answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
2 years ago
14

Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their

product as integers (rounded), then as floating-point numbers. Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('%0.2f $ your_value)
Ex: If the input is:
10.3
20.4
5.0
the output is:
11 1050
11.90 1050.60
Computers and Technology
1 answer:
jarptica [38.1K]2 years ago
5 0

Answer:

Following are the program in the Python Programming Language.

#get input from the user

x = float(input())

#get input from the user

y = float(input())

#get input from the user

z = float(input())

#find the average  

average =(x+y+z)/3

#find the product  

product = x*y*z

#print the result in given format

print('\n%d %d'%(average,product))

#print the result in given format

print('%0.2f %0.2f'%(average,product))

Explanation:

<u>Following are the description of the program</u>:

  • We set three variables 'x', 'y', and 'z' that accept float type values from the user.
  • Then, set variable 'average' that store the average of the following values that is given by the user.
  • Set variable 'product' that store the multiplication of the following values that is given by the user.
  • Finally, we print the average and the product in the following format  that is given in the statement.
You might be interested in
3. Personal Trainer is very concerned about the security and protection of the information they collect in the new information s
Sever21 [200]

Answer:

Check the explanation

Explanation:

in order to make sure that the built into the new systems, the below input and output levels of security control have to be considered for personal trainers staff.

There are:

   Network Security

   Application security

   Physical security

   User security

   File security

   Procedural security

These securities levels are consistent and advantage in building the decisions regarding system security.

There are the following policies applied to each control:

Network Security: Network interface and traffic controlling, encryption of data.

Application Security: Verification of data input/output and update of software proceedings.

Physical Security: Security to servers, computers and physical environment.

User Security: Protection passwords and identify management skills.

File Security: Access Permission allocated to users and editing authorizations given to users.

Procedural Security: Certify safety protection to perform decision-making activities and document shredders.

Finally, consider another main point is depends the new system performance are system response time, throughput, bandwidth time and turnaround time.

7 0
2 years ago
In a fantasy world, your character must face hordes of demons. Each demon is vulnerable to a type of magical spell. This weaknes
Y_Kistochka [10]

I think it's imperfect information.

7 0
2 years ago
Read 2 more answers
A network technician sets up an internal dns server for his local network. When he types in a url which is checked first
VLD [36.1K]

Answer:

The first thing that the browser checks is the cache for the DNS record to find the corresponding IP address.

Explanation:

After the technician sets up the internal DNS server for his local network, the first thing that is checked when he types a website into the url of a browser is the cache to look for corresponding IP addresses.

DNS which means Domain Name System is a database that maintains the website name (URL) and the IP address that it is linked to. There is a unique IP address for every URL (universal resource locator).

Internal DNS servers store names and IP addresses for internal or private servers

8 0
2 years ago
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which o
erma4kov [3.2K]

The parts of the presentation that he should design first is Slide master

Slide master is a slide that enables you  to do the following:

•Modify your presentation to suit your taste

•It enables you to make  a partial or minor change  on the slide layout of your presentation

•Slide master  help you to  create a perfect and special  presentation.

•With Slide master  you can easily modify your slide text color.

Inconclusion The parts of the presentation that he should design first is Slide master.

Learn more about Slide master here:

brainly.com/question/12600334

4 0
2 years ago
Widget Corp. wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company ne
____ [38]

Answer:

The best cloud option for Widget Corp considering the cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world.

Is a hybrid could.

Explanation:

The reasons behind this answer are that in the first place the cloud is not going to be fully managed by a third party, but also by the IT department of Widget Corp allowing it to control its security. Also, that the cloud can be adapted to public or mainstream sources, resources, and platforms. Making it very user friendly and lowering down specific knowledge to use it.

5 0
2 years ago
Other questions:
  • A search box does all of the following EXCEPT ________.
    12·2 answers
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • n the video, McWhorter says that “textspeak” might be a good thing for young people’s brains. Why does he think this?
    13·1 answer
  • Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same sock
    14·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • JAVA
    5·1 answer
  • A file concordance tracks the unique words in a file and their frequencies. Write a program that displays a concordance for a fi
    12·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • The microprogram counter (MPC) contains the address of the next microcode statement for the Mic1 emulator to execute. The MPC va
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!