1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
8

What does the following program do? student = 1 while student <= 3: total = 0 for score in range (1,4): score = int(input("En

ter test score: ")) total += score average = total/3 print("Student ", student, "average: ", average) student += 1

Computers and Technology
1 answer:
sukhopar [10]3 years ago
6 0

Answer:

The code requests for the scores of three students for three courses offered by each student.

It calculates and print the average score for each student

Explanation:

The code written in Python programming language uses a while to get student 1-3 and a for loop to get scores for course 1-3

See attached code and output

You might be interested in
Write a Python program that accepts a year written as a four-digit Arabic (ordinary) numeral and outputs the year written in Rom
ICE Princess25 [194]
Roman numerals are V for 5, X for 10, L for 50, C for 100, D for 500, and M for 1,000.
Recall that some numbers are formed by using a kind of subtraction of one Roman “digit”; for example, IV is 4 produced as V minus I, XL is 40, CM is 900, and so on.
A few sample years: MCM is 1900, MCML is 1950, MCMLX is 1960, MCMXL is 1940, MCMLXXXIX is 1989.
(Hints: Use division and mod.)

Assume the year is between 1000 and 3000.
5 0
3 years ago
How many generations of computer languages
vichka [17]
5 generations................
6 0
3 years ago
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Critics of media consumption :
Virty [35]
A media should not be done away with all together
7 0
3 years ago
True or false? A medical assistant can check for available exam rooms and providers using an electronic scheduling system.
lutik1710 [3]
This is true m8 hope this helps
4 0
3 years ago
Other questions:
  • Develop an EER model for the following situation using the traditional EER notation, the Visio notation, or the subtypes inside
    8·1 answer
  • What feature did we use to quickly apply the formatting shown in this image?
    9·1 answer
  • Using an LCD projector to show an online video to a group of people is an example of:
    14·1 answer
  • Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
    5·2 answers
  • In which step of web design is storyboarding helpful?
    14·1 answer
  • What are the coordinates of the origin point? (Select the best answer.)
    10·1 answer
  • Which line in the following program contains the prototype showDub function? 1 #include 2 using namespace std; 3 void showDub(in
    12·1 answer
  • List three types of Software:
    15·1 answer
  • It is common for people to name directories as dir1, dir2, and so on. When there are ten or more directories, the operating syst
    8·1 answer
  • Which measurement symbol is this?<br>PLS HELP<br>​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!