Assign avg_owls with the average owls per zoo. Print avg_owls as an integer.

Sample output for inputs: 1 2 4
Average owls per zoo: 2

Answers

Answer 1

Answer:

I'm going to add a python program for this example, step by step:

We declare 4 variables for our zoo, zoo quantity, and the average.

We make the operation for the average where sum the zoo and divide with the quantity

In the last step, we print the variable avg_owls.

num_owls_zoo1 = 1

num_owls_zoo2 = 2

num_owls_zoo3 = 3

num_owls_zoo4 = 4

zoos = 4

avg_owls = 0.0

avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos

print('Average owls per zoo:', int(avg_owls))

Explanation:

Answer 2

The coding of the print avg_owls as an integer is written above.

What is coding?

We connect with computers through coding, often known as computer programming. Coding is similar to writing a set of instructions because it instructs a machine on what to do. You can instruct computers what to do or how to behave much more quickly by learning to write code.

We make the operation for the average, where sum the zoo and divide by the quantity.

In the last step, we print the variable avg_owls.

num_owls_zoo1 = 1

num_owls_zoo2 = 2

num_owls_zoo3 = 3

num_owls_zoo4 = 4

zoos = 4

avg_owls = 0.0

avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos

print('Average owls per zoo:', int(avg_owls))

Therefore, the coding is written above.

To learn more about coding, visit here:

https://brainly.com/question/1603398

#SPJ2


Related Questions

write the working of dot matrix printer?

no links

Answers

The working of dot matrix printer is provided in the picture.

what is the name of the computer that access shared resources on the network

Answers

Answer:

what is the name of the computer that access shared resources on the network

Explanation:

A server is a device or computer program that provides functionality for other devices or programs. Any computerized process that can be used or called upon by a client to share resources and distribute work is a server

If the host has a second network card, SECOND_NIC_NAME should get the name of that network card. If the managed host has no second network card, the playbook should set SECOND_NIC_NAME.

a. True
b. False

Answers

a. True is your answer

You can change the default margin size for Word documents. A. True B. False​

Answers

Answer:

False

Explanation:

Word processing is an application that allows you to create a variety of documents, including letters, resumes, and more.

Please answer this, don't skip please. I would really appreciate if you had knowledge over this question and helped out :)

1) The tag is the second of two main parts of a web page. The information between the opening and closing tag is seen by web page visitors in the browser window. True or False
2) The area is the first of two main parts of a web page. The header is where the operation code resides. True or False


3) The next tag is the tag - the head is the first of two main parts of a web page. The head is where the operation code resides. True or False

Answers

Answer:

1) they are only visible to the to the person/people who are running the website. therefore the answer to that statement is false.

2) they operation code of a website resides at the end of a address, therefore that statement is also false

Explanation:


A piece of computer hardware designed to allow computer to communicate over a network is?

Answers

Answer:

The hardware is a Router....

software.
Q4..
Microsoft word is an example of
(A) System
(1) word processor
(°) Presentation software
(P) Spreadsheet

Answers

Ms Word is an example of a word processor.

One example of a Word Processor is Microsoft Word, but other word processing applications are also widely used.

What do ALT stand for

Answers

Answer:

please mark me brainliest

Explanation:

ALT, which stands for alanine transaminase, is an enzyme found mostly in the liver. When liver cells are damaged, they release ALT into the bloodstream. An ALT test measures the amount of ALT in the blood.

Alt stands for "Alternate Key." I hope that this helped you.

Define mini computer

Answers

Answer:

Definition of minicomputer

a small computer that is intermediate between a microcomputer and a mainframe in size, speed, and capacity, that can support time-sharing, and that is often dedicated to a single application.

Answer:

A very small Computer

Explanation:

I computer that is very small like a apple watch.


8. Which of the following is
most likely to contain a
computer virus?


1.CD-ROM
2.RAM
3.Floppy Disk
4.ROM

Answers

Answer:

4. A floppy Disk

Explanation:

This is because it can be transfered from one device to another. So, if one device is infected with a virus, it'll be affected

[tex].[/tex]

differentiate between standard and enhanced keyboard(10 diffrences)​

Answers

Explanation:

by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water. Photosynthesis in plants generally involves the green pigment chlorophyll and generates oxygen as a by-product.

A standard keyboard typically features a basic layout and functionality, while an enhanced keyboard includes additional features such as multimedia keys, customizable macros, and backlighting options.

The difference between standard and enhanced keyboards are as follows:

1) Key Layout: One of the primary differences between a standard keyboard and an enhanced keyboard is the key layout. A standard keyboard typically follows the traditional QWERTY layout, while an enhanced keyboard may have additional keys or modified key arrangements.

2) Extra Function Keys: Enhanced keyboards often feature additional function keys beyond the standard set found on a standard keyboard. These extra keys may provide quick access to specific functions like media controls, volume adjustment, launching applications, or controlling lighting effects.

3) Multimedia Controls: Enhanced keyboards often include dedicated multimedia controls for managing audio and video playback. These controls allow users to play, pause, stop, or skip tracks without the need to navigate through software interfaces.

4) Macro Keys: Enhanced keyboards may offer programmable macro keys that allow users to assign custom functions or complex sequences of commands to a single key press. This feature is commonly utilized by gamers or power users who require quick access to specific actions or shortcuts.

5) Backlit Keys: Many enhanced keyboards have backlit keys, allowing for improved visibility in low-light environments. These keyboards may offer adjustable backlighting levels or even customizable RGB lighting options for personalization.

6) Touchpad or Trackpad: Some enhanced keyboards include an integrated touchpad or trackpad, similar to those found on laptops. This feature eliminates the need for a separate mouse and provides cursor control directly on the keyboard.

7) Ergonomic Design: Enhanced keyboards often prioritize ergonomics by incorporating features like palm rests, adjustable tilt angles, or split keyboard layouts. These design elements aim to provide increased comfort and reduce the risk of repetitive strain injuries.

8) Connectivity Options: While standard keyboards usually come with a wired USB connection, enhanced keyboards may offer additional connectivity options such as wireless Bluetooth or specialized connectors like USB-C for faster data transfer.

9) Specialized Keys: Enhanced keyboards may have dedicated keys for specific purposes, such as gaming keyboards with keys optimized for gaming actions like WASD movement or mechanical keyboards with specialized switches for tactile feedback.

10) Software Integration: Enhanced keyboards often come with companion software that allows users to customize key functions, lighting effects, and other settings. This software integration provides additional flexibility and personalization options beyond what standard keyboards offer.

Learn more about Keyboards click;

https://brainly.com/question/30124391

#SPJ2

What is a file and ten examples

Answers

Answer:

A file is a collection of related electronic information.

Examples;

» a report [ a dbm file ]

» a receipt [ a dbm file ]

» bill list [ a .xls file ]

» attendance sheet [ a .xls file ]

» family slideshow [ a .ppt file ]

» physics notes [ a .docx file ]

» chemistry notes [ a .doc file ]

» a query [ a .dbm file ]

» a survey sheet [ a .xls file ]

» organization work plan [ a .ppt file ]

Explanation:

[tex]{ \sf{dbm \:→database }} \\ { \sf{xls \:→ \: spreadsheet }} \\ { \sf{docx \: and \: doc→ \: word \: processor}} \\ { \sf{ppt \: → \: powerpoint}}[/tex]

Answer:

a file is for holding loose paper or important documents that are typically arranged in a particular order for easy reference

Explanation:

example PDF

DOC

AUDIO FILE FORMAT

TIFF

DOCUMENT FILE FORMAT

PSD

ZIP

Topic:

Recursion. Use recursion to display the pattern given above. No loops allowed.

See the picture for the pattern​

Answers

Answer:

const SIZE=8

function print(n, s) {

 if (n > 0) {

   process.stdout.write(s);

   print(n-1, s);

 }

}

function main(n=1) {

 if (n<=SIZE) {

   print(SIZE-n, "  ");

   print(n, "* ");

   process.stdout.write("\n");

   main(n+1);

 }

}

main();

Explanation:

Here is a solution in javascript. Note that it uses recursion multiple times to avoid loops.

When to not touch the mask? ​

Answers

Answer:

If your mask touches another part of your body that is potentially contaminated with the virus—hair, forehead, hands—and the mask is put over your mouth and nose, you are at risk for infection.

Always be sure to wash your hands before putting your mask on, and once it is in place and you are out in public, don’t keep touching or adjusting it. When you’re not wearing it, don’t leave it around your neck in case there was any type of contamination.

Who made computer ? Which year?

Answers

Answer:

The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.

Answer:

Charles Babbage in 1991

Draw a system flowchart illustrating the steps performed by an operating system as it executes the instruction to back up a disk on a single-user computer system.

Answers

The flowchart's pseudo code is as follows:

The command BACKUP user issues through the user interface.UI executes the awakening File Manager instruction.File Manager resolves the address of a backup file that wakes up Device Manager.Device Manager opens the drive access path to back files in the Memory Manager I/O buffer that reads the file (or part of the data).In the I/O buffer, Memory Manager assigns memory to the processor manager.Processor Manager loads the I/O buffer memory file, and File Manager awakens.File Manager determines the document address be copied into the Processor Managers new disc.The Device Managers, Processor Manager copies memory to the I/O buffer.This device manager enables you to open a drive access path where a new disc awakens file manager will be duplicated by the I/O buffer.File Manager decides whether the file is copied completely If yes if you are jumping to point 11, you decide the next area of the file that will be backed up and Device Manager is returning to point 4.File Manager decides if this is the last backup item, if not, it wakes up Manager of Processor Activates Processor Manager for sending interface File N is backed up for a client can jump back to point 3 if affirmative. The Processor Manager activates the user interface to send the user message 'All files have been backed up'.

Learn more:

brainly.com/question/17373574

brainly.com/question/13152070

If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connect to: ________

a. The local loopback interface
b. The local router on the network
c. The internet
d. A private server located on the local network

Answers

B is the answer i think

Click on three software applications that you can use to create a resume?

Answers

The three software applications that are applied for creating the resume are the word, writer, and the pages.

The information related to the resume is as follows:

It is a formal document made by the applicant for applying to the job. It should be along with the cover letter where the applicant shows interest in the particular job. Also, three types of software applications should be used for developing the resume i.e. word, writer, and the pages.

Therefore we can conclude that the three software applications that are applied for creating the resume are the word, writer, and the pages.

Learn more about the resume here: brainly.com/question/22931067

what are the functions of super computer?

Answers

Answer:

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling .

Explanation:

Hope it helps you

Answer:

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling, etc.

Which of the following tasks should be accomplished while preparing to write the body of an email?


Take a picture with of text messages with a camera and file it away


Back-up text messages from your phone to an email account


Send a copy of the text message to another phone


Write a copy of all the text messages you would like to save

Answers

Answer:

Write a copy of all the text messages you would like to save

The task that should be accomplished while preparing to write the body of an email is:

D. Write a copy of all the text messages you would like to save.

Activities involved while preparing to write body of an email

Preparing to write the body of an email involves organizing and gathering the necessary information to include in the email.

In this context, writing a copy of all the text messages that you would like to save is the most relevant task to accomplish before composing the email. This task ensures that you have the content you want to reference or include in the email readily available and helps you structure the email effectively.

The other tasks listed are not directly related to the email writing process and can be done separately at other times for different purposes.

Learn more about writing email at

https://brainly.com/question/24688558

#SPJ2

_________ are the special effects that you see when one slide changes to another in slide show view​

Answers

Answer:

Transition effects

Explanation:

Transition effects are the special effects you see when one slide changes to another in slide show view.

how to enter date in a Date/Time field?​

Answers

Answer:

Right-click the document tab for the new table and click Design View. In the Field Name column, select the first blank row, and then type a name for the field. Select the adjacent cell in the Data Type column, and then select Date/Time or Date/Time Extended from the list. Save your changes.

Explanation:

give 5 examples for software ​

Answers

Answer:

Adobe Photoshop.

Picasa.

VLC Media Player.

Windows Media Player.

Windows Movie Maker

What is the value of total returned by the call secret(3) ? int secret int num) { int total= 10; switch(num) { case 1: case 2: total=5. break case 3. total= 10: case 4: total=total+3: case 8: total=total+6. break default: total=total+ 4. break} return total; }​

Answers

Answer:

19

Explanation:

Without break; statements, the switch "falls through" to the next case. So the code is directed to case 3, which sets total to 10. Then another 3 gets added and another 6, because cases 4 and 8 are also executed. That brings the total to 19.

So, always use a compile rule or code checker that checks your code for missing breaks, because it is hardly ever what you want on purpose.

When it comes to different ways of storing data on the device in a cross-platform manner, what is convenient about both native iOS and Android platforms?

a. they both provide secure file i/o
b. they both provide key-value, file i/o and sqlite data storage
c. the both provide the exact same system calls, since both platforms rely on ARM processors
d. they both provide the exact same APIs, regardless of language used

Answers

A - both provide secure file i/o

explain the working system of a computer with an example ​

Answers

Answer:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

Hoped it helps you.

Answer:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

Explanation:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

what is web browser give answerwh
at is web browser

Answers

Answer:

A software application used to access information on the World Wide Web is called a Web Browser.

Explanation:

When a user requests some information, the web browser fetches the data from a web server and then displays the webpage on the user's screen.

how can information technology transform the way business processes in an organization

Answers

Answer:

1. Through cooperation.

2. Understanding the market and the organization.

Explanation:

Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.

An information Technologist can change the way business process if he or her understand the maker of the company and the company.

The major point is this:

1. The company must cooperate.

2. Everybody must accept change for it to grow higher.

3. Understand the market of the company and

4. understand the company and how they operate and then change and replace the parts that need replacement.

4. What is an Abacus?​

Answers

Explanation:

an abacus is a simple device for calculating, consisting of a frame with rows of wires or grooves along which beads are slid.

what's the function of a cyclebin​

Answers

Answer:

In Windows, the Recycle Bin is a folder or directory where deleted items are temporarily stored. Deleted files are not permanently removed from the hard drive but are sent instead to the Recycle Bin, unless they are too large.

Other Questions
What is the overall charge of thenucleus?A. positiveB. negativeC. neutral How do you think an artist can make a difference in peoples' lives? explain WILL MARK BRAINIEST IF FAST!Kane's Furniture Store advertised a table at a 11% discount. The original selling price was $111, and the sale price was $100. Was the sale price consistent with the ad? Explain.Select the correct choice below and, if necessary, fill in the answer box within your choice.O A. No, the sale price was s higher than it should have been(Round to the nearest cent.)OB. No, the sale price was $ lower than it should have been(Round to the nearest cent.)OC. Yes, the sale price was consistent with the ad, because it represents a 11% discount.vaVi(11)MoreClick to select and enter your answer(s) and then click Check Answer.Help Me Solve ThisView an ExampleGet More HelpClear AllCheck In Evan's math class, there are 7 boys and 10 girls. Which of the following is the ratio of boys to girls in Evan's math class? Find the unit rate.70 rooms on 5 floorsrooms per floor Vito avido is a sales representative for a company that sells roofing material. he receives a graduated commission of 5 percent on the first $5,000 of sales, 6.5 percent on the next $15,000, and a 7 percent on sales over $20,000. What is his commission on $23,458 in sales? Which set of ordered pairs represents a function? {(3,6), (3, 1), (9,0), (2, 2)} {(2,-5), (-3, 6), (-1, -8), (-3,-4)} {(4, -7), (-2, -1), (-7,4), (9, -1)} {(3,8), (-2,-9), (1,4), (1,9)} Please help ASAP!!!!!! What kind of artifact is the Blue Heron Decoy? Write 96% as a fraction. Which acid-base chemical reaction is irreversible?(1 point)weak acid added to waterstrong acid added to waterwater on its ownweak base added to water 1/9 x + 2/3 xy +y Four times the sum of two times X and six algebraic expression What is epidemiology? Instrucciones: Arrastra cada palabra a la oracion que le corresponde. ( Look at picture to answer the questions please). Will Mark Brainliest . The temperature reading that is halfway between 10 degrees and 40 degrees is ___ degrees.If the temperature was 3 degrees in the morning and 8 degrees in the afternoon, the change in temperature during that time is ____ degrees.If the temperature has been changing at a rate of 1.5 degrees each hour, and it is currently 5 degrees, the temperature 4 hours ago was ___ degrees.If the temperature continues to change at this rate of 1.5 per hour, and it is currently 5 degrees, the temperature in 4 hours will be ____ degrees. The length of a rectangle is 11cm more than the width. The perimeter is 90cm. Find the length and width of the rectangle. The graph represents a function.Which ordered pair can be plotted together with these four points, so that the resulting graph still represents a function?O (0,0) 0 (-3,1) 0 (1,3) O (31) Convert: 110 km/h to m/s What does Atticus say about Mrs.Dubose and courage at the end of chapter 11? And can you give me pieces of evidence to back that up