The sales of last 6 months are stored in a list,
as follows
list1 = (12500, 35000, 12000, 40000, 55000,
60000]
How can you calculate the average sales?​

Answers

Answer 1

list1 = [12500, 35000, 12000, 40000, 55000,60000]

print(sum(list1)/len(list1))

We take the sum of all the elements in the list and divide the sum by the quantity of the elements. You can put however many elements in this list and you'll always get the average using the algorithm above.


Related Questions

HELP ME ASAP
Fred is using an enterprise system to create a database solution for his office. What would be the advantage of using an enterprise system?

Enterprise systems are single processor systems that do not take up many resources. However, they can be pipelined over multiple processors to lesson the computation time. Enterprise solutions provide a single database to simplify operation. These systems are faster and provide data redundancy.

Answers

Answer:

Enterprise solutions provide a single database to simplify operation

Explanation:

The interprets the data while it is in RAM​

Answers

Answer:

The input interprets the data while it is in RAM.

Explanation:

Advantages of Linux include_____.
(Multiple choice)(photo attached)

-cost
-the ability to tweak the application
-ease of use
-security
-a time table for customer support

Answers

Answer:

The ability to tweak an application, and i think security. I've barely scratched the surface of linux so my answer may not be 100% accurate

Explanation:

what messages do we get about ourselves from rap and hip hop

Answers

The lyrics let us know that we have reached a very low point in the music industry

you need to listen to some YEEEE YEEEEE music

PLEASE HELP Due Today

Match the term with one of its characteristics.

1. Automation software that enables servers to be provisioned automatically or with a few clicks of a mouse.

2. Log managers read your system logs and look for patterns and make reports.

3. Created an elastic infrastructure that expanded and contracted as demand changed.

cloud

maintain security

data center​

Answers

The matchup are:

1. Created an elastic infrastructure that expanded and contracted as demand changed -cloud2. Log managers read your system logs and look for patterns and make reports.- Maintain security 3. Automation software that enables servers to be provisioned automatically or with a few clicks of a mouse-data center​

What is the software  about?

The  Cloud computing is one that gives a form of elastic infrastructure that gives room for on-demand allocation as well as deallocation of resources.

Lastly  Log managers are known to be computer tools that tends to read system logs as well as look for patterns in the data to see security threats.

Learn more about software   from

https://brainly.com/question/28224061

#SPJ1


1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
awareness? What are these changes that are neglected in the bigger perspective?

Answers

Answer:

helthcare systems, aviation, entertainment, retail, etc

Explanation:

ICT has made life easy, it has made an interconection accross the world. in the helthcare system, ICT has created a positive impact because now a days body check up is been made through computers.

in the aviation, we use computers to control the the traffic of airplanes.

Why do digital media professionals create portfolios of their work?

Answers

Answer:

Then you're going to have to create a digital media portfolio in order to showcase your technical skills and knowledge. It can act as your online resume. You can use it to showcase your related work and projects to potential employers and clients online.

Explanation:

Style guides advise writers on which issues? Check all that apply.

applying consistent standards
citing sources
formatting text
performing research
using correct definitions

Answers

Answer:

A. applying consistent standards

B. citing sources

C. formatting text

Explanation:

A style guide can be defined as a set of standards that typically guides writers or authors in writing and the design of documents such as memo, novels, books etc, for a particular organization, specific publications or general use by the public such as students, academic scholars or institutions, government, careers, businesses etc.

Basically, a style guide avails the writers or authors with the sets of standards so as to ensure uniformity in formatting techniques, style and citations.

Hence, style guides advise writers on issues such as;

I. Applying consistent standards.

II. Citing sources.

III. Formatting text.

Answer:

ABC

Explanation:

When numbers are changed in cells that are involved in formulas, the formulas are automatically
changed
highlighted
O removed
recalculated

Answers

When numbers are changed in cells that are involved in formulas, the formulas are automatically
changed
highlighted
O removed
recalculated
removed

I think it is O removed

PLEASE HELP asap 60 POINTS
needs to be in Java

A programmer has written a method called replaceLetter that counts the amount of times a letter is present in a word. Your job is to modify this existing method to fulfill a new purpose.

Rather than count the instances of a letter in a String, write a program that replaces all instance of one letter with another. You should directly modify replaceLetter to get this program to work. In the starter code, replaceLetter only has two parameter values. Your new version should have a third parameter to indicate which String value is replacing the existing letter.

For example,

replaceLetter("hello", "l", "y")
returns

"heyyo"
Sample output:

Enter your word:
hello

Enter the letter you want to replace:
l

Enter the replacing letter:
x
hexxo
Hint: The letters will be assigned from the user as String values. Make sure to use String methods to compare them!

Answers

import java.util.Scanner;

public class JavaApplication45 {

   public static String replaceLetter(String txt, String txt1, String txt2 ){

       char one = txt1.charAt(0);

       char two = txt2.charAt(0);

       String newTxt = "";

       for (int i = 0; i < txt.length(); i++){

           char c = txt.charAt(i);

           if (c == one){

               newTxt += two;

           }

           else{

               newTxt += c;

           }

       }

       return newTxt;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter your word:");

       String word = scan.nextLine();

       System.out.println("Enter the letter you want to replace:");

       String txt1 = scan.next();

       System.out.println("Enter the replacing letter:");

       String txt2 = scan.next();

       System.out.println(replaceLetter(word,txt1,txt2));

   }

   

}

I hope this helps!

Learning Task 5. Identify the terms being described below. Write your answer in your answer
sheet.
1. This refers to the collection, transportation, processing or disposal, managing and
monitoring of waste materials.
2. This refers to the hazard control which involves the measure of replacing one hazardous
agent or work process with less dangerous one.
3. A very important method of controlling hazards which involves proper washing of your hair,
skin, body and even your clothes.
4. This refers to the preparedness for the first and immediate response in case of any type of
emergency.
5. This hazard control refers to the removal of a specific hazard or hazardous work process.
6. What is the term used to call the range of concentration over which a flammable vapor
mixed with air will flash or explode if an ignition is present?
7. A cross-disciplinary area concerned with protecting the safety, health and welfare of people
engaged in work or employment.
8. The term used in hazard control which involves changing a piece of machinery or work
process.
9. The term used to call any piece of equipment which is used to protect the different parts of
the body such as ears and eyes such as respirators, face mask, face shield, gloves, boots,
etcetera.
10. This is a form of hazard control which involves manipulation of worker/employee’s schedule
and job rotation.

Answers

Answer:

1. Waste management.

2. Substitution.

3. Personal hygiene practices.

4. Emergency preparedness.

5. Elimination.

6. Flammability limit.

7. Occupational safety and health (OSH).

8. Engineering controls.

9. Personal protective equipment (PPE).

10. Administrative controls.

Explanation:

1. Waste management: this refers to the collection, transportation, processing or disposal, managing and monitoring of waste materials.

2. Substitution: this refers to the hazard control which involves the measure of replacing one hazardous agent or work process with less dangerous one.

3. Personal hygiene practices: a very important method of controlling hazards which involves proper washing of your hair, skin, body and even your clothes.

4. Emergency preparedness: this refers to the preparedness for the first and immediate response in case of any type of emergency.

5. Elimination: this hazard control refers to the removal of a specific hazard or hazardous work process.

6. Flammability limit: is the term used to call the range of concentration over which a flammable vapor mixed with air will flash or explode if an ignition is present.

7. Occupational safety and health (OSH): a cross-disciplinary area concerned with protecting the safety, health and welfare of people engaged in work or employment.

8. Engineering controls: the term used in hazard control which involves changing a piece of machinery or work process.

9. Personal protective equipment (PPE): the term used to call any piece of equipment which is used to protect the different parts of the body such as ears and eyes such as respirators, face mask, face shield, gloves, boots, etcetera.

10. Administrative controls: this is a form of hazard control which involves manipulation of worker/employee’s schedule and job rotation.

This is used to track a user’s browser and download history with the intent to display popup banner ads that will lure a user into making a purchase.

Select one:
Adware
Worm
Phishing
Malware

Answers

Answer:

Adware

Explanation:

Adware is software designed to display advertisements on your screen, most often within a web browser.

Hope that helps.

A software that used to track a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase is: A. Adware.

An adware is also referred to as an advertisement-supported software and it can be defined as a software application (program) that is designed and developed to automatically display advertising materials such as banners or pop-up adverts (ads) on the graphical user-interface (GUI) of a user's computer system or mobile device.

The main purpose for the development of an adware is to automatically display popup banner adverts (ads), in order to lure or convince an end user into making purchase of the advertised product or service.

In conclusion, an adware is a software that is typically used to track and gather information about a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase.

Read more on adware here: https://brainly.com/question/9692296

WHAT DOES INFORMATION TECHNOLOGY DO??
Do they offer services or products

Answers

Yes

Explanation: Information technology, or IT, describes any technology that powers or enables the storage, processing and information flow within an organization. Anything involved with computers, software, networks, intranets, Web sites, servers, databases and telecommunications falls under the IT umbrella.

I need help please I’m behind

Answers

Answer:

The last one

Explanation:

Software is coding so they'll be impressed :)

Answer:

network administrator

Explanation:

It says a job that manages NETWORK hardware and software. So I would put network administrator.

Hi! Is anyone really good at making pretty schedules and designs? I don't have any money, but I could give points. I'll give a small number of points on this answer, but if you make the schedule I'll give you lots of points! (I'll send you the actual parts of the schedule I just need someone to make it look pretty) Thank you so much!

Answers

Could I see what you would like it to look like?

i emailed someone and im sure that they emailed back however it says nothing has arrived in my inbox what do I do

Answers

Answer:

report it or check ur spam mail or refresh the page

Explanation:

good luck figuring it out :)

What must you consider when determining the efficiency of an algorithm? Select two choices.

Answers

Answer:

C. The number of characters used to write the program

And

D. The length of time required to run the program

Explanation:

Hope this helped

how to take a pic with a cumputer

Answers

Answer:

Ctrl+Shift+4

Explanation:

Answer:

Use Snip+Sketch on your taskbar

It looks like this~

Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of

Answers

Answer:

Responsibility

Explanation:

Complete the sentence

-------- are technologies support virtual communities and the sharing of content with friends and family.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is: Online community technologies.

So, we can fill this question with the correct option as below:

Online community technologies are technologies that support virtual communities and the sharing of content with friends and family.

As we know that online community technologies are those technologies where people of the same group or interest make community virtually online. Where they can share their contents such as pictures, videos, thaught, ideas, etc with the group or family members.

There are different technologies that support virtual communities to share content with friends and family.

Such as Zoom meetings, Sk ype, Face book, Insta gram etc.

Answer:

Taking the quiz rn and I put social media

Explanation:

Social media is the closest description to this however it may be collaborative tools if it’s not social media.

Who you think is better? Ninja or TFue ,btw do you know who icebear is?

Answers

Answer:

no, no i dont think i will.

Explanation:

Direction: Put a check (/)mark if the statement is
correct and Irofessional. Letter W if it is incorrect.

Answers

Explanation:

Xghhdghxhdhzhhzshh, hdhshxxx

You have to match the letter nexts to the numbers

Answers

Answer:

Word is for business letter 4+a

2+c Monthly budget expenses

3+b is for presentation

1+d department store inventory

<BUTTON TYPE="BUTTON" VALUE="SUBMIT">SUBMIT YOUR FORM</BUTTON>
</FORM>
</BODY>
</HTML>
Write the question of this programming .​

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

This is an inference question. I mean that in this question, an answer is given, you have to generate the question.

The given code is :

BUTTON TYPE="BUTTON" VALUE="SUBMIT">SUBMIT YOUR FORM</BUTTON>

</FORM>

</BODY>

</HTML>

So, the answer (i.e. to write a question) is

Write a HTML code that displays a button in its body with the text "Submit Your Form ".

The Monroe Doctrine promised that the United States would:
A. not accept new colonies in the Americas.
B. cut itself off from nearly all foreign trade.
C. send its military to defend all new democracies.
D. take a more active role in European affairs.​

Answers

Answer:A

Explanation:

The Monroe Doctrine promised that the United States would not accept new colonies in the Americas. The correct option is A.

What is Monroe Doctrine?

The Monroe Doctrine is the most well-known example of US policy toward the Western Hemisphere.

The doctrine, buried in President James Monroe's routine annual message to Congress in December 1823, warns European nations that the United States will not tolerate further colonization or puppet monarchs.

Although initially ignored by Europe's great powers, the Monroe Doctrine eventually became a cornerstone of US foreign policy.

President James Monroe of the United States declared the United States to be the protector of the Western Hemisphere in 1823, prohibiting European powers from colonizing additional territories in the Americas.

The doctrine's three main concepts separate spheres of influence for the Americas and Europe, non-colonization, and non-intervention were intended to mark a clear break between the New World and Europe's autocratic realm.

Thus, the correct option is A.

For more details regarding Monroe Doctrine, visit:

https://brainly.com/question/290388

#SPJ5

Complete the sentence

. A single IP address ______ be simultaneously assigned to more than one device in the network.

Answers

Answer:

Cannot, I will just stick with that answer. if not that it's can.

Who here would like to play among us with me?
Time: Friday, November 13

Answers

Answer:

sure

Explanation:

4.5 code practice edhesive

Answers

Answer:

n= input("Please enter the next word: ")

x=1

while(n != "STOP"):

 print("#" + str(x) + ": You entered " + n)

  x=x+1

  n= input("Please enter the next word: ")

print("All done. " + str(x-1) + " words entered.")

Explanation:

Choose the parts of the browser window. PLEASE ANSWER QUICKLY TEST

Answers

it would be display window

Answer:

display window

Explanation:

as it is where the browsed data is to be displayed

define reading and writing that regards storage​

Answers

Answer:

Reading and writing on computers and other gadgets require storage.

HOPE THIS HELPS

HAPPY THANKSGIVING

Other Questions
A. to hold and protect the cells DNAB.to store food and other materials inside a cellC. to store enzymes that Break down food D. to use energy from sunlight to make surgars I'll give you brainliest and 5 stars if your right Help plz !!!!!!!!!!!!!! A neutral stimulus causes no response.Please select the best answer from the choices providedTF A typical coffee mug holds about 355,000 microliters of liquid. How many kiloliters of liquid does this mug hold expressed in standard Scientific notation? Andrea ordered a computer on the Internet. The computer cost $1399 plus 6 1/2% sales tax. What was the total amount Andrea paid for her computer? A pure green beetle is crossed with a pure brown beetle. All of the offspring are green. Which explanation below, correctly explains this phenomenon?A.Green and brown are equally expressed so they are both dominant.B.Green is more common than brown so more green genes are passed on.C.The gene for green color is dominant over the gene for brown color.D.The gene for brown color is dominant over the gene for green color. Educators in Michigan have been trying to raising math achievement scores for several years without success. Results from the state assessment test given in fourth grade show that 52% of all fourth graders cannot subtract when borrowing from zero (regrouping with zero in the subtrahend). Two new techniques for teaching this concept have been developed by teachers who belong to the Michigan Council of Teachers of Mathematics. It is decided that each technique be used in randomly selected classrooms throughout the state. Sixty third-grade classrooms are selected to try each of the techniques. Results from the state assessment test will then be monitored for each of the next two years to see whether either of the two techniques will be effective in teaching subtraction from zero. Sixty-three percent of the students who were taught with first technique passed the objective. Only 32% of students who were taught with the second technique passed the objective.1. The population is:______.A. All fourth graders in Michigan.B. All third graders in Michigan.C. The students who were in the 60 third-grade classrooms that used each technique.D. All students in fourth grade who were taught with one of the techniques.2. The sample is:______.A. All fourth graders in Michigan.B. All third graders in Michigan.C. The students who were in the 60 third-grade classrooms that used each technique.D. All students in fourth grade who were taught with one of the techniques.3. An example of a parameter in the study is:______.A. 63% of the students taught using technique 1 achieved the objective of subtracting from zero.B. 32% of the students taught using technique 2 passed the state objective test.C. 52% of all fourth graders in Michigan cannot subtract from zero.D. 52% of all fourth graders in Michigan cannot pass the fourth-grade mathematics state assessment test.4. An example of a statistic in the study is:_______.a. 63% of the students taught using technique 1 achieved the objective of subtracting from zero.b. 32% of the students taught using technique 2 passed the state objective test.c. 52% of all fourth graders in Michigan cannot subtract from zero.d. both a & b.e. all of the above.5. The dependent variable is the:______.A. Results from the fourth-grade state assessment test in mathematics state assessment.B. Instruction in math in third grade.C. Two new techniques for teaching subtraction from zero.D. Percentage of children who passed the objective subtraction from zero.6. The independent variable is the:______.A. Results from the fourth-grade state assessment test in mathematics state assessment.B. Instruction in math in third grade.C. Two new techniques for teaching subtraction from zero.D. Percentage of children who passed the objective subtraction from zero. 3. + (-2) + (-24 )Please help this question is worth a lot of points ( math question) help please:) What were two military technologies developed in WWI one parent has type AB blood while the other has Type O blood.Which two blood type could their children have? ________ are individual organisms with a gastrovascular cavity and circle of tentacles that make up coral.A) PolypsB) AlgaeC) NematocytesD) PlanulaeE) Atolls Simplify 1/3(6x+3) -4(3x-2) HELP ME GUYS IM STUCK ON THIS A shop sells orange juice in the following ways:500 ml bottle for 1.151.5 l carton for 2.70 each or 2 cartons for 53.5 l carton for 5.75What's the cheapest way of buying exactly 9 litres with no extra?Find the amount of each type of bottle or carton you need and the total cost of buying 9 litres. why is soleas hampster so cute? 31 = 9/3+6 solve the equation Individuals who break into computer systems with the intention of doing damage are called _____________.a. white hatsb. e-criminalsc. hackersd. keyloggerse. black hats What does archaeology believe allowed people to build complicated society1Surplus of food2The building permanent structures3A hierarchies of people4 creation of art in artisans which devices are used in networking What is the R.M.S Titanic known for being?