1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
2 years ago
7

Assume that the final grade for a course is determined based on this scale - A: 900 points, B: 800-899 points, C: 700-799 points

, D: 600-699 points, F: 599 or fewer points. Write a function named get_letter_grade() that takes the number of points the student has earned as a parameter. It should return a string containing (only) the letter grade the student will receive.
Computers and Technology
1 answer:
saul85 [17]2 years ago
5 0

Answer:

In Python:

def get_letter_grade(points):

   if points>=900:

       grade ="A"

   elif points>=800 and points < 900:

       grade ="B"

   elif points>=700 and points < 800:

       grade ="C"

   elif points>=600 and points < 700:

       grade ="D"

   else:

       grade = "F"

   return grade

Explanation:

This defines the function

def get_letter_grade(points):

The following if-else if conditions check the score to determine the appropriate grade

<em>    if points>=900:</em>

<em>        grade ="A"</em>

<em>    elif points>=800 and points < 900:</em>

<em>        grade ="B"</em>

<em>    elif points>=700 and points < 800:</em>

<em>        grade ="C"</em>

<em>    elif points>=600 and points < 700:</em>

<em>        grade ="D"</em>

<em>    else:</em>

<em>        grade = "F"</em>

This returns the grade

   return grade

You might be interested in
Does anyone know how to permanently delete photos on a dell computer? For my cousin.
strojnjashka [21]

Answer: If your trying to get rid of em. The best way to do that is to put them in the recyling bin and then empty it. Doing that will delete them off your computer so they can't be found.

Explanation: Also keep in mind that whether or not you delete them they'll still be on your hard drive.

6 0
2 years ago
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
Colleen has been missing a lot of work. She often calls in right as her shift is starting with some excuse about why she
yanalaym [24]
She is not showing honesty
5 0
2 years ago
Read 2 more answers
What educational site could I make a screen capture tutorial on? I need ideas for a school project.
snow_tiger [21]

You Need Software To Screen Capture

The Software You can use is OBS its free and there are watermarks

4 0
2 years ago
In windows, a hamburger is an icon that, when clicked, displays a(n) _____________.
OleMash [197]
In windows, a hamburger is an icon that, when clicked, displays  three parallel horizontal lines. The hamburger button is a graphical shortcut placed typically in a top corner of the graphical user interface. It is used in small devices (smartphones for example) and the idea is to take less space. <span>The hamburger icon was originally designed by </span>Norm Cox<span> </span>
4 0
2 years ago
Other questions:
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • The combination of two or more technologies or data feeds into a single, integrated tool is referred to as a _____.
    7·1 answer
  • Count positive and negative number and compute the average. The program will have the user input an unspecified number of intege
    6·1 answer
  • Which statement describes one drive?
    6·1 answer
  • A recommended cleaner for the bowls of coffee brewers is
    7·1 answer
  • Whats the answer :)?<br>i will give brainslist​
    11·1 answer
  • It is usually simple to delete old posts and online conversations if they make you look bad.
    5·1 answer
  • What form of contacts can be shared in Outlook 2016?
    9·2 answers
  • How does social network use message to entertain?
    14·1 answer
  • Which device allows users to directly hear data from a computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!