1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
13

Calculate the weighted grade for each student that appears in the data file. You may calculate the grade based on total earned p

oints, divided by total possible points. Or, for 10 points extra credit; Use the weighted totals for this course; available in the syllabus and on the course home page.
Output a list of students, their grade as a percentage and a letter grade. For simplicity; use this letter grade scale;
A = 90 >= grade <= 100
B = 80 >= grade < 90
C = 70 >= grade < 80
D = 60 >= grade < 70
E = grade < 60
The following sample output has been provided as a guide. Your solution must be based on the data in the Lab03-data.csvPreview the document file. No points will be awarded to solutions that are based on copy-pasting the sample output and printing it with awk.
Name Percent Letter
Andrew 75.21 C
Chelsey 92.21 A
Shane 77.64 C
Ava 79.76 C
Sam 62.34 D
Computers and Technology
1 answer:
lutik1710 [3]3 years ago
6 0

Answer:

I don't know the answer, sorry

You might be interested in
Timing can be a major factor in the success of a business incorporation and emerging technology. Describe one potential problem
Serga [27]
The price could go up, it might not work then later down the road
5 0
3 years ago
Read 2 more answers
PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?
zavuch27 [327]

Answer:

A

Explanation:

5 0
3 years ago
In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a
laila [671]

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

5 0
4 years ago
Now suppose that the file is broken into 5 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ig
Vesnalui [34]

Answer:

6.025seconds

Explanation:

For each link we have,

Dtran = 10mbits/10mbps =1 second

Dprop = 5000km/2×10^8m/sec =0.025sec.

Total delay =( 5 + 2-1) + Dtran+ 2 Dprop= 6.025seconds

4 0
4 years ago
Disk Defragmenter eliminates unnecessary file fragments and rearranges files and unused disk space to optimize computer operatio
Anit [1.1K]

Answer:

Windows utility program.

Explanation:

The operating system is a software used to manage the activities of various parts of the computer system. It acts as a link between the hardware, application software and the user. An example of OS is the Windows OS.

It has the kernel program that directly connects the hardware to the operating system. It provides utility programs to analyse, optimise, control and maintain devices running in the system.

Window utility program is an example of utilities in OS, used to analyse, control, optimise and maintain device and software activities for good system performance.

An example of the windows utility program is the disk defragmenter used to eliminate fragments and rearrange files and unused disk space.

7 0
3 years ago
Other questions:
  • Maya enjoys connectedWith her friends and social media apps but one of her friends post a lot of stuff that my thinks it’s annoy
    14·1 answer
  • A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
    8·1 answer
  • type of weapon of mass decruction taht spreads deadly radioactive material by way of conventinal explosion
    15·1 answer
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • 4. How can you select non-adjacent cells (i.e. cells that are not all together in one block)?
    5·2 answers
  • What social impact did the gunpowder have on society?
    12·1 answer
  • What is the impact of information technology in your daily life?
    12·1 answer
  • Which diagram is used as a popular technique for investigating causes and effects? 1. Cause and effect 2. Fishbone/lshikawa 3. R
    13·1 answer
  • Iciples UI
    12·1 answer
  • What is the viewport?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!