Answer:
Following are the correct python code to this question:
n1 = float(input('Input first number: '))#input first number
n2 = float(input('Input second number: '))#input second number
n3 = float(input('Input third number: '))#input third number
n4 = float(input('Input fourth number: '))#input fourth number
average = (n1+n2+n3+n4)/4 #calculate input number average
product = n1*n2*n3*n4 # calculate input number product
print('product: {:.0f} average: {:.0f}'.format(round(product),round(average))) #print product and average using round function
print('product: {:.3f} average: {:.3f}'.format(product,average)) #print product and average value
Output:
Please find the attachment.
Explanation:
The description of the above python code can be defined as follows:
- In the above python program four variable "n1, n2, n3, and n4" is defined, in which we take input from the user end, and in these user inputs we use the float method, that converts all the input value in to float value.
- In the next step, two variable average and product are defined, that calculate all input numbers product, average, and hold value in its variable.
- In the last line, the print method is used, which prints its variable value by using a round and format method.
Answer:
If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.
Explanation:
Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall
Answer:
In centralized method, the authorized sender is known, but the transmission line is dominated by the control station, while in decentralized method, one station can not dominate the line but collision on the transmission line may occur.
Explanation:
Centralized method of communication requires for a control station to manage the activities if other stations in the network. It assigns turns to one known station at a time, for transmission.
Decentralized method allows stations in a network to negotiate and take turns in transmitting data. When a station is done with the transmission line, another station on the queue immediately claims the line.
The answer for this would be B.
Answer: time of day, duration, due dates
Explanation: I am awsome