7.5 code practice python average award money

Answers

Answer 1

Answer:

Here's an example code in Python that calculates the average award money:

```

# Define a list of award money amounts

award_money = [1000, 2000, 500, 4000, 300]

# Calculate the total award money

total = sum(award_money)

# Calculate the number of award money amounts

count = len(award_money)

# Calculate the average award money

average = total / count

# Print the average award money

print("The average award money is $", average)

```

In this code, we first define a list of award money amounts. We then use the `sum()` function to calculate the total award money and the `len()` function to calculate the number of award money amounts. Finally, we calculate the average by dividing the total by the count, and print the result using the `print()` function.


Related Questions

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO

PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO

Answers

def even_checker(lst):

   for x in lst:

       if x%2==0:

           print(x)

l = [1,2,3,4,5,6,7,8,9,10]

even_checker(l)

I wrote my code in python 3.8. I hope this helps.

System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio

Answers

System testing is a crucial stage where the software design is implemented as a collection of program units.

What is Unit testing?

Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.

It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.

Read more about System testing here:

https://brainly.com/question/29511803

#SPJ1

What techniques overcome resistance and improve the credibility of a product? Check all that apply.
Including performance tests, polls, or awards
Listing names of satisfied users
Sending unwanted merchandise
Using a celebrity name without authorization

Answers

Answer: Including performance tests, polls, or awards.

Listing names of satisfied users

Explanation:

For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.

The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.

Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.

microcomputers suitable for personal computing work

Answers

There are several microcomputers suitable for personal computing work. Here are some popular options such as Desktop Computers, Laptop Computers and All-in-One Computers.

Desktop computers are traditional personal computers that offer high performance and flexibility. They typically consist of a tower or case that houses the main components, such as the processor, memory, storage, and expansion slots. Desktop computers can be customized to meet specific requirements and offer a wide range of software compatibility.

Laptops are portable microcomputers designed for personal use. They are compact and include a built-in screen, keyboard, touchpad or trackpad, and battery, allowing you to work on the go. Laptops are available in various sizes and specifications, ranging from lightweight ultrabooks to high-performance gaming laptops.

Learn more about computer on:

https://brainly.com/question/32297640

#SPJ1

Research is much concerned with proper fact finding, analysis and evaluation.” Do you agree with this statement? Give reasons in support of your answer.​

Answers

Answer:

Yes, I agree.

Explanation:

Research is basically trying to find out new ways of doing things or challenging an already established claim or theory, with the aim of disproving or improving on it.

So, research is much concerned with proper fact-finding, which would ensure that the results and samples are accurate, analysis and evaluation which would make sure that the new data gotten is properly investigated.

I agree that Research is much concerned with proper fact finding, analysis because research increases the stock of knowledge and requires different analysis and facts base on past research.

What is Research?

Research can be regarded as reactive and systematic work which is been carried out to bring about improvement in knowledge of the reseacher.

In research, findings needs to be done, it could requires experiments and field work, evaluation of the results is also needed to compare with past results of the past scholars.

Learn more about Research at:

https://brainly.com/question/968894

10+2 is 12 but it said 13 im very confused can u please help mee

Answers

Mathematically, 10+2 is 12. So your answer is correct. However, if you are trying to write a code that adds 10 + 2, you may need to troubleshoot the code to find where the bug is.

What is troubleshooting?

Troubleshooting is described as the process through which programmers detect problems that arise inside a specific system. It exists at a higher level than debugging since it applies to many more aspects of the system.

As previously stated, debugging is a subset of troubleshooting. While debugging focuses on small, local instances that can be identified and fixed in a single session, troubleshooting is a holistic process that considers all of the components in a system, including team processes, and how they interact with one another.

Learn more about Math operations:
https://brainly.com/question/199119
#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.

Answers

Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.

Writting the code:

Assume the variable s is a String

and index is an int

an if-else statement that assigns 100 to index

if the value of s would come between "mortgage" and "mortuary" in the dictionary

Otherwise, assign 0 to index

is

if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)

{

   index = 100;

}

else

{

   index = 0;

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to

A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain?

Security and risk management

Security architecture and engineering

Communication and network security

Asset security

Answers

The responsibilities of a  security professional described above belong to the security domain of option D: "Asset security."

What is the servers?

Asset safety focuses on identifying, classifying, and defending an organization's valuable assets, containing sensitive personally capable of being traced information (SPII) stored on guest servers.

This domain encompasses the secure management, storage, memory, and disposal of sensitive dossier, ensuring that appropriate controls are in place to safeguard the secrecy, integrity, and availability of property.

Learn more about servers  from

https://brainly.com/question/29490350

#SPJ1

A host automatically configured with an address from which of the following ranges indicates an inability to contact a DHCP server?
69.254.x.x with a mask of 255.255.0.0
169.255.x.x with a mask of 255.255.0.0
169.254.x.x with a mask of 255.255.255.0
169.254.0.x with a mask of 255.255.255.

Answers

The host that automatically configured with an address from which of the following ranges indicates an inability to contact a DHCP server is option B. 169.254.X.X with a mask of 255.255.0.0.

What does 255.255 0.0 for a subnet mask mean?

The range 169.254. 0.0-169.254. 255.255 has been set aside by the Internet Assigned Numbers Authority (IANA) for Automatic Private IP Addressing. Since routable addresses are guaranteed not to clash with it, APIPA offers an address.

Hence, Each octet in the IP address is distinguished by a 32-bit number. For instance, 255.255.0.0 is a typical Class B subnet mask because the first two bytes (network) and the last two bytes (zeros) are all ones. This is seen in Table 4.9. (host).

Learn more about DHCP server from

https://brainly.com/question/10097408
#SPJ1

An __________ hard drive is a hard disk drive just like the one inside your, where you can store any kind of file.

Answers

An external hard drive is a hard disk drive just like the one inside your computer, where you can store any kind of file.

These drives come in various sizes, ranging from small portable drives that can fit in your pocket to larger desktop-sized drives with higher storage capacities. They often offer greater storage capacity than what is available internally in laptops or desktop computers, making them useful for backups, archiving data, or expanding storage capacity.

Overall, external hard drives are a convenient and flexible solution for expanding storage capacity and ensuring the safety and accessibility of your files.

Current Tetra Shillings user accounts are management from the company's on-premises Active Directory. Tetra Shillings employees sign-in into the company network using their Active Directory username and password.

Answers

Employees log into the corporate network using their Active Directory login credentials, which are maintained by Tetra Shillings' on-premises Active Directory.

Which collection of Azure Active Directory features allows businesses to secure and manage any external user, including clients and partners?

Customers, partners, and other external users can all be secured and managed by enterprises using a set of tools called external identities. External Identities expands on B2B collaboration by giving you new options to communicate and collaborate with users outside of your company.

What are the three activities that Azure Active Directory Azure AD identity protection can be used for?

Three crucial duties are made possible for businesses by identity protection: Automate the identification and elimination of threats based on identity. Use the portal's data to research dangers.

To know more about network visit:-

https://brainly.com/question/14276789

#SPJ1

What is the amount of vertical space between the lines of text in a paragraph called?

Answers

The amount the vertical space between text lines in a paragraph is determined by line spacing.

What is line spacing?
Leading in typography is the distance between two lines of type; the precise definition varies. Leading in manual typesetting refers to the thin strips of lead (or aluminium) used in the composing stick between lines of type to enhance the vertical spacing between them. Leading is the term for the strip's thickness, which is equal to the gap between the type's size and the separation between adjacent baselines. For instance, the leading would be 2 points for a type size of 10 points and a distance of 12 points between baselines. The phrase is still used in contemporary page-layout programmes like Adobe InDesign, QuarkXPress, and the Affinity Suite. Line spacing, or more precisely interline spacing, is a term that is frequently used in word processing programmes targeted towards consumers.

To learn more about line spacing
https://brainly.com/question/4152818
#SPJ4

Which part of the Result block should you evaluate to determine the needs met rating for that result

Answers

To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.

What is the  Result block

The assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.

The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.

Learn more about Result block from

https://brainly.com/question/14510310

#SPJ1

What are vSphere Clusters and how are they utilized in vSphere?

Answers

A group of ESXi hosts set up as a vSphere cluster to share resources like processor, memory, network, and storage In vSphere environments, each cluster can hold up to 32 ESXi hosts, each of which can run up to 1024 virtual machines.

What is vSphere Clusters?

The Clusters page in the vSphere Infrastructure view lets you see how many more virtual machines (VMs) can be added to each cluster, how many resources are totaled up in each cluster, and how many resources are currently available in each cluster. It also lets you manage the resources of each host that is part of the cluster.

According to the spare cluster capacity, the page shows information about the number of additional VMs that can be added to each cluster, as well as information about the powered-on and running VMs, their CPU and memory utilization, and other information. By changing the settings for the spare VM basis on this page, you can change how the spare VM basis for an average VM is calculated.

The information on this page helps to address important subsystem-related questions like the following by giving a comprehensive picture of cluster memory usage and contention using Memory metrics:

Is my environment's vSphere memory management functioning properly?In my environment, is the vSphere page sharing mechanism being used effectively? What amount of memory is shared?How much memory can you overcommit?

Learn more about vSphere

https://brainly.com/question/28787607

#SPJ1

The reading element punctuation relates to the ability to

pause or stop while reading.

emphasize important words.

read quickly yet accurately.

understand word definitions.

Answers

Answer:

A

Explanation:

Punctations are a pause or halt in sentences. the first one is the answer so do not mind the explanation.

semi colons, colons, periods, exclamation points, and question Mark's halt the sentence

most commas act as a pause

Answer: (A) pause or stop while reading.

Explanation:

Dennis is looking at payroll data. He adds “2*” to the criteria field. Which values would stay in the records after the query is run?

20,535
12,252
28,645
22,897
32,785
15,222

Dennis is looking at payroll data. He adds 2* to the criteria field. Which values would stay in the records

Answers

Since Dennis is looking at payroll data. He adds “2*” to the criteria field. The  values that would stay in the records after the query is run  are options A, C and D:

20,53528,64522,897

How does a query run?

A series of instructions called a query can be used to manipulate data. To carry out these procedures, you run a query. A query can generate, copy, delete, or modify data in addition to producing results that can be sorted, aggregated, or filtered.

In the command editor, type the SQL command you want to execute. To run the command, press Ctrl+Enter and then click Run. Advice: To run a specific statement, pick it and click the Run button.

Since He enter the command 2, All figures that start with 2 will run. Hence the options selected are correct.

Learn more about query from

https://brainly.com/question/25694408
#SPJ1

Write a c++ to read seven days in an array and print it

Answers

Explanation:

Photosynthesis, the process by which green plants and certain other organisms transform light energy into chemical energy. During photosynthesis in green plants, light energy is captured and used to convert water, carbon dioxide, and minerals into oxygen and energy-rich organic compounds.

You can write a function to find Fibonacci numbers using recursion.

How do you find the next number?


add five to the previous number

add one to the previous number

multiply the two previous numbers

add the two previous numbers

Answers

Answer:

Add the two previous numbers

Explanation:

A recursive definition of the Fibonacci sequence would look like this, in python:

def fibonacci(n)

   if n <= 1:

       return n

   else:

       return(fibonacci(n-1) + fibonacci(n-2))

What is the influence of new technology on society?
Ο Α. .
New technology hardly has any impact on society.
OB.
New technology is only beneficial to society and cannot be detrimental.
OC.
New technology is detrimental, as it makes the existing technology obsolete.
OD. New technology normally utilizes a lot of resources and can adversely affect the economy.
O E.
New technology is beneficial but can also be usedly a detrimental way.

What is the influence of new technology on society? . .New technology hardly has any impact on society.OB.New

Answers

Answer:

E. New technology is beneficial but can also be used in a detrimental way.

Explanation:

New technology such as cryptocurrency (powered by blockchain technology) can be regarded as a welcome development that has benefited the society in so many good ways. However, cryptocurrency as a new technology also has disadvantages it presents to the society. One of such negative influence cryptocurrency has is that it can be used for illicit activities such as money laundering, funding terrorism and so on.

So, in summary, we can conclude that:

"New technology is beneficial but can also be used in a detrimental way."

Complete the code to check whether a string is between right and 11 characters long.

Complete the code to check whether a string is between right and 11 characters long.

Answers

Answer:

If LengthPW >11

message= "your password is long"

If LengthPW <8

message= "your password is short"

Explanation:

Hope it helps


You can go back to the previous or next location on the window using the
..... key
and ......

Answers

Alt key and pressing the left or right arrow

a video-streaming web site keeps count of the number of times each video has been played since it was first added to the site. the count is updated each time a video is played and is displayed next to each video to show its popularity. at one time, the count for the most popular video was about two million. sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. which of the following is the most likely explanation for the error? responses the count for the video became larger than the maximum value allowed by the data type used to store the count. the count for the video became larger than the maximum value allowed by the data type used to store the count. the mathematical operations used to calculate the count caused a rounding error to occur. the mathematical operations used to calculate the count caused a rounding error to occur. the software used to update the count failed when too many videos were played simultaneously by too many users.

Answers

a.) The video count exceeded the maximum value allowed by the data type used to store the count. This is the correct answer for the given scenario in the question.

What is the most like explanation for the error?

The most likely explanation for the error is that the count for the video exceeded the maximum value allowed by the data type used to store the count.

This is known as an integer overflow, where a variable that can only store a certain range of values, in this case the count, exceeds that range and instead wraps around to a negative value. This can occur when a program is not designed to handle large numbers or when there is a bug in the code that is responsible for updating the count.

It is important to note that integer overflow is a common issue in programming and can lead to unexpected behavior or even security vulnerabilities.

To learn more about integer overflow, visit: https://brainly.com/question/28436767

#SPJ4

Name three risks of developing a stragtic role for information systems in a business. Explain one risk in more detail..

Answers

One risks of developing strategic role for information systems is the possibility of overspending on IT projects which may not generate the desired returns on investment.

What is the risk of overspending on IT projects?

Today, businesses are engrossed with latest and greatest technological advancements which leas to overspending on IT projects that may not ultimately provide the intended value.

This risk can arise from a lack of understanding on how technology fits into business strategy or failure to properly assess the potential benefits and risks of new IT initiatives.

In an overall, the overspending on IT projects can lead to financial strain and can ultimately harm the business's ability to achieve its strategic goals.

Read more about strategic role

brainly.com/question/28332723

#SPJ1

Cuál es el objetivo principal de una clave primaria?

Answers

La clave principal le permite crear un identificador único para cada fila de su tabla. Es importante porque le ayuda a vincular su tabla a otras tablas (relaciones) utilizando la clave principal como vínculos.

How to protect data in transit Vs rest?

Answers

Implement robust network security controls to help protect data in transit. Network security solutions like firewalls and network access control will help secure the networks used to transmit data against malware attacks or intrusions.

If this helps Brainliest please :)

Write some keywords about touchscreen

Answers

\({\huge{\underline{\bold{\mathbb{\blue{ANSWER}}}}}}\)

______________________________________

\({\hookrightarrow{Keywords}}\)

touchscreentouch inputmulti-touchgesturesstylusresistivecapacitivehaptic feedbacktouch latencytouch accuracytouch sensitivitytouch screen technologytouch screen interfacetouch screen displaytouch screen monitortouch screen laptoptouch screen phone

Which of the following queries can have a fully Meets result?

Answers

Answer: we need the awnser key

Explanation:

Which topic would be included within the discipline of information systems

Answers

, , , , , are only a few of the subjects covered within the study area of information systems. Business functional areas like business productivity tools, application programming and implementation, e-commerce, digital media production, data mining, and decision support are just a few examples of how information management addresses practical and theoretical issues related to gathering and analyzing information.

Telecommunications technology is the subject of communication and networking. Information systems is a branch of computer science that integrates the fields of economics and computer science to investigate various business models and the accompanying algorithmic methods for developing IT systems.

Refer this link to know more- https://brainly.com/question/11768396

Which of the following actions is NON-DESTRUCTIVE? CHOOSE TWO.

Everything in the Layer > Adjustments menu
The Clone Stamp tool
Converting to Grayscale
Changing the Opacity of a layer
Everything in the Adjustments panel

Answers

The following actions are non-destructive:

Everything in the Layer > Adjustments menu.

These adjustments can be made to a single layer without affecting the underlying layers. This means that you can edit the adjustments or remove them entirely without altering the original image data.

Changing the Opacity of a layer

When you change the opacity of a layer, it simply reduces the visibility of that layer but the original image data is still retained.

The Clone Stamp tool, which is used to copy pixels from one area of an image to another, can be destructive because it overwrites the original pixels.

Converting to Grayscale also discards the color information, which is considered a destructive action.

Everything in the Adjustments panel is not a valid option because it includes both destructive and non-destructive adjustments.

Other Questions
suppose that one particle of the flow approaches a plate of a capacitor. explain what happens to the other plate of the capacitor? Landfills are a way to manage trash by burying the trash underground. modern landfills have a bottom layer of thick clay covered with a plastic liner. on top of the plastic liner, the landfill has pipes with holes that flow to collection tanks. if a landfill lacked the clay, plastic, and pipes, how would the environment most likely be affected?. use the formula for the sum of a geometric series to find the sum or state that the series diverges. (use symbolic notation and fractions where needed. enter dne if the series diverges.) (4^3 / 5^3) + (4^4 / 5^4) + (4^5 / 5^5) = ________-- do fungi live in warm environments what is the average energy needed to remove a nucleon from a nucleus? one environmental problem associated with groundwater is land subsidence caused by withdrawal. T/F Please help!! The characteristics of a living thing depend on the characteristics of its environment. which of these characteristics of a river could affect the plants loving in it? a) how deep the water is b) the temperature of the water c)the speed of the water flow Review the following scenarios and assign the correct codes as required, including modifiers and/or multipliers where indicated. Each question is worth 10 points.Dr. Hansen, an orthopedist, is seeing Andrew, a 72-year-old established male patient today who has complaints of severe knee pain in both knees and repeated falls over the past 2 months. Dr. Hansen completes a detailed history and exam, including X-rays of each knee which show worsening osteoarthritis. Because the patient has been experiencing repeated falls, Dr. Hansen provides the patient with an adjustable tripod cane with instructions for safe use. Dr. Hansen recommends the patient begin taking OTC glucosamine chondroitin sulfate, oxycodone for pain as needed, and schedules the patient for a follow-up appointment in one month.E&M code: _______ICD-10-CM code: _______ICD-10-CM code: _______CPT code: _______HCPCS code: _______Andrew returned for his follow-up visit last week with increased pain and edema in his right knee and was scheduled for an arthroscopy. He presents to the surgical center today for a right knee diagnostic arthroscopy with synovial biopsy. Anesthesia is being performed on this 72-year-old male patient by a CRNA with medical supervision by a physician. Other than osteoarthritis, Andrew has essential hypertension, which is well-controlled. Postoperatively the patient was placed in a prefabricated canvas longitudinal knee immobilizer.CPT code: _______Anesthesia code: _______Concurrent care modifier: _______Physical status modifier: _______HCPCS code: _______The physician evaluates a 68-year-old new patient who was admitted to Observation status earlier today. According to the family, the patient complained about headaches and blurred vision last week and then became confused and disoriented two days ago. The physician performed a comprehensive history and exam, at which time he noted decreased response to light in one eye and BP of 220/100, but the family denied any previously known or treated hypertension. Suspicious for increased intracranial pressure, medical decision making is listed as high complexity. The patient had a CAT scan of the brain without contrast which was positive for brain lesions. An A-scan bilateral ophthalmology biometry was then performed, and patient was sent to the radiology department for simple therapeutic radiology treatment planning.E&M code: _______CPT code: _______CPT code: _______CPT code: _______ICD-10-CM code: _______ fombell, incorporated has the following assets in its trial balance: cash $9,000 equipment 64,000 accounts receivable 5,000 copyright 5,000 inventory 16,000 patent 15,000 building 130,000 what is the total balance of its property, plant, and equipment? Which switching technology would allow each access layer switch link to be aggregated to provide more bandwidth between each Layer 2 switch and the Layer 3 switch?- HSRP- PortFast- trunking- EtherChannel What does Oedipus propose as a punishment for the murder? what happens to the position and strength of the oceanic semi-permanent high pressure centers in the northern hemisphere, from january to july? what happens to the position and strength of the oceanic semi-permanent high pressure centers in the northern hemisphere, from january to july? they weaken and move west. they strengthen and move east. they weaken and move east. they strengthen and move west. Which of the following are characteristics of good information?A) Worth its cost, timely, relevant, all encompassingB) Timely, expensive but complete, relevantC) Relevant, not many important errors, worth its costD) Timely, expensive but complete, accurateE) Timely, relevant, worth its cost, barely sufficient, accurate The Arab Union Company is studying a new 5-year project. This project requires initial fixed assets of 4 million riyals. Fixed assets will be depreciated using the straight-line method to reach zero at the end of the four-year period, at which point these assets will be worthless. The annual sales of this project are also estimated at 2,000,000 units annually Selling the unit is 2 riyals, and the variable cost of the unit is 1 riyal, and the fixed cost without property is $100,000. If the tax rate is 30%, what is the operating cash flow for the project? And if the project requires an initial investment in net working capital of $500,000 and the market value of the fixed assets will be $400,000 at the end of the project. What is the net present value of the project if the discount rate is 8% and is it acceptable or not (5 degree) Use a double-angle identity to find the exact value of each expression. sin 60 The procedures that an emergency medical responder can and must legally provide as care for a patient are called? The system that functions in tying together emotions, motivation and memory is thereticular activating system.hypothalamic system.circadian system.limbic system.apneustic system Sterm cell research could lead to medical cures stem cell research probably would not benefit your patient meets the criteria for atropine 0.5mg. it comes in 1mg/10ml concentration, how many ml's would you give your patient In determining whether limited use of copyrighted material may be permitted as "fair use," courts will consider: