1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
9

The variable grade can have any real number value from 0 to 100. Ask the user to enter a grade in numerical form. Write an if-el

seif-else statement that displays the letter grade (any format) corresponding to a numerical grade in an appropriately formatted output statement. Use the standard 10-point grading scale:  a: A: 90 ≤ grade  a: B: 80 ≤ grade < 90  a: C: 70 ≤ grade < 80  a: D: 60 ≤ grade < 70  a: F: grade < 60
Computers and Technology
1 answer:
Alborosie3 years ago
8 0

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

int main()

{

float marks;

cout<<"Enter your grade value :";

cin>>marks;

if(marks>=90)

cout<<"Your grade is 'A'";

else if(marks>=80&& marks<90)

cout<<"Your grade is 'B'";

else if(marks>=70&& marks <=80)

cout<<"Your grade is 'C'";

else if(marks>=60&& marks <70)

cout<<"Your grade is 'D'";

else

cout<<"Your grade is 'F'";

}

You might be interested in
Which of the following is the fastest way to open an Access database? a. Right-click the database icon. b. Start Access from the
STALIN [3.7K]

Answer:

C. Double-click the database icon.

5 0
3 years ago
Read 2 more answers
The practice of texting is most popular and what age group
Diano4ka-milaya [45]
Mostly teenagers and young adults (ages 14-21) text the most.
4 0
3 years ago
Read 2 more answers
If you wish to include a header or footer on all pages in a publication, you will need to insert this by navigating to the _____
Marina86 [1]
If you wish to include a header or footer on all pages in a publication, you will need to insert this by navigation to the master page.
7 0
4 years ago
Read 2 more answers
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
How to set the maximum to 10? Java
hichkok12 [17]
Public int setLimit(parameter) {
if (parameter > 10) {
return 10;
} else {
return parameter;
}
}
6 0
3 years ago
Other questions:
  • Write a program totake a depth (in kilometers) inside the earth as input data;compute
    15·1 answer
  • I am confused about joins in sql.
    8·2 answers
  • Im being timed please help!!
    7·2 answers
  • Summarizes statistical data ?
    11·1 answer
  • Match the parts of the website address with its correct explanation. http://www.usa.gov/Agencies/federal.shtml
    10·2 answers
  • What is the difference between an electronic notebook and electronic flash cards?
    8·1 answer
  • The head of small organization wants to install a network so that all the employees of different department can share various re
    14·1 answer
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
  • How does an extranet work?
    15·1 answer
  • How do people and computers approach problems differently
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!