1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
11

Subana is writing a program which will calculate the mean average of a set of numbers by adding the numbers and dividing the res

ult by the amount of numbers. What variable will she use?
Computers and Technology
2 answers:
marysya [2.9K]3 years ago
8 0

Answer:

Data Type: Double (decimal)

Variable Name: avg

Explanation:

An average of numbers will typically give you a decimal answer. Therefore, you should use the Double data type.

Nutka1998 [239]3 years ago
6 0

Answer:

double mean

double sum

double number

int count

Explanation:

There are many options to code a program for mean calcultation. This one is one of the simplest. First of all,  get the numbers and increase the value of count by 1 each time new number is added. Then add the incoming numbers one by one performing the summation of all the input numbers on the variable sum; the final step is the calcultation of the mean by diving the variable sum by the variable count. With those variables ready, then Subana can make the code work properly.

You might be interested in
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
3 years ago
Lenny is a cheese packer at Cheddar Express. He is paid $.52 for every case of cheese he packs and loads onto delivery pallets M
Natali [406]

Answer:

oof.

Explanation:

6 0
3 years ago
Understanding that protection of sensitive unclassified information is:
AfilCa [17]

Answer:

Not necessarily malignant

Explanation:

As the word "unclassified" shows it's not damaging, however I still doesn't recommend if it's not necessary.

4 0
3 years ago
Can the police track a phone if you post something on a social media platform even if the SIM card is out and location services
IgorLugansk [536]
Yes by using the internet address
6 0
3 years ago
Read 2 more answers
By what date must federal taxes typically be filed and sent to the IRS?
marishachu [46]
April 15th of each annual year
6 0
3 years ago
Other questions:
  • ACCOUNTING
    13·2 answers
  • Smartart and shapes are useful tools because they allow you to
    10·1 answer
  • Research information technology affects on job market, career pathways, occupational outlooks in business and finance and synthe
    7·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • What is the purpose of citations?
    13·1 answer
  • Overlay analysis is ____________, taking in data from two or more layers to create a single output layer.
    5·1 answer
  • When approaching a bicyclist from the rear, you should slow down and
    8·1 answer
  • While developing a network application, a programmer adds functionally that allows her to access the running program without aut
    14·1 answer
  • ---------------------- use of the Internet to access programs and data on computers that are not owned and managed by the user o
    9·1 answer
  • A. Why are the data known as raw facts? Explain.​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!