1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
14

What does a GPA show

Computers and Technology
2 answers:
ICE Princess25 [194]3 years ago
7 0

Answer:

Grade Point Average

Explanation:

aalyn [17]3 years ago
6 0

Answer:

Your GPA, or Grade Point Average, is a number that indicates how well or how high you scored in your courses on average. It's meant to score you (usually on a GPA scale between 1.0 and 4.0) during your studies and shows whether your overall grades have been high or low.

Explanation:

You might be interested in
Dam naj za pierwszej osobie która odpowie dobrze!
Rama09 [41]
I don’t understand that language
8 0
3 years ago
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
User name ideas for ro blox? I'm changing mine and I dont know what I want. No numbers or underscores!
SpyIntel [72]
Lil.younging or 2k(your name)
8 0
3 years ago
Read 2 more answers
Suppose a computer has 16-bit instructions. The instruction set consists of 32 different operations. All instructions have an op
Kazeer [188]

Answer:

2^7= 128

Explanation:

An instruction format characterizes the diverse part of a guidance. The fundamental segments of an instruction are opcode and operands. Here are the various terms identified with guidance design:  Instruction set size tells the absolute number of guidelines characterized in the processor.  Opcode size is the quantity of bits involved by the opcode which is determined by taking log of guidance set size.  Operand size is the quantity of bits involved by the operand.  Guidance size is determined as total of bits involved by opcode and operands.

6 0
4 years ago
Write a recursive program that requests an answer to the question "Are we there yet?" using an input statement and terminates if
inna [77]

Answer:

def recursive_func():

   x = input("Are we there yet?")

   if x.casefold() == 'Yes'.casefold():

       return

   else:

       recursive_func()

recursive_func()

Explanation:

We define the required function as recursive_func().

The first line takes user input. The user input is stored in variable x.

The next line compares the user input to a string yes. The function executes the else block if the condition isn't met, that is a recursive call is executed.

IF condition returns the function. The string in variable X is compared to a string 'Yes'. the casefold() is a string function that ignores the upper/lower cases when comparing two strings. (This is important because a string 'yes' is not the same yes a string 'Yes' or 'YES'. Two equal strings means their cases and length should match).

3 0
4 years ago
Other questions:
  • What are the three fundamental elements of an effective security program for information systems?
    11·2 answers
  • Which process improves the life of a computer?
    11·1 answer
  • Which of the following expansion ports would be used to enable transfer of power, data, and video to peripheral devices on an Ap
    7·1 answer
  • All queries have an explicit location. true of false
    13·2 answers
  • Who is responsible for customer service?
    14·1 answer
  • ______ is the software that prevents people from being able to access your personal information.
    8·2 answers
  • In information systems, _____ is information from a system that is used to make changes to input or processing activities.
    6·1 answer
  • A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choo
    5·1 answer
  • State the difference between = and ==
    9·1 answer
  • Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!