1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
7

Assume that the final grade for a course is determined based on this scale - A: 900 points, B: 800-899 points, C: 700-799 points

, D: 600-699 points, F: 599 or fewer points. Write a function named get_letter_grade() that takes the number of points the student has earned as a parameter. It should return a string containing (only) the letter grade the student will receive.
Computers and Technology
1 answer:
saul85 [17]3 years ago
5 0

Answer:

In Python:

def get_letter_grade(points):

   if points>=900:

       grade ="A"

   elif points>=800 and points < 900:

       grade ="B"

   elif points>=700 and points < 800:

       grade ="C"

   elif points>=600 and points < 700:

       grade ="D"

   else:

       grade = "F"

   return grade

Explanation:

This defines the function

def get_letter_grade(points):

The following if-else if conditions check the score to determine the appropriate grade

<em>    if points>=900:</em>

<em>        grade ="A"</em>

<em>    elif points>=800 and points < 900:</em>

<em>        grade ="B"</em>

<em>    elif points>=700 and points < 800:</em>

<em>        grade ="C"</em>

<em>    elif points>=600 and points < 700:</em>

<em>        grade ="D"</em>

<em>    else:</em>

<em>        grade = "F"</em>

This returns the grade

   return grade

You might be interested in
Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
enyata [817]

Answer:

The correct option to the following question is an option (D) Masking.

Explanation:

The following option is correct because Masking is the ability to apply mask on the value with the help of bitwise AND, OR and XOR,  

That's why, when Alison looks the Social Security Number then it looks different and this is the 9 digits of Social Security Number which is in three parts, the first part is for the area, the next part is for group number and last part is for the serial number.

5 0
4 years ago
Advancing technology has made life easier for people and businesses today. Imagine that you have to work for an entire day witho
Advocard [28]

Answer:

Sí gracias a la tecnología estamos conectados, hay personas de escasos recursos que no tienen dinero suficiente para poder comprar internet y los niños, se quedan sin estudio, por eso las autoridades deben ayudar a las personas de escasos recursos, espero que te ayude mi comentario, Bendiciones.

Explanation:

3 0
3 years ago
This is the computer âchipâ that interprets computer instructions and processes data:
meriva
This is the CPU (central processing unit) 
Hope this helps, should be the answer.
8 0
4 years ago
Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a differe
miss Akunina [59]

Answer:

The answer to this question is Diversity of Defense.

Explanation:

Diversity of defense:- It is an approach for security which supports multiple layers but the catch here is that at each layer a different mechanism of security is used or at most of the layers.The idea is that you do not need to have multiple layers of defense but different defenses also.  

So we conclude that the answer to this question is Diversity in Defense.

3 0
3 years ago
What is the purpose of network permissions?
Irina-Kira [14]

the answer is A) to control access to network resources

5 0
3 years ago
Read 2 more answers
Other questions:
  • The Task Manager cannot be used to turn Services on and off.<br> True or False?
    8·2 answers
  • When you see a yield sign what do you do?
    8·1 answer
  • What is the full form of IE? ​
    9·1 answer
  • If you are working with a team of students on a class project and your team chooses to share content by uploading Word and Excel
    13·1 answer
  • Should the federal government have bug bounty programs? Why or why not?
    9·2 answers
  • Why is the technology so effective in tracking contacts
    7·1 answer
  • Final one bit l y links are a virus that will corrupt your files do not go on it
    15·2 answers
  • Can someone answer this for me will award brainliest lol
    11·2 answers
  • Write a new version (called map2) of the map function which operates on two lists. Your function should accept three parameters,
    15·1 answer
  • If you have an unstable investment and after 5 years you have 100 dollars less than you started with, is your IRR positive or ne
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!