1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reil [10]
3 years ago
11

HELP ME ILL GIVE BRAINLY Input 50 numbers and then output the average of the negative numbers only. Write in pseudocode!

Computers and Technology
1 answer:
Mumz [18]3 years ago
3 0

Answer:

The explanation is for 10 inputs though. You'd have to follow these steps to find input 50 numbers.

Explanation:

This is how I wrote it in the Plain English programming language which looks like pseudo-code but compiles and runs (to save you all the rest of the steps):

To run:

Start up.

Write "Enter 10 numbers separated by spaces: " on the console.

Read a reply from the console.

Loop.

If the reply is blank, break.

Get a number from the reply.

Add 1 to a count.

Add the number to a total.

Repeat.

Write "The total is: " then the total on the console.

Put the total divided by the count into an average.

Write "The average is: " then the average on the console.

Refresh the screen.

Wait for the escape key.

Shut down.

You might be interested in
4. Assume you have a list of numbers
navik [9.2K]

lst = [12,10,32,3,66,17,42,99,20]

a)

for x in lst:

   print(x)

b)

for x in lst:

   print(str(x) + " " +str(x**2))

I think this is what you're looking for. Hope this helps!

5 0
3 years ago
Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
olchik [2.2K]

Answer:

The correct answer to the following question will be "an unauthorized transaction from the credit card of a user".

Explanation:

Hacking was the catch-all word for some form of software misuse or exploitation that violates the protection of someone's computing device for stealing data, corrupting systems or information, manipulating the infrastructure or in some way disrupting related to data-activities.

  • The current popular type involves the phishing scam, whereby hackers or attackers try to obtain username names as well as their passwords or add vulnerabilities to networked processing ecosystems by tricking clients through accessing a mail file or transmitting confidential data.
  • The other options are not related to the given scenario like hacking. So, above it the right answer.
3 0
3 years ago
Create a class called ClockNode which has fields for the data (a Clock) and next (ClockNode) instance variables. Include a one-a
zimovet [89]
Idk ....................
4 0
3 years ago
Since technology has advanced so much in the last 20 years, how has it impacted televisions?
kherson [118]

Answer:

Television began to have better graphics, and usually thinner. Television also gained a lot of new features of the years as the technology in the world got better

Explanation:

5 0
4 years ago
What can help you prevent issues related to downloading content form the internet
Paladinen [302]
For starters make sure you have good WiFi or signal, then make sure your computer can handle certain content or has enouch space to store it. Always check if you have a virus, for this you should get an antivirus, viruses can slow down computers or harm them in many different ways one of them being the ability to download or even use such content.

Hope this helped:)
8 0
3 years ago
Other questions:
  • Most common level of education for a programmer or software developer
    9·1 answer
  • What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply
    14·2 answers
  • Would you recommend the 4a generations of computers to a friend
    5·1 answer
  • What statement best describes the Microsoft Windows operating system?
    13·2 answers
  • The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nont
    6·1 answer
  • A computer is an electronic device operating under the control of instructions stored in its own memory that can accept, manipul
    11·1 answer
  • PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
    9·1 answer
  • <img src="https://tex.z-dn.net/?f=%20%3Cmarquee%20behavior%3D%E2%80%9Dscroll%E2%80%9D%20direction%3D%E2%80%9Ddown%E2%80%9D%3EFol
    9·1 answer
  • It is not important to type '=' before a formula or a function
    12·1 answer
  • What is the full form of HTML​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!