1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
8

What does the following program do? student = 1 while student <= 3: total = 0 for score in range (1,4): score = int(input("En

ter test score: ")) total += score average = total/3 print("Student ", student, "average: ", average) student += 1

Computers and Technology
1 answer:
sukhopar [10]3 years ago
6 0

Answer:

The code requests for the scores of three students for three courses offered by each student.

It calculates and print the average score for each student

Explanation:

The code written in Python programming language uses a while to get student 1-3 and a for loop to get scores for course 1-3

See attached code and output

You might be interested in
Many digital libraries have much more information than traditional libraries
Grace [21]

Answer:

However, despite 10 great breakthroughs of 2018 in technology, traditional libraries are still around – the British Library in London, the Library of Congress in Washington, D.C., the New York Public Library, the Bavarian State Library and many more which you can find in the list of 25 most famous libraries of the world. Although they don’t shy away from implementing some of the novelties into their structure and organization – all of them have quick access to the Internet. Well, why is it so? Is it going to keep that way? Just like in case with any other topic, making predictions is an ungrateful task, for the world is most likely to develop in the least predictable way – just like it always does. Let’s look at the ‘battle’ between digital and traditional libraries.

Explanation:

5 0
3 years ago
Human centered technology often recommends a0 to computer designers and manufacturers, telling them how to make systems and the
IceJOKER [234]

Human centered technology often recommends best practices to computer designers and manufacturers, ...............

Human-Computer Interaction is a study that particularly focuses more on the design of computer technology and the interaction between humans and computers. Since the 1980s when HCI surfaced, it has become a crucial tool in popularizing the idea that the interaction between a user and a computer should resemble a human-to-human, open-ended dialogue. When HCI is done well, a human-centered approach powers the creation of products that resonates more deeply with a certain audience. This will ultimately drive engagement and growth.

6 0
4 years ago
Read 2 more answers
A(n) ____ is a front-end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large compu
Taya2010 [7]
I think it'd be terminal concentrator.  A(n) terminal concentrator is a front - end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large computer. 
7 0
3 years ago
Explain the concept of risk management, including risk identification, assessment, and control.
abruzzese [7]

Answer:

Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .

  • Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
  • Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
  • Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.  

7 0
4 years ago
While working alone at their constant rates computer X can process 240 files in 4 hours, and comp Y 240 files in 8 hrs. If all f
djverab [1.8K]

Answer:

2hrs 40 min

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • What was one of the first inventions that made it possible to communicate almost instantly?
    11·1 answer
  • Assume that the following variables have been defined in a program: int x = 10; int y = 20; int z = 30; Write a cout statement t
    11·1 answer
  • We will pass in a value N. Write a program that outputs the complete Fibonacci sequence for N iterations. Important: If N is 0,
    13·1 answer
  • What is the main feature of Ethernet over Power?
    9·1 answer
  • Brainliest to whoever answers this first, i need help explaining.
    8·1 answer
  • Where do you place the logical test argument in an JF function formula?
    5·2 answers
  • Create a class named Lease with fields that hold an apartment tenant’s name, apartment number, monthly rent amount, and term of
    13·1 answer
  • Desktop and personal computer are also known as​
    7·1 answer
  • What is a mod in programming?<br><br> Give more Java questions
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!