1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
3 years ago
13

Christina used the following expression to calculate the average ages of her three program users: average = age1 + age2 + age3 /

3 However, her output is not correct. What did she do wrong?
A.She did not use parentheses around the age values to indicate the proper order of operations.
B.She did not use quotation marks around the age values to indicate the proper order of operations.
C.She should have used the multiplication symbol instead of the division symbol.
D.She should have used a string function to perform the calculation.
Computers and Technology
2 answers:
aleksley [76]3 years ago
6 0
I am thinking it's A. Not so sure though.
Illusion [34]3 years ago
4 0

Only age3 is divided by 3. To calculate the average, you should first add the ages, then divide by the number of ages. This can be accomplished by adding parenthesis around the age values. Answer A is the correct one.

You might be interested in
What are tributaries
sukhopar [10]
Tributaries are rivers that flow into another river or another lake. Tributaries are common in any country. Tributaries are like roots of lakes that flows to somewhere else. It is like a distribution of water that scatters through streams and lands to a larger body of water.
5 0
3 years ago
Read 2 more answers
What is the most likely result of making a plan for life after high school
lilavasa [31]

Answer:

It is nice to have somewhat of an outline regarding what you would like to do after high school, however, I believe it may be more difficult to have a whole plan.

Explanation:

There is no way anyone can predict what can happen so not everything will go to plan. As humans we learn to alter our choices to the situation we are in so a certain event in your life could take place causing you to take a completely different route than the one you had intended or planned.

8 0
2 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
If your computer determines the destination address of a network packet is to a remote network.
Arisa [49]

The data link layer software would replace the MAC address of the next hop or gateway when the destination address of a network packet is to a remote network.

<h3>What is a data link layer?</h3>

The data link layer is the second layer of the OSI model and it can be defined as an interface between the network and physical layer. Also, it comprises two (2) main sublayers and these include the following:

  • Logical link control (LLC) layer.
  • Media access control (MAC) layer.

In Computer networking, the data link layer software would replace the MAC address of the next hop or gateway when the destination address of a network packet is to a remote network.

Read more on data link layer here: brainly.com/question/13131540

#SPJ1

5 0
2 years ago
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
Sati [7]

Answer: Logical Point Blocking

Explanation:

4 0
1 year ago
Other questions:
  • why is wrong timing, poor technology, bad implementation and politics in business affected the OSI model as a standard
    5·1 answer
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • What image format should be used to keep the file size manageable​
    14·1 answer
  • which feature of organisations to manage needs to know about to build and use information system successfully
    6·1 answer
  • Application of computer in insurance​
    14·1 answer
  • Please help I will mark brainliest ⚡️⚡️⚡️⚡️
    12·1 answer
  • What is the main function of processing unit​
    5·2 answers
  • How can you create a messages to look like an IMessage?
    8·1 answer
  • Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and
    12·1 answer
  • Q3: What do you mean by a pointer to a pointer? Can this be extended?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!