1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
4 years ago
11

Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their

way into their master’s degree directly from undergraduate. If you have a 3.5 GPA and graduate from one of our majors, you can continue on and get your masters without having to do a lot of the paperwork. For simplification, we have four undergraduate degrees: CS, SWE, IT, and CGDD – and three masters programs: MSCS, MSSWE and MSIT. For this assignment, you’re going to ask the user a few questions and determine if they qualify for the FastTrack option.
Sample Output:
Major: Frogmongering
GPA: 3.9
Great GPA, but apply using the regular application.
Sample Output #2:
Major: SWE
GPA: 3.3
Correct major, but GPA needs to be higher.
Sample Output #3:
Major: IT
GPA: 3.5
You can FastTrack.
Sample Output #4:
Major: Study Studies
GPA: 0.4
Talk to one of our advisors about whether grad school is for you.
Computers and Technology
1 answer:
Zielflug [23.3K]4 years ago
6 0

Answer:

The programming language is not stated. However, I'll answer this question using Python programming language.

The program uses no comments; find explanation below

i = 0

while not (i == 4):

     print("Sample Run: #"+str(i+1))

     Major = input("Major: ")

     GPA = float(input("GPA: "))

     if not (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):

           if GPA >= 3.50:

                 print("Great GPA, but apply using the regular application")

           else:

                 print("Talk to one of our advisors about whether grad school is for you")

     if (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):

           if GPA >= 3.50:

                 print("You can FastTrack.")

           else:

                 print("Correct major, but GPA needs to be higher.")

     i = i + 1

Explanation:

Line 1 of the program initializes the sample run to 0

Line 2 checks if sample run is up to 4;

If yes, the program stops execution else, it's continues execution on the next line

Line 3 displays the current sample run

Line 4 and 5 prompts user for Major and GPA respectively

Line 6 to 10 checks is major is not one of CS, SWE, IT, and CGDD.

If major is not one of those 4 and GPA is at least 3.5, the system displays "Great GPA, but apply using the regular application"

If major is not one of those 4 and GPA is less than 3.5, the system displays "Talk to one of our advisors about whether grad school is for you"

Line 11 to 15 checks is major is one of CS, SWE, IT, and CGDD.

If major is one of those 4 and GPA is at least 3.5, the system displays "You can Fastrack"

If major is one of those 4 and GPA is less than 3.5, the system displays "Correct major, but GPA needs to be higher."

The last line of the program iterates to the next sample run

You might be interested in
Research different ways that 3D printing is used in society. Tell us about the items that are 3D printed.
Eva8 [605]

3D printing helps to reduce the time it takes for a manufacturer to create the product. This lets manufacturers invest their time to make flawless products because the production cycle time is reduced.

3 0
4 years ago
Read 2 more answers
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Match each feature of the E publishing as an advantage a disadvantage a threat or an opportunity
natta225 [31]

Answer:

E-publishing is also known as digital publishing or online publishing.It means to publish the content in electronic form.It is growing rapidly.It consist digital publication of e-books,digital magazines that can be read on a screen.

<u>Explanation:</u>E-publishing is very convenient.We do not have to keep  large number of books on the shelves.E-books are best during travelling because we need not to carry heavy luggage of books.E-books are cheaper than paperbacks.

E-publishing can allow the authors  to reach large number of readers.Electronic contents are very well updated.Electronic books are environment friendly.It saves wastage of papers and hence cutting of trees.

Besides above advantages there are some disadvantages of E-publishing:

There are more responsibilities in E-publishing.Chances of copyright infringement can be there.

Profits are very low in case of e-publishing.It is not easy to earn money through this method.

Quality of printed books is much better than e-books.

So we can say that e-publishing has it's own advantages and disadvantages.

3 0
4 years ago
How to trigger watchers on initialization in vue.js ?
ale4655 [162]

Answer:

variable when the component is mounted. This triggers the watchers which then triggers an emit i have in the watcher. I do not want the emit to happen when the variable is only being initialized. The variable is from the data section of the vue component.

3 0
2 years ago
After a suspected identity fraud case has been resolved, you should: AContinue to monitor your credit reports and accounts. BKee
AysviL [449]
The answer is C. Both A and B because in the case of identity fraud it would make sense to monitor both
4 0
3 years ago
Read 2 more answers
Other questions:
  • Running fewer applications at once is a way to resolve which type of bottleneck?
    9·1 answer
  • Which type of multiplexing divides transmission opportunities into slots of 125 microseconds with position inside each slot rese
    10·1 answer
  • Which option is an example of a Boolean operator?<br> O A. HTML<br> O B. <br> C. SEO<br> D. NOT
    5·1 answer
  • Write a program in c++ that plays a number guessing game with a Human user. The Human user will think of a number between 1 and
    7·2 answers
  • Whate is function of northe bridge<br>​
    12·1 answer
  • 0111101101010110101110110001001011101001011101101010101010110101
    14·1 answer
  • Computer in education are used for teaching and learning aids​
    14·1 answer
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
  • What is computer specification
    15·1 answer
  • The Internet is a worldwide communications network. Which device connects computer networks and computer facilities?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!