1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
2 years ago
12

Calculate the total and average number from 1 to 100​

Computers and Technology
1 answer:
Vikentia [17]2 years ago
4 0

Answer:

Thus, 50.5 is an average of numbers from 1 to 100.

Explanation:

getcalc.com's average calculator to find what is the mean or average of natural numbers upto 100.

50.5 is an average of numbers from 1 to 100 mentioned in the below table, by substituting the total sum and count of numbers in the below formula. The corresponding formulas, chart, examples & workout may help students, teachers or professionals to learn, teach or practice the average of natural numbers upto 100.

Address the formula, input parameters & values.

Formula: Average = Total Sum of Numbers / Total Count of Numbers

Input parameters & values:

The numbers from 1 to 100 are

1, 2, 3, 4, . . . . , 98, 99, 100

Total Count of Numbers = 100

step 2 Find the sum of numbers from 1 to 100.

sum = 1 + 2 + 3 + . . . . + 99 + 100

= 5050

step 3 Divide the sum by 100 Average = 5050/100 = 50.5

Thus, 50.5 is an average of numbers from 1 to 100.

You might be interested in
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
3 years ago
3-Write a Python program that has subprograms nested four deep and in which each nested subprogram references local variables, v
vivado [14]

Answer:

Explanation:

Below is a little explanation to guide us through;

There are 4 nested methods : level 0, level 1, level 2, and level 3.

Before the methods, there's a global variable defined that can be accessed by all the methods.

Level 0:

This method uses global variable, creates a level 0 variable in its scope, this level 0 variable can be used by all underlying nested methods.

Level 1: this method uses global, level 0, and level 1 variable, which can be accessed by all underlying nested methods: level 2, level 3.

Level 2: similar to te previous ones, it also uses global, level 0, level 1 variables. And creates a level 2 variable that can be accessed by level 3 also.

Level 3:

This method uses all previously created variables, and creates a new level 3 variable.

Function calls:

As you can see, the function calls are part of the method scopes. So, in order to call level 3, we need to access level 2 (because it is getting called from level 2 scope), for level 2, we must call level 1, for which level 0 needs to be called.

So, level 0 is called, which gives its out put and calls level 1, which gives its own output and calls level 2 and so on till level 3 is also called.

CODE:

global_var = "global" #accessible to all functions

def level0():

level0_var = "level 0" #accessible to level 0,1,2,3

print();

print("Level 0 function:")

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

def level1():

print();

print("Level 1 function:")

level1_var = "level 1" ##accessible to level 1,2,3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

def level2():

print();

print("Level 2 function:")

level2_var = "level 2" #accessible to level 2,3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

print("local variable 2: ",level2_var)

def level3():

print();

print("Level 3 function:")

level3_var = "level 3" #accessible to level 3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

print("local variable 2: ",level2_var)

print("local variable 3: ",level3_var)

level3()

level2()

level1()

level0()

attached is the result of the code, also take note of the indentations too

cheers i hope this helps!!!!!

5 0
3 years ago
Place the following discoverers in the correct chronological order of the timeframe for their discoveries, from earliest to most
Alex787 [66]
The correct order or answer is the 2nd choice.

Pythagoras, Gauss, Edison, Hawking. The following are the most noted discoveries of each.

Pythagoras, 500 B.C. School Of Mathematics and Pythagorean theorem.Edison, Year 1879 - Invention of incandescent light bulb.Gauss, Year 1801 - Therom of Alegbraic Solution. Stephen Hawking Year1980 - Studies in cosmology particularly contributing to the context of black holes.
5 0
3 years ago
The computer mouse is used to
galben [10]
The answer is C , what else would you do with the mouse?
6 0
3 years ago
Analyze each of the situations below. Which of the following BEST Illustrates someone who shows appropriate information literacy
maw [93]

The best illustration of information literacy is A. Felix completes an Internet search for a topic for his science class. He takes nearly 30 minutes reading through the different results until he locates a reliable website.

<h3>What is information literacy?</h3>
  • Refers to being able to find and sort through information.
  • Allows for problem solving.

Felix has the problem of looking for information for his topic. He therefore goes online to find, sort through, and then use the information he finds to solve his problem.

In conclusion, the best answer in option A.

Find out more on information literacy at brainly.com/question/25039489.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • Jenny wants to create an animated short video to add to her website. Which software will she use to create this animated video?
    14·1 answer
  • Write a program that uses an "if" statement to determine if the number is greater than one. If the number is greater than 1, the
    9·1 answer
  • Given two Generic variables, A with value "123" and B with value 456, what would the Write Line output of A + B be? 123456 579 A
    5·1 answer
  • Suppose that we can improve the floating point instruction performance of machine by a factor of 15 (the same floating point ins
    13·1 answer
  • Rewrite this if/else if code segment into a switch statement int num = 0; int a = 10, b = 20, c = 20, d = 30, x = 40; if (num &g
    13·1 answer
  • Attribute variables have the same meaning as participants variables. is this true or false?​
    14·1 answer
  • A ________ is an input device that responds to finger touch.
    8·2 answers
  • A sum amounts to ₹2400 at 15% simple interest per annum after 4 years fond the sum.​
    9·1 answer
  • When you go to your school's computer support office, it will help if you have written down any _________ messages.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!