1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
2 years ago
6

What does median mean in the data?

Computers and Technology
2 answers:
ZanzabumX [31]2 years ago
8 0

Answer:

The median is the middle number in a sorted, ascending or descending, list of numbers and can be more descriptive of that data set than the average.

Explanation:

The median provides a helpful measure of the centre of a dataset. By comparing the median to the mean, you can get an idea of the distribution of a dataset. When the mean and the median are the same, the dataset is more or less evenly distributed from the lowest to highest values.

QveST [7]2 years ago
4 0

Answer:

What data? Also, if it's median wouldn't that be Mathematics? edit-im sorry im d-u-m-b i thought you meant there was numbers and data but you mean the meaning of median

the median in data is the middle number and if its an even number you add the two middles together and divide by two

again sorry

You might be interested in
What is it called to persist in trying to multitask can result in this; the scattering bits of one’s attention among a number of
lozanna [386]

Answer: <em><u>is Option B</u></em>.

B<u>)</u>. <u>Multi tasking</u>:   A person capability to carry out more than one task at the same time is called multitasking. Person performing more than one task at the same time is nearly impossible and it's hard for him to focus on each and every detail, thus leading to scatter attention among numbers of things at a time resulting in inaccuracy and greater numbers of fault in final result.

<u>Explanation of other points:</u>

<u></u>

A<u>)</u>. <u>Attention:</u> is defined as performing tasks with special care and concentration.

C<u>)</u>. <u>Continuous partial attention:</u>  Under this category people perform tasks by concentrating on different sources to fetch information by only considering the most valid information among all information. people who use this technique to gather information works superficially concentrating on the relevant information out of numerous sources in a short period of thinking process.

7 0
2 years ago
Integrity constraints are enforced by Group of answer choices A. The operating system B. The end user C. The database designer D
slega [8]

Integrity constraints are enforced by The database designer.

<h3>What are Integrity constraints?</h3>

An  Integrity Constraints is known to be the protocols that a table's data columns is mandated to follow.

Note that they are used to hinder the types of information that can be put into a table and as such, Integrity constraints are enforced by The database designer.

Learn more about Integrity constraints from

brainly.com/question/28026113

#SPJ1

4 0
2 years ago
What is the binary answer to the binary number 100 added to the binary number 11?
olasank [31]
I will use 0b to refer to binary numbers: ex: 0b1 = 1, 0b10 = 2

0b100 = 4 and 0b11 = 3

4+3 = 7

convert 7 to binary and you get 111.

Hope this helps, and May the Force Be With You!
<span>-Jabba</span>

6 0
3 years ago
Read 2 more answers
Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a
Sever21 [200]

The missing segment of the code illustrates the use of functions.

Functions are also referred to as <em>procedures or methods</em>; they are set of instructions that act as one.

The code segment that complete the code in the question is as follows:

<em>def calc_pyramid_volume(length, width, height): </em>

<em>    baseArea = length * width </em>

<em>    Volume = baseArea * height * 1/3 </em>

<em>    return Volume</em>

<em />

<em />

The first line of the code segment declares the function itself

<em>def calc_pyramid_volume(length, width, height):</em>

Then, the base area of the pyramid is calculated

<em>    baseArea = length * width</em>

Then, the volume of the pyramid is calculated

<em>    Volume = baseArea * height * 1/3</em>

Lastly, the volume is returned to the main method

<em>    return Volume</em>

So, the complete code (without comments) is:

<em>def calc_pyramid_volume(length, width, height): </em>

<em>    baseArea = length * width </em>

<em>    Volume = baseArea * height * 1/3 </em>

<em>    return Volume </em>

<em>     </em>

<em>length = float(input()) </em>

<em>width = float(input()) </em>

<em>height = float(input()) </em>

<em>print('Volume for', length, width, height, "is:", calc_pyramid_volume(length, width, height))</em>

<em />

See attachment for the sample run

Read more about functions at:

brainly.com/question/17225124

8 0
2 years ago
Question 1(Multiple Choice Worth 2 points)<br> Which of the following is true of a good photograph?
Rainbow [258]

Answer:

No link but good things about a photgrahp are

Explanation:

Good lighting

Good camra

Good spot

Good zoom

Good focus

4 0
2 years ago
Read 2 more answers
Other questions:
  • Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou
    12·2 answers
  • You are working on an excel table and realize that you need to add a row to the middle of your table. what is one way to do this
    12·1 answer
  • Describe one example of how technology assits people with data and sample collection
    14·2 answers
  • What can your employer do to protect you from overhead power lines?
    13·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to an
    8·1 answer
  • What is an example of CT SO?
    9·1 answer
  • Which are aspects of the post-production stage?
    9·1 answer
  • Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose
    12·1 answer
  • Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individua
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!