1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
13

Write an algorithm to calculate the average value of array of integer elements

Computers and Technology
1 answer:
amid [387]3 years ago
7 0

Answer:

Explanation: Input : arr[] = {1, 2, 3, 4, 5}

Output : 3

Sum of the elements is 1+2+3+4+5 = 15

and total number of elements is 5.

So average is 15/5 = 3

Input : arr[] = {5, 3, 6, 7, 5, 3}

Output : 4.83333

Sum of the elements is 5+3+6+7+5+3 = 29

and total number of elements is 6.

So average is 29/6 = 4.83333.

You might be interested in
Which file types have .exe and .png as their extensions?
uysha [10]
.png are for photos and .exe are for programs.
6 0
3 years ago
Read 2 more answers
What is the full form of OS.​
Leya [2.2K]

The full word of the abbeviation OS?

It is Operating System. Like Apple's OS or Microsoft's OS.

6 0
3 years ago
Read 2 more answers
What are three examples of information technologies you use in your everyday life? Which do you consider to be the most importan
Anit [1.1K]
I think there's so many example of information technology in our daily life.

The word information and technology which means all of information that is provided by technology.

Every day we use information technology such as social media, television, computer, and etc.

I think this brainly platform is also information technology.

Which can provide so much necessary information to the whole world
3 0
3 years ago
What is Malware? Discuss this topic and give 3 examples of Malware AS WELL AS a description of how they cause damage to computer
Papessa [141]

Answer:

Definition:

Malware refers to the malicious electronic instructions ( programmes ) which copy and store themselves on the memory of the computer which destroys and halts the working condition of the computer.

Examples:

<em>→</em><em> </em><em>Trojanic</em><em> </em><em>bomb</em><em>.</em>

<em>→</em><em> </em><em>Memory</em><em> </em><em>bomb</em><em>.</em>

<em>→</em><em> </em><em>Polymorphic</em><em> </em><em>bomb</em><em>.</em>

5 0
3 years ago
2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries with these keys (in the gi
Juliette [100K]

Answer:

A) (2,4) tree

  • Insertion of  key 45 makes key unbalanced and this is because it violates the 2,4 tree so we split the node
  • insertion of key 10 makes key unbalanced and this is because it violates the 2,4 tree so we split the node

B) Red-black tree

Explanation:

The diagrams for the solutions are attached showing the results of inserting entries

6 0
3 years ago
Other questions:
  • U GET BRAINLIEST HELP PLZ
    11·1 answer
  • How do I cancel my subscription
    14·2 answers
  • When you add text to a slide using presentation software, which of the following is important?
    12·2 answers
  • A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops
    11·1 answer
  • Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
    10·1 answer
  • Language: JAVA Can someone please tell me what the problem to my "main" class is?
    15·1 answer
  • Think about that the C, B and S parameters of a Cache. Think about what happens to compulsory, capacity, conflict misses, if onl
    7·1 answer
  • A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, d
    12·1 answer
  • What is the name of the computer that access shared resources on the network<br><br>​
    5·2 answers
  • Join the class <br> The class code is hello112
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!