1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
13

Array testGrades contains NUM.VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cre

dit is 100, so anything over 100 is extra credit. Ex: If testGrades (101,83, 107,90), then sumExtra 8, because 1+0+7+0 is 8
import java.util.Scanner; 3 public class SumoFExcess ( 4 public static void main (String [ args) ( Scanner scnr -new Scanner (System.in); final int NUM VALS -4 int[] testGrades-new int[NUM VALS]; int ij int sunExtra 9999; 11 Assign sunExtra with 0 before your for loop 10 for (i-0; ǐ < testGrades.length; +.1) { testGrades[1]-scnr.nextInt) 12 14 15 / Your solution goes here 16 System.out.printin("sumExtra:sumExtra);
Computers and Technology
1 answer:
Soloha48 [4]3 years ago
5 0

Answer:

12.       for (i = 0 ; i < testGrades.length ; i+=1 ){

13.           if (testGrades[i] > 100){

14.              sumExtra = sumExtra + testGrades[i] - 100;}

15.       }

Explanation:

We first iterate through the entire testGrades array. For each test score that is in testGrades ( that is testGrades[i] ), we see whether or not the test grade is above 100 (See line 12) . If test grade is greater than 100, this means we have extra credit. We simply subtract 100 from the test grade, add it with the previous value of sumExtra and store the value back in sumExtra(see line 14). Once i is greater than the length of the test grades, the loop is exited. We can now print sumExtra to obtain the result.

You might be interested in
In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
Brrunno [24]

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

5 0
3 years ago
Read 2 more answers
Why is a memory hierarchy of different memory types used instead of only one kind of memory?
Kipish [7]

Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.

Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.

Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.

5 0
3 years ago
Select the correct answer. Matt works for an advertising agency. He is often involved in the designing and development processes
Rus_ich [418]

Answer:

MAY BE A

Explanation:

I THINK A IS THE CORRECT ANSWER

8 0
3 years ago
Read 2 more answers
The three logical operators recognized by most search engines are
Kisachek [45]
The three basic logical operators recognized by the most search engines are AND, OR and NOT. They are known as Boolean operators. <span>You can use Boolean operators in keywords on the internet in both advanced and customs searches on many search engines.</span>




8 0
3 years ago
Hiding an object, such as a diary, to prevent others from finding it is an example of:______________.
madreJ [45]

Answer:

Privacy

Explanation:

I'm not sure but it matches the description you gave.

4 0
3 years ago
Other questions:
  • This assignment is to read from an input file and process the data for a group of people. Your program calculates the interest a
    5·1 answer
  • 6. Sandra did a survey to see how
    9·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • Choose the statement that describes an advantage of paying a bill through the mail with a check.
    6·2 answers
  • ________ is used by text recognition software to convert typed, printed, or handwritten text into the computer-based characters
    15·1 answer
  • A digital designer might do computer animation or video games true or false
    13·2 answers
  • How do you change your name on brainly after you have made an account​
    5·1 answer
  • What aspect should you consider before adding pictures to a document?
    6·1 answer
  • A friend asks you to look over the code for an adventure game and help figure out why it won’t work. Which of these options is s
    5·2 answers
  • Define a function Output Value() that takes two integer parameters and outputs the sum of all negative integers starting with th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!