1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
7

write the program or pseudocode algorithm that computes the product and average of three integers and display the results​

Computers and Technology
1 answer:
sweet-ann [11.9K]3 years ago
7 0

<u>Answer:</u>

<u><em>Algorithm: </em></u>

<em>Step 1: </em><em>Begin </em>

<em>Step 2: </em><em>Obtain the inputs – all the three integers </em>

<em>Step 3: </em><em>Calculate product using the formula “a*b*c” </em>

<em>Step 4: </em><em>Calculate sum and then with the help of sum calculate the average </em>

<em>Step 5: </em><em>Print the value of product and average </em>

<em>Step 6: </em><em>End </em>

<u>Explanation:</u>

<u><em>Program: </em></u>

<em>#include<stdio.h> </em>

<em>int main () { </em>

<em>    int a, b, c; </em>

<em>    printf(""Enter three numbers: ""); </em>

<em>    scanf(""%d %d %d"", &a, &b, &c); </em>

<em>    int sum = a + b + c; </em>

<em>    int product = a * b * c; </em>

<em>    float avg = sum / 3.0; </em>

<em>    printf(“Product = %d”, product”);  </em>

<em>    printf(""Sum = %d, Average = %f"", sum, avg); </em>

<em>    return 0; </em>

<em>} </em>

You might be interested in
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.
Mashutka [201]
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.

a. True
7 0
3 years ago
Name box _________. a. Used to move horizontally or vertically within a worksheet b. A group of selected cells c. The cell refer
MA_775_DIABLO [31]

Answer:

The answer is "Option c".

Explanation:

The name box is a part of the Microsoft Excel, that provides an input box on the left side of the formula row, which is usually shown on the "working cell" address on the worksheet. It can also use the name box is to easily switch to any location in the Worksheet, and wrong choices can be described as follows:

  • In option a, It is used in worksheet but it's not a worksheet.
  • In option b, It can't select cells.
  • In option d, It is used to input a value not to identify the program.

5 0
3 years ago
How are phishing, ransomware and distributed- denial of service attack alike and different?
Aleks04 [339]

Answer:

Phishing means cyber theft in which the cyber thief sends the target PC a malicious email, which looks like coming from some known source, and they ask for certain critical information, which must not be leaked. Similarly, In ransomware, they send the phishing email with malicious code, and they hack the computer system. They then ask for a ransom as a return for reactivating your PC. Distributed Denial of service attack happens when the traffic flood the bandwidth and the resources of a PC, and finally a lot of are denied of access to them. Ransomware, when it attacks a bank account, becomes a Denial of service attack, as multiple users are stopped from accessing their account. All of these are hence, almost the same and revolves around the phishing email.

Explanation:

Please check the answer.

8 0
3 years ago
What is a resume?A collection of all your professional and artistic works.A letter which explains why you want a particular job.
mars1129 [50]

Answer:

a 1-2 page document that demonstrates why you are qualified for a job by summarizing your skills, education, and experience.

7 0
4 years ago
When you filter media, you:
Lisa [10]
You filter yourself and the world surrounding you? Is there more to this question?
4 0
4 years ago
Read 2 more answers
Other questions:
  • You are working on an excel table and realize that you need to add a row to the middle of your table. what is one way to do this
    12·1 answer
  • give your opinion on if you would trust your accounts with an online bank. Explain why or why not. MANY people do not. MANY peop
    14·2 answers
  • You are a developer for a company that is planning on using the AWS RDS service. Your Database administrator spins up a new MySQ
    7·1 answer
  • Which of the following statements is TRUE of the information systems (IS) department? A. The operations group monitors user expe
    8·1 answer
  • Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which
    10·2 answers
  • What does 69 mean?<br> Whenever I watch memes they always talk about the number 69
    8·2 answers
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?
    6·2 answers
  • What are the steps to view two different versions of the same document at once?
    11·1 answer
  • What is one way a pivottable could combine the following data?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!