1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
14

Plz plz plz plz plz plz plz plz plz plz plz pl plz plz plz plz plz plz plz plz plz plz plz plz olz plz plz

Computers and Technology
1 answer:
zvonat [6]3 years ago
6 0

REM PROGRAM TO DISPLAY AVERAGE OF TWO NUMBERS

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

INPUT “ENTER THIRD NUMBER”; C

AV = (A + B + C) / 3

PRINT “AVERAGE OF THREE NUMBERS”; AV

END

hope this helpz

You might be interested in
______ are used to store all the data in a database.
e-lub [12.9K]

Answer:

C. Fields

Explanation:

Fields are used to store all the data in a database.

6 0
2 years ago
Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?
Aleks04 [339]

Answer:

computer programming

Explanation:

says the answer in the question

5 0
3 years ago
You want to use the randrange() method. Which line will allow you to enter the following code in IDLE?
AleksandrR [38]

Answer:

It depends on the situation

import "from random import randrange"

for printing random numbers between integers "random.randrange(num1, num2"

Syntax:

"random.randrange(start, stop, step)"

Parameter Values:

start - optional - an integer defining which position to start - default = 0

stop - required - an integer defining which position to end.

step - optional - an integer define the incrementation - default = 1

Explanation:

The syntax is a bit weird but I hope I was a help

5 0
3 years ago
Read 2 more answers
Can someone help me asap​
vichka [17]

Sorry but Your screwed

4 0
3 years ago
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
beks73 [17]

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

4 0
2 years ago
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • What computer system was the first to run the unix operating system?
    11·1 answer
  • Syntax errors ________. a. result from an attempt to perform an operation that cannot executeb. are errors such as misspelled ke
    14·1 answer
  • Anyone down to play gta later i play on ps4?
    15·2 answers
  • Clarice is an architect who is involved in design work on a restaurant in a building that used to be part of the city’s water wo
    8·1 answer
  • Write a function SwapArrayEnds() that swaps the first and last elements of the function's array parameter.
    6·1 answer
  • Which of the following are NOT possible using the RANDOM(a, b) and DISPLAY(expression) abstractions?
    10·1 answer
  • Open excel program then use the (IF) function to fill the column of (Expensive/Cheap) then save your
    9·1 answer
  • Explain why agile methods may not work well in organizations that have teams with a wide range of skills and abilities and well-
    7·1 answer
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!