Questions
This program will determine the letter grade for a student. It will ask for scores (could...

This program will determine the letter grade for a student. It will ask for scores (could be labs, activities, quizzes, or projects) and then display some basic statistics derived from the scores.

In Python, Write a program that continuously asks for a non-negative score until the user enters -1. IF the user enters a valid score ask for the possible score for that assignment, we will not assume all scores will have the same maximum value. We will assume that no one will receive a score of 0 on any assignment IF anything it is actually turned in, meaning a score of 0 indicates that the score was not turned it. It’s still the score for the assignment, but this fact will be used later in the assignment. Once all of the scores have been entered display the following information:

• Total number of scores entered. • Total points for the student. • Total number of possible points • Class percentage, with 2 decimal place. • Letter grade using the 90, 80, 70, 60 grading scale. • If we believe the student has dropped. We will assume this is true if ALL of the entered scores are 0 (indicating that nothing was turned it). • If all of the scores were turned in or if the student is missing at least one score

In: Computer Science

Provide a number of examples(both positive and negative) that indicate the impact of software on our...

Provide a number of examples(both positive and negative) that indicate the impact of software on our society?

In: Computer Science

I WANT THIS CODE TO BE SIMPLE BECAUSE I AM NEW TO CODING AND I WANT...

I WANT THIS CODE TO BE SIMPLE BECAUSE I AM NEW TO CODING AND I WANT TO KNOW THE DETAILS! straight C Program. write a quiz game where a number of questions are asked and the user will win each time he answers right. and he loses each time he answers wrong.

the type of questions asked can be about sports or anything else. You can put 5 quiz questions.

It should only include the following: #include <stdio.h> and #include <stdlib.h>

because it is a simple code.

In: Computer Science

Software vulnerabilities in cyberspace can range from the simple outdated security patches on national critical infrastructure...

Software vulnerabilities in cyberspace can range from the simple outdated security patches on national critical infrastructure systems to poorly designed defense missile control systems. When these industrial control systems, military weapon control systems, or air control transportation systems are designed without security built into the software, their security vulnerabilities are paramount to the national security, economy, and human health.

Do research on the latest prominent software vulnerabilities and share your literature review findings with the class.

In: Computer Science

1. What type of commands can you issue through the command line process? Start-> IBM DB2COPY1...

1. What type of commands can you issue through the command line process?

Start-> IBM DB2COPY1 (Default) -> DB2 Command Line Processor

In: Computer Science

how to read a csv file in php not using fgetscsv or fgets. Just using file("Stores.csv");...

how to read a csv file in php not using fgetscsv or fgets. Just using file("Stores.csv"); or fopen("Stores.csv", "r"); and making into a html table? It print but it keeps saying Notice: Undefined offset: , Notice: Undefined offset: 2, etc at the top.

Acme,Walmart,Ross,BJs,Target,Marshalls,Foot Locker,Giant,Charming Charlie

142,160,28,10,5,3,60,0.28,3167

175,180,18,8,4,1,12,0.43,4033

129,132,13,6,3,1,41,0.33,1471

138,140,17,7,3,1,22,0.46,3204

232,240,25,8,4,3,5,2.05,3613

135,140,18,7,4,3,9,0.57,3028

150,160,20,8,4,3,18,4.00,3131

207,225,22,8,4,2,16,2.22,5158

271,285,30,10,5,2,30,0.53,5702

89,90,10,5,3,1,43,0.30,2054

153,157,22,8,3,3,18,0.38,4127

87,90,16,7,3,1,50,0.65,1445

234,238,25,8,4,2,2,1.61,2087

106,116,20,8,4,1,13,0.22,2818

175,180,22,8,4,2,15,2.06,3917

165,170,17,8,4,2,33,0.46,2220

166,170,23,9,4,2,37,0.27,3498

136,140,19,7,3,1,22,0.63,3607

148,160,17,7,3,2,13,0.36,3648

151,153,19,8,4,2,24,0.34,3561

180,190,24,9,4,2,10,1.55,4681

293,305,26,8,4,3,6,0.46,7088

167,170,20,9,4,2,46,0.46,3482

190,193,22,9,5,2,37,0.48,3920

184,190,21,9,5,2,27,1.30,4162

157,165,20,8,4,2,7,0.30,3785

110,115,16,8,4,1,26,0.29,3103

135,145,18,7,4,1,35,0.43,3363

567,625,64,11,4,4,4,0.85,12192

180,185,20,8,4,2,11,1.00,3831

183,188,17,7,3,2,16,3.00,3564

185,193,20,9,3,2,56,6.49,3765

152,155,17,8,4,1,33,0.70,3361

148,153,13,6,3,2,22,0.39,3950

152,159,15,7,3,1,25,0.59,3055

146,150,16,7,3,1,31,0.36,2950

170,190,24,10,3,2,33,0.57,3346

127,130,20,8,4,1,65,0.40,3334

265,270,36,10,6,3,33,1.20,5853

157,163,18,8,4,2,12,1.13,3982

128,135,17,9,4,1,25,0.52,3374

110,120,15,8,4,2,11,0.59,3119

123,130,18,8,4,2,43,0.39,3268

212,230,39,12,5,3,202,4.29,3648

145,145,18,8,4,2,44,0.22,2783

129,135,10,6,3,1,15,1.00,2438

143,145,21,7,4,2,10,1.20,3529

247,252,29,9,4,2,4,1.25,4626

111,120,15,8,3,1,97,1.11,3205

133,145,26,7,3,1,42,0.36,3059

<!DOCTYPE html>

<html>

<head>

<meta charset="utf-8">

<!-- title for web page -->

<title>Stores</title>

<link rel="stylesheet" href="style.css">

</head>

<body>

<h1>Stores</h1>

<table>

<?php

$Stores = file("homes.csv");

foreach($Stores as $key => $data) {

$Stores[$key] = explode(",", $data);

}

foreach($Stores as $key => $data)

print "".$Homes[$key][0]. "";

print "".$Homes[$key][1]. "";

print "".$Homes[$key][2]. "";

print "".$Homes[$key][3]. "";

print "".$Homes[$key][4]. "";

print "".$Homes[$key][5]. "";

print "".$Homes[$key][6]. "";

print "".$Homes[$key][7]. "";

print "".$Homes[$key][8]. "";

print "";

}

print "";

?>

In: Computer Science

Discuss an IT-related system that could be adopted at AIT to eliminate impersonation during exams, indicating...

Discuss an IT-related system that could be adopted at AIT to eliminate impersonation during exams, indicating where it would be located/placed and how each component of the system functions. .

In: Computer Science

What are the most effective problem-solving techniques available to software engineers today, and how do they...

What are the most effective problem-solving techniques available to software engineers today, and how do they facilitate the software engineering process? Please provide examples and explain who the main stakeholders are and what their responsibilities in the software engineering process are.

In: Computer Science

Discuss the content (type of data and files) of a database which could be useful at...

Discuss the content (type of data and files) of a database which could be useful at Accra Institute Technology(AIT).

In: Computer Science

In the simplex algorithm can you have a degenerate pivot without cycling occuring? I know that...

In the simplex algorithm can you have a degenerate pivot without cycling occuring? I know that Bland's rule prevents cycling but what about degenrate pivots? Or are degenerate pivots the same as cycling?

Also, when a variables leaves the tableau im assuming it cant come back the tableau for bland's?

In: Computer Science

What are the pattern elements for the Facade Design Pattern?

What are the pattern elements for the Facade Design Pattern?

In: Computer Science

Articles which explain the importance of information security in achieving organisational goals and objectives

Articles which explain the importance of information security in achieving organisational goals and objectives

In: Computer Science

Recall from Homework 2 that you are the chief robot designer for U.S. Robots and Mechanical...

Recall from Homework 2 that you are the chief robot designer for U.S. Robots and Mechanical Men, Inc., and you are working on designs for the following robots:

(a) A delivery robot that will carry supplies to different departments in a hospital.

(b) A supply robot that will carry heavy loads across loose soil and sand.

(c) A security robot that has to secure a wooded, hilly, area.

(d) A butler robot that will greet guests in a home and bring them drinks.

For each robot, describe what sensors you will equip it with, justifying your choices. Remember that, despite its monopoly, U.S. Robots and Mechanical Men, Inc. is a business, so you need to think carefully about the cost/benefit ratio of the sensors

In: Computer Science

Use 2012SERVERA VM. Depending on whether you want to change the security of a single system...

  1. Use 2012SERVERA VM.
  2. Depending on whether you want to change the security of a single system or multiple systems, use the Start screen and type either Local Security Policy or Group Policy to launch the appropriate tool. If you are on a server, you can also use the Tools menu in Server Manager to launch the appropriate tool:

• Local Security Policies Use Local Security Policy to administer security settings of a single Windows machine (either client or server).

    1. Group Policy Management Console Use the Group Policy Management Console to administer policies on the network that apply to multiple systems.
  1. In the Start screen, type Local and then launch the Local Security Policy.
  2. Under Security Settings (on the left), expand Local Policies and then select User Rights Assignment.
  3. To allow the Authors group to back up files, double-click the “Back up files and directories” policy at right. List who currently has the right to do backups: _____________________________________________________________________ _____________________________________________________________________
  4. Click the “Add User or Group” button and add Authors to the list of those who can do backups.
  5. Choose OK and then close the policies window.

Please provide step by step screen shots so I can see how it is done, and i will try it on my side.

Thank you

In: Computer Science

Normalization This is a Database Development problem.  Go through all the steps and process of normalization. Do...

Normalization

This is a Database Development problem.  Go through all the steps and process of normalization. Do normalization/dependency diagram FIRST. Then create a dependency diagram normalizing the following business rules to 3NF. Once normalized, create an accurate Entity Relationship Diagram. (ERD)

Business Scenario: You have been hired by a law firm to create a database that keeps track of the specific areas of law that each of their attorneys currently practice and their current caseload.

Business Rules:

1. An attorney can practice any area of law once he/she is admitted to their state’s Bar Association. However, most attorneys specialize in specific areas of law.

2. Our law firm is organized into departments based on the types of cases we receive in the areas of labor law, family law, and personal injury law.

3. Within these main departments, attorneys have specializations. For example, we have some attorneys who only handle worker’s compensation cases in our labor law area.

4. An attorney can only accept cases in their currently assigned department.

5. A client can have many open cases with our law firm at any one time.

6. Each client’s case is assigned to an attorney who specializes in that case’s form of law

In: Computer Science