Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
int n;
double average,sum=0,x;
cout<<"enter the Value of N:";
// read the value of N
cin>>n;
cout<<"enter "<<n<<" Numbers:";
// read n Numbers
for(int a=0;a<n;a++)
{
cin>>x;
// calculate total sum of all numbers
sum=sum+x;
}
// calculate average
average=sum/n;
// print average
cout<<"average of "<<n<<" Numbers is: "<<average<<endl;
return 0;
}
Explanation:
Read the total number from user i.e "n".Then read "n" numbers from user with for loop and sum them all.Find there average by dividing the sum with n.And print the average.
Output:
enter the Value of N:5
enter 5 Numbers:20.5 19.7 21.3 18.6 22.1
average of 5 Numbers is: 20.44
Based on the scenario above about the leading-trailing system Both technician A and B are incorrect.
<h3>How many brake shoes function?</h3>
There are known to be two shoes function that are said to be working a way where both become either the trailing shoe or leading shoe based on whether the vehicle is moving forward or backward.
Therefore we can say that, Based on the scenario above about the leading-trailing system Both technician A and B are incorrect.
Learn more about trailing system from
brainly.com/question/14367881
#SPJ1
Answer:
Explanation:
There are many weaknesses/vulnerabilities, some of which are the following...
Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.
Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.
WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.
These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.
Answer:
The questions are used to secure and identify you furthermore. Answering personal questions that only you can answer will deter someone from hacking into your account that easily.
Explanation:
Update your passwords frequently, delete unused accounts, and be diligent about who and what you give your most personal information to. Invest in tech that fits your lifestyle without offering further distractions.