to the users who are currently working from some remote areas. Many companies who have their branches or franchises in different parts of the city uses VPN to connect then all with the company server.

In this way, a firewall has been needed that protect the systems of users as well as company to protect from different security hazards such as hackers, authorization of the users and other security threats.

in this case, 12 em[employees who need remote access to the network can be connected through VPN along with the installation of some suitable firewall.

8 0
2 years ago
An innovation stream begins with a technological discontinuity, which is a scientific advance or a unique combination of existin
Monica [59]
This is true.

The next step in an innovation stream is an era of ferment, which is later followed by dominant design.
5 0
2 years ago
Here is a series of address references given as word addresses: 2, 3, 11, 16, 21, 13, 64, 48, 19, 11, 3, 22, 4, 27, 6, and 11. A
Allisa [31]

Answer:

Explanation:

kindly check the attachment for better explanation to the answer

4 0
1 year ago
This program will calculate the rise in ocean levels over 5, 10, and 50 years, Part of the program has been written for you. The
GREYUIT [131]

Answer:

Here is the C++ program:

#include <iostream>  //to use input output functions

using namespace std;  //to identify objects cin cout

int main(){  //start of main method

     

   double risingLevel;  //declares a double type variable to hold rising level

   cin>>risingLevel;  //reads the value of risingLevel from user

   

   cout<<"Level: "<<risingLevel<<endl;  //displays the rising level

   cout << "Years: 5, Rise: " << risingLevel * 5<<endl;  //displays the rise in ocean level over 5 years

   cout << "Years: 10, Rise: " << risingLevel * 10<<endl;  //displays the rise in ocean level over 10 years

   cout << "Years: 50, Rise: " << risingLevel * 50<<endl;  //displays the rise in ocean level over 50 years

}

Explanation:

The program works as follows:

Lets say the user enters rising level 2.1 then,

risingLevel = 2.1

Now the first print (cout) statement :

cout<<"Level: "<<risingLevel<<endl;  prints the value of risingLevel on output screen. So this statement displays:

Level: 2.1          

Next, the program control moves to the statement:

   cout << "Years: 5, Rise: " << risingLevel * 5<<endl;

which computes the rise in ocean levels over 5 years by formula:

risingLevel * 5 = 2.1 * 5 = 10.5

It then displays the computed value on output screen. So this statement displays:

Years: 5, Rise: 10.5                                                                                                                          Next, the program control moves to the statement:

   cout << "Years: 10, Rise: " << risingLevel * 10<<endl;

which computes the rise in ocean levels over 10 years by formula:

risingLevel * 10 = 2.1 * 10 = 21

It then displays the computed value on output screen. So this statement displays:

Years: 10, Rise: 21                                                                                      

Next, the program control moves to the statement:

   cout << "Years: 50, Rise: " << risingLevel * 50<<endl;

which computes the rise in ocean levels over 50 years by formula:

risingLevel * 50 = 2.1 * 50 = 105

It then displays the computed value on output screen. So this statement displays:

Years: 50, Rise: 105                                                                                                                          Hence the output of the entire program is:

Level: 2.1                                                                                                                     Years: 5, Rise: 10.5                                                                                                           Years: 10, Rise: 21                                                                                                            Years: 50, Rise: 105

The screenshot of the program and its output is attached.

4 0
2 years ago
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
Basile [38]

Answer:

The correct answer to the following question is option A. Wired Equivalent Privacy (WEP).

Explanation:

WEP (Wired Equivalent Privacy) is the security protocol which is specified in IEEE Wi-Fi (Wireless Fidelity) standard 802.11b, which is designed for providing a WLAN (Wireless Local Area Network) with the level of privacy and security.

Wardriving is act of searching for the WI-FI (Wireless Fidelity) networks by the person in the moving vehicle by using PDA (Personal Digital Assistant), smartphones or portable computer.

7 0
2 years ago
Read 2 more answers
Other questions:
  • The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
    13·1 answer
  • assume that name is a variable of type stirng that has been assigned a value write an expression whose value is the last charact
    11·1 answer
  • Initialize the list short_names with strings 'Gus', 'Bob', and 'Zoe'. Sample output for the givenprogram:Gus Bob Zoeshort_names
    13·1 answer
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    7·1 answer
  • Write a class with a constructor that accepts a String object as its argument. The class should have a method that returns the n
    13·1 answer
  • You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
    7·1 answer
  • 2 Name the package that contains scanner class?​
    10·1 answer
  • LAB: Miles to track laps. (PLEASE CODE IN PYTHON)
    14·2 answers
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
  • Animated graphics that are displayed on the screen after a set of time when the computer is unattended.​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!