Computers and Technology
Computers and Technology, 21.05.2020 00:09, sofo24

You're helping Professor Joy to calculate the grades for his course. The way his course is organised, students take two exams and their final grade is the weighted average of the two scores, where their lowest score weights 70% and their highest score 30%. To accomplish this, you are going to need to do the following: (1) Build the Student named tuple with the following attributes: name (string) exam1 (float) exam2 (float) (2) Write a function create_student, which will ask the user to input a single student's name, exam 1 score, and exam 2 score. The function will then create a named tuple with this information and return it. (3) Write a function create_class, which an integer n as a parameter, and calls create_student n times and returns a list with the n students created. (4) Write a function calculate_score, which takes a single Student named tuple as a parameter, and returns the final score, where their lowest grade is weighted 70% and their highest grade is weighted 30%.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 02:00, kelseybell5522
For a typical middle-income family, what is the estimated cost of raising a child to the age of 18? $145,500 $245,340 $304,340 $455,500
Answers: 1
image
Computers and Technology, 24.06.2019 21:30, asimms8504
Suppose a router has built up the routing table shown in the table. subnet number 128.96.39.00 28.96.39.128 128.96.40.00 192.4.153.0 default) subnet mask 255.255.255.128 255.255.255.128 255.255.255.128 255.255.255.192 nexthop interface 0 interface 1 r2 r3 r4. the router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers r2, r3, or r4. describe what the router does with a packet addressed to each of the following destinations: (a) 128.96.39.10 (b) 128.96.40.12 (c) 128.96.40.151 (d) 192.4.153.17 (e) 192.4.153.90
Answers: 3
image
Computers and Technology, 25.06.2019 08:00, cheerleaderautumnche
Aresearcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. direct identifiers will not be collected; however, ip addresses may be present in the data set. risk of harm should be evaluated by: solely by the magnitude or severity of expected harm. both the magnitude (or severity) and the probability (or likelihood) of harm. solely by the probability of expected harm. neither the magnitude or probability of harm.
Answers: 3
image
Computers and Technology, 25.06.2019 08:10, aneisha0117
Which of the following statements is false? a. package access is rarely used. b. use the access modifier package to give a method or variable package access. c. classes in the same source file are part of the same package. d. if a program uses multiple classes from the same package, these classes can access each other's package access members directly through references to objects of the appropriate classes, or in the case of static members, through the class name.
Answers: 1
Do you know the correct answer?
You're helping Professor Joy to calculate the grades for his course. The way his course is organised...

Questions in other subjects:

Konu
Biology, 15.12.2020 18:30