1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
11

Intro to cs 3.7 edhesive g=float(input("Enter your English test grade:")) if(g<=64): print("F") if (g>=65 and g<69): pr

int("D") if (g>=70 and g<79): print("C") if (g>=80 and g<89): print("B") if (g>=90 and g>=100): print ("A") else: print ("Not a grade") help me fix this
Computers and Technology
1 answer:
qwelly [4]3 years ago
5 0

Answer:

The correct code for this question:

g=float(input("Enter your English test grade:")) #take input from user.

#check conditions

if (g>=100 and g<=90):

print ("A")

#g greater then equal to 100 and less then equal to 90.

if (g>=89 and g<=80):

print("B")

#g greater then equal to 89 and less then equal to 80.

if (g>=79 and g<=70):

print("C")

#g greater then equal to 79 and less then equal to 70.

if (g>=69 and g<=65):

print("D")

#g greater then equal to 69 and less then equal to 69.

if(g<=64):

print("F")

#g less then equal to 64.

else:

print ("Not a grade")

#not a grade or fail.

Explanation:

In this program, we use to take a value from the user and check the value from the various conditions. To check all the condition we use if-else statement and AND operator that check to the range to together.

If -else is a conditional operator. In that, If block is used to check the true part and else part takes false value, and AND is a logical operator that check the two range together  

You might be interested in
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
How can I make a website login system with only using php?​
Alona [7]

Answer:

<h3><u><em>PHP-enabled web pages are treated just like regular HTML pages and you can create and edit them the same way you normally create regular HTML pages.</em></u></h3>

<u>(I hope this helps!)</u>

4 0
3 years ago
Programming language​
Nana76 [90]
And? Please give me an explanation.
6 0
3 years ago
what is the least expensive way to connect five computers using a wired network to a router that has only four network ports?
ExtremeBDS [4]

Answer: Get wifi.

Explanation: Get wifi.

5 0
2 years ago
Which of the following problems is least likely to be solved through grid computing? Financial risk modeling Gene analysis Linea
gregori [183]

Answer:

Linear problems

Explanation:Grid computing is the term used in Information technology, Computer programming and Computer networks to describe the interconnection of different Computer resources in order to achieve certain specified goal. GRID COMPUTING ALLOWS COMPUTER RESOURCES TO WOK AS A SINGLE UNIT.

Grid computing can be used to solve various issues connected with the use of Computer resources such as Financial risk modelling,Gene analysis etc but least likely to be used to solve Linear problems.

6 0
3 years ago
Other questions:
  • PLEASE HELP ASAP!! WILL MARK BRAINLIEST!! 20 POINTS!!
    6·1 answer
  • Help pls<br><br> What type of link is used to call this file?
    5·2 answers
  • Should you configure if you want to limit access to files with certain classifications within a folder to a specific security gr
    13·1 answer
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    12·1 answer
  • How do i beat the final battle in lara croft: temple of osiris?
    9·1 answer
  • Given the declaration Circle x = new Circle(), which of the following statements is most accurate?
    11·1 answer
  • What is the output?<br> answer = "Hi mom"<br> print(answer.lower())
    7·1 answer
  • Quality answers will be appriciated! :)​
    15·2 answers
  • Which soft skills would these mobile app developers need to use in the situations described?
    8·2 answers
  • Which is the fastest memory in computer​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!