an access tool that walks you step by step through the creation of a report and that gives you more flexibility in the design, layout, and number of fields in a report.

Answers

Answer 1

We can use a program to help you create complex reports called the Report Wizard. When a report has been generated, whether using the Report Wizard or the Report command.

The name given to objects and controls that are built using data found in tables. bound management. A control that gets its information from a query or underlying table; a text box control is an illustration of a bound control.

Access automatically constructs a primary key for you, gives it the field name ID, and the AutoNumber data type when you create a new table in Datasheet view. The primary key can be modified, removed, or set for a table that doesn't currently have one in Design view.

Learn more about Control here-

https://brainly.com/question/14782348

#SPJ4


Related Questions

An organizational ______ is someone whose accomplishments embody the values of the organization and whose accomplishments are put forth to motivate other employees to do the right thing.

Answers

An organizational hero is someone whose accomplishments embody the values of the organization and whose accomplishments are put forth to motivate other employees to do the right thing.

An organizational (hero) is a person whose achievements uphold the organization's principles and whose achievements are used to inspire other staff members to act morally. The concept of "organizational structure" describes how employees are arranged within a company and who they answer to. The classification of individuals by function is a common practice. Production, marketing, human resources, and accounting are a few typical organizational functions. Four distinct organizational culture types are identified by the Cameron and Quinn Competing Values Culture Model. They identify four cultures: market, ad hoc, clan, and hierarchical.

Learn more about organizational here-

https://brainly.com/question/28503044

#SPJ4

Which tool is used if a client has asked for the mountain in the left side of the photo to be on the right side instead?

Question 15 options:

bucket fill


flip


airbrush


eraser

Answers

Answer:3

Explanation:

a technician is installing a soho router at an after-school community center. the customer would like to keep children from accessing inappropriate content while browsing the web.

Answers

Small office/home office (SOHO) routers are basic network devices for millions of consumers. These are often the single ingress and egress point of the SOHO network, managing domain name resolution, firewall protection, dynamic addressing, wireless connectivity, and of course routing.

It consists of multiple LANs with backbone infrastructure connections. This is a large network, such as those used by businesses and schools, with hundreds or thousands of hosts interconnected. It is a collection of interconnected private and public networks. Each layer of the OSI model depends on the layer below it to function. If the lower level has a problem, the higher level cannot function or communicate. For example, HTTP is a common Layer 7 (application layer) protocol. Encryption is the ability of a device to convert information into encrypted text to prevent unauthorized access. Essentially, when your device is locked, your data is encrypted so only users with the proper access can access it.

Learn more about Encrypted here-

https://brainly.com/question/14635177

#SPJ4

Please answer:
(Explanation is greatly appreciated).

Answers

The c program for the given problem is as follows:

#include <stdio.h>

#include <stdlib.h>

#include <math.h>

int main(){

int a = -2; int b = 3; int c = 5;

double root1; double root2;

root1 = (-b - sqrt(b*b - 4*a*c))/(2*a); root2 = (-b + sqrt(b*b - 4*a*c))/(2*a);

printf("Root 1: %lf\n", root1);

printf("Root 2: %lf", root2);

return 0;

}

How the c program for this situation is built?

The first step in building the program is inserting the libraries, which are:

#include <stdio.h> (standard for every program)#include <stdlib.h> (standard for every program).#include <math.h> (necessary due to the square root function).

Then the coefficients of the formula can be declared with their values, as follows:

int a = -2; int b = 3; int c = 5;

The variables that will store the roots have to be declared, as follows:

double root1; double root2;

Then we apply the formula to calculate the roots, as follows:

root1 = (-b - sqrt(b*b - 4*a*c))/(2*a); root2 = (-b + sqrt(b*b - 4*a*c))/(2*a);

Then the roots are printed, as follows:

printf("Root 1: %lf\n", root1);

printf("Root 2: %lf", root2);

The \n clause inside the print guarantees that a new line is generated to print the second root.

Finally, the program is closed, as follows:

return 0;

}

A similar problem, also involving a c program, is given at https://brainly.com/question/15683939

#SPJ1

write a program whose inputs are three integers, and whose output is the largest of the three integers, followed by a count of the number of times that largest integer appears. ex: if the input is 7 15 3, the output is: 15

Answers

In this exercise we have to use the knowledge of computational language in C++ to write a code that program whose inputs are three integers, and whose output is the largest of the three integers, followed by a count of the number of times that largest integer appears.  

Writting the code:

#include <iostream>

#include <algorithm>

using namespace std;

int main()

{

   //declaring 3 int variables to store 3 numbers

   int num1, num2, num3 ;

   //taking input from the user

   cin >> num1 >> num2 >> num3 ;

   

   //finding the max of the 3 numbers

   int largest = max(max(num1, num2), num3) ;

   int count = 0 ;

   //finding the count of max number

   if(largest == num1)

       count += 1 ;

   if(largest == num2)

       count += 1 ;

   if(largest == num3)

       count += 1 ;

   //displaying the output

   cout << largest << endl ;

   cout << count << endl ;

   

   return 0 ;

}

See more about C++ at brainly.com/question/12975450

#SPJ1

you are working at the command line and want to add the read-only attribute to a file and remove the hidden attribute. which command would you use?

Answers

To add the Read-only attribute and remove the Hidden attribute, use attrib +r -h. To remove the write protection on the chosen drive, enter "attributes disk clean read only" and hit "Enter".

At the Command prompt, enter the command attribute -r +s "drive :path folder name" (be sure to include the drive letter, entire path, and folder name). By using this command, the file's read-only attribute will be removed and replaced with a system attribute. Restart the computer and click the F5 key when you see the message "Starting MS-DOS" or the MS-DOS version if the computer is unable to load MS-DOS. The MS-DOS default settings should be loaded by pressing this key.

Learn more about command here-

https://brainly.com/question/14583083

#SPJ4

Cloud computing only allows you to access files on your local computer.

Answers

Answer:

Explanation:

You can store all types of information in the cloud, including files and email. This means you can access these things from any computer or mobile device with an Internet connection, not just your home computer.

Answer:

False

Explanation:

suppose we use a hash function hto hash n distinct keys into an array t of length m. assuming simple uniform hashing, what is the expected number of collisions?

Answers

Each key is assigned an integer in the range [0, N-1] by a hash function, where N is the size of the bucket array for the hash table.

The key concept is to index into our bucket array, A, using the hash value, h(k), rather than the key k. (which is most likely inappropriate for use as a bucket array index). Although an array can be used to build hash tables, it uses numbers to index its items. However, we could wish to utilize dictionaries if we want to store data and use keys other than integers, like "string." Hash tables are used to implement dictionaries in Python.

Learn more about Hash here-

https://brainly.com/question/13106914

#SPJ4

carter is the web designer for an open source project. he has created a program that facilitates the easy collection of data for a large-scale logistics firm. the source code for carter's program is .

Answers

The source code for carter's program It is available to the public.

What is source code?
Any collection of code written in a sentient programming language, typically as plain text, either with or without comments, is referred to in computing as source code, and simply code. The source code of a software is specifically created to make the job of computer programmers easier. These programmers typically outline the tasks that a computer is to carry out by writing source code. An assembler or compiler frequently converts the source code into basic machine code so that it may be run by the computer. The machine code then is accessible for later execution. The majority of application software is supplied as executable-only files. A user, programmer, or system administrator might benefit from having access to the source code if they wanted to research or alter the software.

To learn more about source code
https://brainly.com/question/4593389
#SPJ4

what is a programming convention? a rule that must be followed to have a valid program. a comment included above a method or class. an element included in comments used to generate online documentation. a guideline about program style that makes code easier to read.

Answers

Coding conventions are a set of guidelines for programming style, processes, and techniques for each component of a program written in that language. These standards frequently involve file structure, indentation, comments, declarations, statements, white space, naming conventions, programming techniques, programming concepts, programming rules of thumb, architectural best practices, and so on.

What are the benefits of coding conventions?

The key reasons for using the coding scheme are as follows:

The use of the same coding patterns makes it straightforward for other employees to understand. Without having to read each sentence, it is easier to understand the code after a year or five years.In a large project, you always know where specific classes and files reside.

These are software structural quality requirements. These guidelines should be followed by software developers to improve the readability of their source code and make software maintenance easier. Coding standards only apply to the human maintainers and peer reviewers of a software project.

learn more about programming convention here :

brainly.com/question/28235560

#SPJ4

match the tools to the appropriate benefit of computer skills

Answers

Answer:

i hope this helped A LOTTTTTTT

Explanation:

match the ljufhgsde and the saw together you'll see the answer

i have implemented the queue with a linked list, keeping track of a front pointer and a rear pointer. which of these pointers will change during an insertion into a nonempty queue?

Answers

Only the rear pointers will change during an insertion into a non-empty queue if the queue is implemented using a linked list, keeping track of a front pointer.

Both values have changed because the queue has begun. If new nodes are added to the linked list's beginning during a push operation, nodes must be removed from the end during a pop operation. If additional nodes are added at the end of a push action, they must be removed at the beginning of a pop operation. Although arrays don't need space for pointers and can be accessed randomly, they are inefficient for memory allocation and insertion/deletion operations. Linked lists, on the other hand, are dynamic and have less temporal complexity for insertion and deletion.

Learn more about Queue here-

https://brainly.com/question/24108531

#SPJ4

natasha, a network security administrator for an online travel portal, noticed that her website was the victim of an sql injection. she decided to study the sql queries to find which one made this vulnerability in the database, and she noticed the following sql code piece executed on the database: 'whatever' and email is null; what has been accessed by the attacker running this sql injection?

Answers

The information which has been accessed by the attacker running this SQL injection is that: The attacker has determined the names of different types of fields in the database.

What is SQL injection?

In Cybersecurity, SQL injection can be defined as code injection technique which is typically used by an attacker to exploit any web security vulnerability in a database especially by interfering with the queries that are being sent through a software application to the database.

What is a database?

A database can be defined as an organized and structured collection of data that're stored on a computer system as a backup and they're usually accessed electronically.

In this context, we can reasonably infer and logically deduce that this attacker was able to access the names of different types of fields which are stored in the online travel portal's database.

Read more on SQL injection here: https://brainly.com/question/25823241

#SPJ1

Complete Question:

Natasha, a network security administrator for an online travel portal, noticed that her website was the victim of an SQL injection. She decided to study the SQL queries to find which one made this vulnerability in the database, and she noticed the following SQL code piece executed on the database: 'whatever' AND email IS NULL;

What has been accessed by the attacker running this SQL injection?

The attacker accessed the data of specific users.

The attacker accessed the entirety of email address data from all users in the database.

The attacker has used the SQL injection to delete the table in the database.

The attacker has determined the names of different types of fields in the database.

you are configuring a new system, and you want to use a raid 0 array for the operating system using sata disks and a special controller card that includes a raid processor. which raid method should you use?

Answers

Performance improvements are the key benefit of disk striping and RAID 0. For instance, three hard drives would offer three times the bandwidth of a single drive if data were striped over them.

Disk striping would enable up to 600 IOPS for data reads and writes if each drive operated at a rate of 200 input/output operations per second (IOPS). Disk striping is similarly used in RAID 5, however this version offers fault tolerance for a single disk failure. Disk striping divides data into smaller units and saves the units across a number of drives by simultaneously reading from and writing to each disk. Disk striping is used in RAID 0 but there is no fault tolerance. Hard disk drive (HDD) minimums and maximums for RAID 5 groups are both three.

Learn more about disk striping here-

https://brainly.com/question/14018617

#SPJ4

integers are read from input and stored into a vector until -1 is read. output the negative elements in the vector in reverse order. end each number with a newline. ex: if the input is 10 -12 -3 3 -1, the output is: -3 -12 note: negative numbers are less than 0.

Answers

Using knowledge in computational language in C++ it is possible to write a code that integers are read from input and stored into a vector until -1 is read output the negative elements in the vector in reverse order.

Writting the code:

#include <iostream>

#include<vector>

using namespace std;

int main()

{

   int i;

   vector<int> integerVector;

   int value;

   

   cin>>value;

   while(value!=-1)

   {

       integerVector.push_back(value);

       cin>>value;

   }

   for (int i = integerVector.size(); i >=0; i--)

   {

       if(integerVector[i]<0)

             cout<<integerVector[i]<<endl;

   }

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

according to the federal geographic data committee, metadata for gis data should ideally include all of the following, except: a. financial information. b. spatial reference information. c. time period information. d. contact information.

Answers

Tomlinson has consequently earned the title of "father of GIS," especially for his use of overlays to further the spatial analysis of convergent geographic data.

In Canada, CGIS continued throughout the 1990s and helped create a sizable digitized land resource database. Five essential elements must be integrated for a GIS to function: hardware, software, data, people, and techniques. A GIS runs on hardware, which is the computer. GIS software is currently supported by a variety of hardware platforms, including standalone and networked desktop computers as well as centralized computer servers. The precise location of objects can be determined using global positioning systems, or GPS. GIS, or geographic information systems, are used to store data on maps. In managing land in the high hills, GPS and GIS are both helpful.

Learn more about hardware here-

https://brainly.com/question/15232088

#SPJ4

Why is jake not able to see the red jaguar? they are cleanig it for the day repairs are being done it is no longer in the pyramid it is to dark in the pyramid

Answers

Jake is not able to see the red jaguar because it is no longer in the pyramid.

What is Jaguar?

Jaguar is a luxury vehicle brand owned by Jaguar Land Rover, a British multinational automobile company headquartered in Whitley, Coventry, England. Jaguar Cars was the firm in charge of Jaguar car manufacture until its operations were entirely integrated with those of Land Rover to form Jaguar Land Rover on January 1, 2013. Jaguar began as the Swallow Sidecar Company in 1922, producing motorcycle sidecars before creating passenger car bodywork. Under the management of S. S. Automobiles Limited, the firm expanded to include full cars produced in collaboration with Standard Motor Co, many of which had the Jaguar model name.

To learn more about Jaguar

https://brainly.com/question/1671953

#SPJ4

Answer:

c. it is no longer in the pyramid

Explanation:

edge 2023

write and execute a command that uses an absolute path and that is successful in creating the animals2 directory in your home directory when the current working directory is your home directory. be sure to use an absolute path.

Answers

The cd command can be used to switch directories. Using this command alone will always take us back to our home directory; using a pathname to access any other directory is necessary.

Using the read link command, we may get a file's complete path. In addition to printing the absolute path for a relative path, read link also prints the absolute path for a symbolic link. Read link converts the relative path foo/ in the first command to the absolute path /home/example/foo. The File class includes the get Absolute Path() function. The absolute pathname of the specified file object is returned by this function. If the file object's pathname is absolute, it simply returns the path to the currently selected file object.

Learn more about Absolute here-

https://brainly.com/question/1301718

#SPJ4

Which of the following is considered a variable?
(1 point)
O size
O collisions
O particles
O lights

Answers

Answer:

the following that is considered that is a variableis c particles

Explanation:

definition of Bystander

Answers

Answer:

According to the Oxford Dictionary a bystander is-
a person who is present at an event or incident but does not take part.

Explanation:

Basically someone who is there but does not play a role in anything that happens.

The main reason many users have access to outlook their email communications and their?

Answers

Answer:

Question: The basic PowerPoint template has a simple presentation format with two text boxes, title and ____

Answer: slide show

Explanation: this is the most logical answers because after all those steps in the presentation this is the next one

Question: The main reason many users have access to Outlook is to manage their e-mail communications and their

Answer: calendering

Explantion: this is used for messsaging and contacts and you also use it for to put important stuff on your calender

Pls Mask As Brainliest

While Outlook is a dependable and potent email management system as well, many people have access to it for their electronic communications along with associated functions.

What is the outlook?

Anyone can compose and send emails, manage your calendar, save the names and contact information of the people you know, and keep on top of your projects using Outlook. Even if you utilise Outlook on a daily basis, you could still be aware of the many wonderful things it can do to boost your productivity.

Users may put all of their correspondence, contacts, assignments, and schedule contents in one spot and manage them from there. Additionally, Outlook offers users a wide range of useful features like message rules, signals, and sophisticated search options. It is a popular option for business customers because it is also extremely secure.

Learn more about outlook, here:

https://brainly.com/question/12471852

#SPJ2

Write a program that asks the user to enter 2 words, then prints "Equal!" if the two words are the same (case-sensitive), "Different case" if the two words are the same (case-insensitive), “Close enough” if the two words are the same length and all but the last letter matches, and "Try again" otherwise.

Answers

#include <bits/stdc++.h>

typedef std::string s;

s fi(s t, s m) {

   if(t==m) return "Equal!";

   if(strcasecmp(t.c_str(),m.c_str())==0) return "Different case!";

   if(t.size()==m.size() && t.back()!=m.back()) {

       for(int i=0;i<t.size()-1;i++) {

           if(t.c_str()[i]==m.c_str()[i]) ;

           else goto x;

       }

       return "Close enough!";

   }

   x: return "Try again!";

}

int main(int argc, char* argv[]) {

   s idx,idy;

   std::cin>>idx>>idy;

   if(idx.size()!=idy.size()) std::cout << "Try again!\n";

   else std::cout << fi(idx,idy) << std::endl;

   return 0;

}

Answer:

   Scanner scan = new Scanner(System.in);

   System.out.println("Enter 2 strings:");

   String word1 = scan.nextLine();

   String word2 = scan.nextLine();

   //equal strings

   if (word1.equals(word2))

   {

     System.out.println("Equal!");

   }

   //same word, different case

   else if (word1.toLowerCase().equals(word2.toLowerCase()))

   {

     System.out.println("Different case");

   }

   //same up to the last letter

   else if (word1.substring(0, word1.length()-1).equals(word2.substring(0, word2.length()-1)))

   {

     System.out.println("Close enough");

   }

   //no equivalency

   else

   {

     System.out.println("Try again");

   }

Explanation:

got 100% on the assignment so the code is correct

first scenario: both strings are equal, including the casing

second scenario: by setting both strings to lowercase if their cases don't match, they can be interpreted as having the same value by those standards in order to print out the statement

third scenario: .length() - 1 equates to the last letter of a string, so starting the range at 0 and ending at that will be read as the first letter to the letter before the last letter

fourth scenario: the strings do not fit into anything previously evaluated

and are students at berkeley college. they share an apartment that is owned by . is considering subscribing to an internet provider that has the following packages​ available: package per month a. internet access $45 b. phone services 15 c. internet access phone services 50

Answers

They share an apartment that is owned by Brett. Brett is considering subscribing to an Internet provider that has the following packages available.

1. Evan Brett

Stand-alone $67.50 $22.50

Incremental (Brett primary)$65.00 $25.00

Incremental (Evan primary) $75.00 $15.00

Shapley value $70.00 $20.00

2.The Shapley value approach is recommended.

Evan Brett

Stand-alone $67.50 $22.50

Incremental (Brett primary)$65.00 $25.00

Incremental (Evan primary) $75.00 $15.00

Shapley value $70.00 $20.00

a. Stand-alone cost allocation method.

Evan: $75/$75 + $25×$90

=3/4 ×90

=67.50

Brett: $25/$75 + $25 ×$90

=1/4×$90 = $22.50

b. Incremental cost allocation method.

Let assume that Brett (the owner) is the primary user while Evan is the incremental user:

User Costs Allocated Cumulative Costs

Allocated

Brett $25 $25

Evan 65($90 – $25) $90

Total $90

This method may lead to some dispute over the ranking because Evan pays only$65 despite his prime interest in the more expensive Internet access package while Brett could argue that if Evan were ranked first he would have to pay $75 due to the fact he is the main Internet user. Which means Brett would only have to pay $15.

Assume Evan is the primary user and Brett is the incremental user:

User Costs Allocated Cumulative Costs

Allocated

Brett $25 $25

Evan 65($90 – $25) $90

Total $90

c. Shapley value (average over costs allocated as the primary and incremental user).

User CostsAllocated

Evan ($65 + $75) ÷2 = $70

Brett ($25 + $15) ÷2 = $20

Learn more about internet:

https://brainly.com/question/1364683

#SPJ4

Designing a website for a new nonprofit organization is an example of

Answers

Answer:

A well-designed website can serve as the hub of your nonprofit's online presence, helping you educate new supporters, market programming and events, and pull in donations. For some nonprofits, however, creating a top-notch website design can feel impossible, especially if your team is new to using web design tools and tips.

If you've found yourself in a web design rut, you're in the right place. One of the best ways to kickstart your own design journey is to get inspired by other high-quality design work. By taking a look at other engaging and easy-to-use websites, you can see what's possible for your own website design and learn how to balance quality content with captivating aesthetics.

In this article, we'll showcase 30+ of the best nonprofit websites on the internet today, and then set you up to dig into creating your own with a few design tips. Specifically, we'll cover:

paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. she formats best practice tips in green, and she formats warning information in red. which employees might struggle with this formatting?

Answers

Some employees might struggle with this formatting if they are colorblind.

What is employees?
A person engaged by such an employer to perform a specific task is known as an employee. Employers are in control of determining an employee's wage, hours worked, and working conditions. In exchange, employees have benefits that contractors do not. To complete a specific task, an employer may hire a particular sort of worker. Contrary to contractors, who enjoy greater independence than employees, an employer has control over what an employee accomplishes and how it will be carried out. Following a selection as an employee following an application and interview procedure, the employee is hired by the business. The candidate is chosen once the company determines that they are the most qualified candidate for the position for which they are employing.

To learn more about employees
https://brainly.com/question/27953070
#SPJ4

whats the difference between patents and copyright

Answers

Answer:

A copyright protects original works, such as art, literature, or other created work. A trademark protects names, short slogans, or logos. A patent protects new inventions, processes, and compositions of matter (such as medicines).

Explanation:

what is the name of a protocol that lets users share files over a network? 1 point apache dns cups nfs 2. question 2 which two of these methods could you use to set up printing in an organization?

Answers

A server-client protocol called Network File System (NFS) is used to share files across computers connected to the same network.

Transmission Control Protocol/Internet Protocol (TCP/IP) connections can be used to send files between computers using the FTP (File Transfer Protocol) network protocol. Network protocols can be divided into three categories. These include protocols for network management, network communication, and network security: Basic data communication technologies like TCP/IP and HTTP are examples of communication protocols. On a computer network, the File Move Protocol (FTP) is a common communication protocol used to transfer data from a server to a client. An application-layer protocol called Hypertext Transfer Protocol (HTTP) is used to send hypermedia documents like HTML.

Learn more about Protocol here-

https://brainly.com/question/28446917

#SPJ4

You have decided to edit your photos using the RAW file. What are some benefits of working with the RAW format? Select all that apply.

RAW files are processed, making it easier to edit
The images are already optimized
More color options when editing
More control over adjusting the White Balance

Answers

Since you have decided to edit your photos using the RAW file, the  benefits of working with the RAW format is option d: More control over adjusting the White Balance.

What are the benefits of using RAW?

One of the biggest advantages of RAW is the ability to restore shadows and highlights during post-processing without adding the granular noise typically associated with high ISO settings. If you have significantly overexposed or underexposed, RAWs are fairly forgiving.

Therefore, it has Better detail and dynamic range as you can capture more detail and a wider dynamic range from your camera sensor because to RAW's vastly increased image information.

Learn more about RAW format from

https://brainly.com/question/27977505
#SPJ1

Growth mindset is the idea that you can do something. By simply adding the word yet to a sentence, you can change your thoughts from a fixed mindset to a growth mindset. For example, "I can’t manage my time well" vs "I can’t manage my time well, yet. " After reviewing this week’s resources on the growth vs. Fixed mindset, we now understand how our thinking can influence the successes we achieve and how we overcome and view previous challenges

Answers

       Growth mentality: People who have a growth mindset think that even their most fundamental skills can be improved with commitment and effort; talent and intelligence are merely the starting point. This point of thinking fosters the resilience and passion of learning needed for outstanding success. (Dweck, 2015)

What a development mindset is and why it's critical to cultivate one.

       A growth mindset emphasizes the effort and hard work that lead to achievement while accepting (and even celebrating) challenges. Children that have a development mentality think they can learn anything and are adept at using the word YET.

       People that adopt a growth mentality might say things like: I still gain knowledge even when I fail. Criticism is a tool that improves me. There's always room for improvement. I can do anything with persistence and determination.

      "A growth mindset is the belief that one's abilities and intelligence may be enhanced through hard work and perseverance. They persevere in the face of challenges, take advice from criticism, and look for motivation in others' achievements."

To Learn more About Growth mentality, Refer:

https://brainly.com/question/24312405

#SPJ4

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which is initially in the top left square facing downwards.
Create a solution that would enable the robot to be in the position found below. Make sure to use CAN_MOVE () to receive credit.

Answers

Using knowledge in computational language in python it is possible to write a code that Create a solution that would enable the robot to be in the position found below.

Writting the code:

import random

lis=[]

for i in range(0,10):

 num=random.randint(1,12)

 lis.append(num)

tot=sum(lis)

avg=tot/10

print(avg)

See more about python at brainly.com/question/18502436

#SPJ1

Other Questions
Vice-admiralty courts were established in order to pass the Revenue Act of 1774. Why could these courts be seen as being unfair?A. The courts always ruled in favor of the colonistsB. The judges were always corruptC. There was no juryD. The judges were never colonists This is a Statistics question. Please Help Select the pair that could be a reasonable approximation for the diameter andcircumference of a circle.5 meters and 22 meters19 inches and 60 inches33 centimeters and 80 centimetersExplain your reasoning.Your answer Mark is late. Do you think he ............. about the dinner? In what year did the Canadian economy turn around after the War? Why? assuming you have used your browser to open an html file linked to a javascript file containing an array called smoothieflavors, which command should you enter in your browser console to return the third element in that array? it appears that the medial temporal lobes and the diencephalon are important in consolidating explicit long-term memories but are not themselves the storage sites for this knowledge because What was William the Conqueror's contribution to English law?A. He began to dismantle the feudal system that had governed England.B. He introduced Christianity to the island.C. He reformed the monarchy to require parliamentary approval for taxes.D. He imposed a system of common laws where previously local lords had ruled personally. The area of a large plantation is eleven and seven hundredths kilometers. The length of the plantation is one tenth kilometers. How many kilometers is the width of the plantations? 20 pts!!! For the following questions, create a Punnett square. Be sure to show the genotypes, phenotypes, and percentages for each cross.In peas, side flowers are dominant over end flowers. Cross a homozygous recessive plant with a heterozygous plant. (4 pts) Genotype: Phenotype help help help help help help help The principle of ________ states that organisms succeed one another in a definite, determinable order that can be used to recognize a specific time period. Please Answer FastWrite down the next two terms in these quadratic sequences: 9, 13, 19, 27, ___, ___ -5, 0, 9, 22, ___, ___ Burning fossil fuels releases which of the following into the atmosphere?Responses(A.) oxygen(B.) carbon dioxide(C.) carbon(D.) heat 56Z1234.757y13 1614 159 121110xwWhat is mZ2?What is m1? 1. Mr. Williams is arrested for cloning parakeets in 1995 for violatinglaw passed by Congress in 1998.YES/NOArticle 1, Section_Paragraph_________ Need some help with steps please. Its Systems of equations and inequality's Linear Inequality's make a list of narrators and subject of mini sagas Please help me its due today!!!! When we move up or down a given demand curve_______a. only price is held constant.b. income and the price of the good are held constant.c. all nonprice determinants of demand are assumed to be constant.d. all determinants of quantity demanded are held constant.