1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
2 years ago
6

write an algorithm to determine a student's final grade and indicate whether it is passing or failing. the final grade is calcul

ated as the average of 4 marks.
Computers and Technology
1 answer:
Nadusha1986 [10]2 years ago
3 0

Using the knowledge in computational language in algorithms it is possible to write the code being determine a student's final grade and indicate whether it is passing or failing.

<h3>Writting the algorithm :</h3>

<em>Start</em>

<em>Take 4 integer inputs for the different 4 subject like math, english, physics, chemistry.</em>

<em>Then calculate the grade based upon the average of four marks .</em>

<em>             grade = ( math + english + physics + chemistry ) / 4</em>

<em> if the value of the grade is more than 40, it will print pass otherwise it shows fail.</em>

<em>END</em>

See more about algorithm at brainly.com/question/22984934

#SPJ1

You might be interested in
Write a program that asks the user to enter the size of a triangle (an integer from 1 to 50). Display the triangle by writing li
lianna [129]

Answer:

/*

* Program to print traingle using asterisk.

*/

#include<iostream>

using  namespace std;

//Function to print n asterisk in a row.

void printAsterisk(int n)

{

   for(int i = 0;i<n;i++)

   cout<<"*";

}

int main()

{

//Variable to store size of trianle

int size;

cout<<"Enter the size of triangle"<<endl;

cin>>size;

//print asterik in increasing order line by line.

for(int i =0; i<size;i++)

{

    printAsterisk(i);

    cout<<endl;

}

//print asterik in decresing order line by line.

for(int i =size-1; i>0;i--)

{

    printAsterisk(i-1);

    cout<<endl;

}

 

 

}

Output:

Enter the size of triangle

10

*

**

***

****

*****

******

*******

********

*********

********

*******

******

*****

****

***

**

*

Explanation:

Since no programming language is mentioned therefore answer is provided in C++.

The above program will use two for loops to print the triangle using asterisk.

The first loop will print the asterisk line by line with each line having one more asterisk than the previous one till the size of the triangle.

The second for loop will print the asterisk using same logic as above but in reverse order.

Final output of triangle will be obtained.

7 0
3 years ago
Communications technology and the Internet can be used to reduce the time and costs involved in disseminating financial statemen
mash [69]

Answer: D)XBRL(eXtensible Business Reporting Language)

Explanation: XBRL(eXtensible Business Reporting Language) is the type of XML(eXtensible Markup Language) that is used for the improvement in the transparency between the recipient and the business organization regarding the accessibility of the financial information.

The financial data is formatted uniformally so that the user can get the knowledge about the finance through the online sources like internet.

Other options are incorrect because HTML and XML are the markup languages but not for the financial area and PDF file is the file that stores data.Thus correct option is option(D).

4 0
4 years ago
"To speed up magnetic hard drive performance , ___________ is often used. "
Harrizon [31]

Answer:

disk caching

Explanation:

Hi,

Magnetic hard drives use disk caching to speed up performance. This method is quite ingenious because what it does is that in a section of memory in your pc, it keeps a copy of information that was previously accessed in the hard disk. So, next time if the same data is requested, the system can refer to cache to get quick access rather than going to the hard disk (which is slower).

3 0
3 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
Other questions:
  • The North American Free Trade Agreement (NAFTA) among Canada, Mexico, and the United States is intended to _____.
    5·2 answers
  • Rebecca received the following e-mail from her boss: I NEED ALL EMPLOYEES TO WORK LATE ON SATURDAY. NO EXCEPTIONS! What is the m
    13·2 answers
  • Which of the following is not a method of data management?
    15·1 answer
  • Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    10·1 answer
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • how write a program to prompt the user for hours and rate per hour using input to computer gross pay Use 35 hours and rate2.75 p
    9·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • What can a scientist do if he repeats and experiment and gets diffrent results?
    5·1 answer
  • The program DebugTwo2.cs has syntax and/or logical errors. Determine the problem(s) and fix the program.// This program greets t
    5·1 answer
  • How do you enlarge an image to see more detail on it? (1 point)
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!