Write a Python program in which a student enters the number of college credits earned. If the number of credits is greater than 90, 'Senior Status' is displayed; if greater than 60, 'Junior Status' is displayed; if greater than 30, 'Sophomore Status' is displayed; else, 'Freshman Status' is displayed.

Answers

Answer 1

Answer:

CONCEPT:Python code to get the status of Student based on thier Earnings CODE: def main(): print('Student Classification Software.') try: userCredit =int( input('\nPlease enter student credits: ')) if userCredit >90: print('\nSenior Status') elif 60 <userCredit <90 : print('\nJunior Status') elif 30 < userCredit < 60: print('\nSophomore Status') else: # this mean userCredit >= 26...

Explanation:

A certain university classifies students according to credits earned. A student with less than 30 hours is a Freshman. At least 30 credits are required to be a Sophomore, 60 to be a Junior, and 90 to be a Senior. Write a program that calculates class standing from the number of credits earned with the following specifications:

Write a function named determineStatus() that prompts the user for how many credits they have earned and uses a decision structure (if, else, etc.) to determine the class standing of the student. The function should display the standing to the student (85 points).

If the user tries to enter a negative value, the program should alert the user that negative numbers are not allowed (5 points).

Write a main() function that calls the determineStatus() function (5 points).


Related Questions

Please help me ASAP!!

In Python, year = 2018 is known as a(n):

O conditional expression.
Otest case.
Oassignment statement.
O declarative indicator.

Answers

Answer:

assignment statement

Explanation:

it is assigning the number 2018 to variable called year

it is NOT checking to see if it was true (then it would be ==

Explain how AI smartphone software in the rental car can be a threat to privacy.



Answer and I will give you brainiliest ​

Answers

Answer:

The real reason why AI smartphone software in the rental car is threat to privacy is that the data transmitted can actually be exposed to security breaches in the software and so if that happens, the car is no longer under the control of the user.

Hope this helps!

List 2 positive impacts of cybersecurity.




**Answer and I will give you brainiliest**​

Answers

Answer:

Protection for your business and Increased productivity

Explanation:

This is because it ensures your employees aren't at risk from potential threats and, since there no virus, the computers will work well (not slow down)

Please please help I don’t understand this

Answers

Answer:yes because ye and yes

Explanation:

Yes because yss

Answer:

Yes and yes

Explanation:

It is this because yes

Most people have unexpected expenses at some time. Yes. No.

Answers

Answer:

Yes

Explanation:

BRAINLIEST!!!!!!!!!!!!!!

Which of the following options in Backstage View should be selected if you want to open a new, blank document?

○ Share
○ Open
○ Export
○ New​

Answers

Answer:

New

Explanation:

open just makes you open the last project you were working on, new makes a brand new one.

When you wish to start afresh with a blank document, select new choices in Backstage Views.

Backstage View:

Opening simply opens the last project you were operating on, whereas new creates a whole new one.

This backstage view aids in the creation of new documents, as well as the saving, viewing, printing, and publishing of existing ones.

If you already have a document open, a window will pop up with data on the file, as shown below.

Therefore, the final answer is "New".

Find out more information about the View here:

brainly.com/question/14934880

You must configure a certificate authority on your network to use EFS. True or False?
a. True
b. False

Answers

You do not need to configure a certificate authority on your network to use EFS.

EFS is the short form for Encryption File System. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using logon authentication and NTFS file permissions), EFS allows to add another layer of security to data.

To encrypt and decrypt data files and folders in EFS, a certificate authority (CA) could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, EFS will generate its own certificate if none does not exist.

The following are other things to note about EFS

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: https://brainly.com/question/10410730

_________is a type of bullying that occurs when a person continuously pursues another and gives
unwanted attention

Answers

Answer:

stalking ?

Explanation:

Answer:

stalking

Explanation:

Question 5 / 15
What does clicking and dragging the fill handle indicated by the cursor below do?
077
Х
✓ fx
=0.08*B77
B.
с
76
Sales
Tax
77
$794
$64
78
$721
79
$854
80
$912
81
$1,020

Answers

Answer:

$1,020 that is my answer because it will be that one

The value that would be returned based on the formula [=COUNTIF(A43:A47, "NP*")] in cell A49 is 4.

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., so as to avail its end users the ability to analyze and visualize spreadsheet documents.

In Microsoft Excel, there are different types of functions (predefined formulas) and these include:

Sum functionAverage functionMinimum functionMaximum functionCount function

A count function is typically used to to calculate the number of entries in a cell or number field that meets a specific (predefined) value set by an end user.

In this scenario, "NP*" is the specific (predefined) value that was set and as such the value that would be returned based on the formula in cell A49 is 4 because A43, A44, A45 and A46 contain the value "NP."

Read more on Excel formula here: https://brainly.com/question/25219289

QUESTION 8
A
is a vertical group of cells in a worksheet.
Column
Row
Value
Formula

Answers

I believe that the answer is column.

List 2 negative impacts of cybersecurity.



Answer and I will give you brainiliest ​

Answers

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

Give me some information about Shakira because I need to do a project

Answers

Answer:Summary : She's a Columbian pop singer who's sold more than 70 million albums sold worldwide. Her best known songs are "Hips Don't Lie" and " Whenever, Where ever".

Explanation: Born on February 2, 1977 in Barranquilla, Colombia. Her full name is Shakira Isabel Merabarak Ripoll. She wrote her first song on May 11, 1985. On October 1st she had her first successful album. On September 21, 1998 her album was sold worldwide

Answer:

Shakira's hips don't lie.

You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps.

How should you implement this without storing the customers' credentials on the BuyMe server?

a. Use RADIUS authentication
b. Use Using Kerberos authentication
c. Use TACACS+
d. Use SAML

Answers

Answer:

Use TACACS+. IT IS THE BEST

Explanation:

IT IS THE BEST

Answer: Use SAML

Explanation:

How to write a C++ program that allows a user to enter their rating of the three movies in the Dark Knight Trilogy and then display each rating entered, the highest rating, the lowest rating, and the average of the ratings??

Answers

The program is an illustration of arrays.

Arrays are used to hold multiple values in one variable.

The program in C++ where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

int main(){

   //This declares an array of three elements for the three ratings

   int ratings[3];

   //This initializes the sum of the ratings to 0

   int total = 0;

   //The following iteration gets input for the three ratings

   for(int i = 0; i<3;i++){

       cin>>ratings[i];

       //This calculates the sum of all inputs

       total+=ratings[i];

   }

   //This declares and initializes the lowest and the highest ratings

   int lowest = ratings[0], highest = ratings[0];

   //This iterates through the array

   for(int i = 1; i<3;i++){

       //The following if condition determines the lowest rating

       if (lowest > ratings[i]){    lowest = ratings[i];        }

       //The following if condition determines the highest rating

       if (highest < ratings[i]){            highest = ratings[i];        }

   }

   //This prints the output header

   cout<<"The ratings are: ";

   //The following iteration prints the three ratings

   for(int i = 0; i<3;i++){

       cout<<ratings[i]<<" ";   }

   //The prints the highest ratings

cout<<endl<<"Highest: "<<highest<<endl;

   //The prints the lowest rating

   cout<<"Lowest: "<<lowest<<endl;

   //The prints the average rating

cout<<"Average: "<<total/3<<endl;

   return 0;

}

At the end of the program, the ratings entered, the highest rating, the lowest rating, and the average of the ratings are printed.

See attachment for sample run

Read more about similar programs at:

https://brainly.com/question/13261254

When people become more dependent on digital technology in their lives, the potential for data misuse will grow. Explain the above sentence in your opinion.




**Answer and I will give you brainiliest**​

Answers

Answer:

yest that's correct.

Explanation:

for example we can see Artificial intelligence/AI the more it becomes super computer the future of human existence will be in jeopardy like in the movie Terminator.

some people will become lazy and don't use their brain for anything

if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?

Answers

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake. TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functionalWith TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

https://brainly.com/question/14739766

Project light with a system of lenses used for projecting slides or film into a screen.

Answers

Answer:

Optical system. An overhead projector works on the same principle as a slide projector, in which a focusing lens projects light from an illuminated slide onto a projection screen where a real image is formed.

Explanation:

cuantos días tiene un año

Answers

Answer: 365 dias

Explanation:

Give one of user responsibility of the internet you should follow in cyberethics.






**Answer and I will give you brainiliest**​

Answers

Answer:

One of the user responsibility is to use appropriate language when talking to others, mind you behavior and make sure to stay out of trouble, like hacking someone computer without permission and never send any malware to anyone without consent of the user.

Pls help me to answer this question ASAP

Answers

It’s about yourself. Answer the questions on how you’ve been experiencing them in your life

#2 i
Write -0.312 as a fraction in simplest form.
-0.312 =
-
What’s the answer

Answers

Answer: 39/125

Explanation:

which of the following statements describes the general idea of an assistive media​

Pasagot po plssss

Answers

Answer:

What statmentssssssssss

The general idea of assistive media is described by C) Technology or tools designed to aid individuals with disabilities in accessing information and interacting with the world.

We have,

Assistive media refers to various technologies or tools that are specifically developed to assist people with disabilities.

These tools are designed to enhance their ability to access information, communicate effectively, and interact with their environment.

Assistive media can take many forms, such as screen readers for individuals with visual impairments, communication devices for those with speech disabilities, adaptive keyboards or switches for individuals with motor impairments, and more.

The main purpose of assistive media is to level the playing field and provide individuals with disabilities the means to participate fully in various aspects of life, including education, communication, work, and social interactions.

Thus,

The general idea of assistive media is described by C) Technology or tools designed to aid individuals with disabilities in accessing information and interacting with the world.

Learn more about assistive media here:

https://brainly.com/question/29891210

#SPJ3

The complete question:

Which of the following best describes the concept of assistive media?

A) A form of social media that helps people connect with friends and family.

B) A type of entertainment media, such as movies or music.

C) Technology or tools designed to aid individuals with disabilities in accessing information and interacting with the world.

D) Media coverage of events and news happening globally.

The code below the directions is all I have gotten so far would love any help to solve this thanks.

Answers

Answer:

variable = input("Enter some text: ")

midIndex = (len(variable) // 2)  

midFix = variable[midIndex-1:midIndex+2]

print('Length is:', len(variable))

print('Middle index is:', midIndex)

print('Midfix of 3 is:', midFix)

Explanation:

You will want to do integer division here (//)

Also, keep in mind that the very first character of the string has index 0, which is why the midFix runs from  midIndex-1 to midIndex+2

PLZ HELP I WILL GIVE BRAINLYEST

Answers

system and application

Answer:

software program and application software

in that order

Type the correct answer in the box. Spell all words correctly. Karen is a famous hair stylist in New York and caters to big names. A few weeks ago, two hair stylists from South East Asia joined her team. They are shy by nature and hardly communicate with the rest of the members in Karen's team. Which strategy might Karen use to ensure people from minority backgrounds open up and contribute to group communications? Karen might use the strategy to encourage people from minority backgrounds to contribute to group communications​

Answers

Answer: To open them up emotoinally from a personal level then build up to group disscosiuns or counseling

Explanation:

Answer:

inclusion strategy

Explanation:

i got it right on plato

what type of information system would more be likely to be used by schools?
commercial
scientific data processing
information retrieval and management
automation

Answers

Answer:

probably

informaition retreival

Explanation:

What type of classroom enable students to attend lectures without being physically present with the teacher?

Answers

The answer is online learning since the virus happens alot of schools have been swtiching to online learning. It doesn't require anyone to be pychically present in class and there alot of platforms to do online learning.

Research on a latest advancement in computing and discuss its potential or how will it impact our lives in the future

Answers

Answer:

hqiauahhwbbwbwbbssbbs

9. These particular machines can be decentralized.

A) Risograph
B) Photocopier
C) Desktop computer
D) Printers

__and__??

Answers

Answer:

A, B

Explanation:

Because the desktop computer and the printers are decentralized, they're connected with another noce in a company.. So I suppose that the Risograph and photocopier isn't decentralized.

Which of the following is the first step to writing an algorithm?
making a plan
carrying out a plan
extending the problem
understanding the problem

Answers

Answer:

Making a plan

Explanation:

Usually you will get stuck on some problems while making an algorithm, so you should make a plan to push forward more easier.

Answer: understanding the problem

Explanation:

Because you have to understand the problem before making a plan

Other Questions
what is kinetic enegry Please help me with these questions please An advertisement shows a 1239 kg car slowly pulling at constant speed a large passenger airplane to demonstrate the power ofits newly designed 85.7 hp (horsepower) engine. During the pull, the car passes two landmarks spaced 26.0 m apart in 14.3 s.The passenger plane being towed is a Boeing 707 with a total weight of 62.5 tons.Calculate the force that opposes the motion. Assume that the efficiency of the car is such that 15.4% of the engine power isavailable to propel the car forward.How much work is performed by the car on the airplane during this time? How much work is performed by the airplane on the car during this time? Nu nhng thnh tu v khoa hc t nhin x hi vn hc th k XIX -XX? Cn tr li gp!!! T-T Slopes, and y-Intercepts: Mastery TestHere's a graph of a linear function. Write theequation that describes that function.8Express it in slope-intercept form.6Enter the correct answer.OOODONEClear all+1?-8-6686 no need to answer correctly just say 2 Points :) 1+1=:Have a good::day: What's 100 x 2000 x 2 x 1.45 x 5 x 7 x 78345 x 0? identify the statements that were true of democracy in the eighteenth-century context. pls help asap asap!!!need an answer now! 25 points Graph the equation by translating y = |x| y = |x+2Please use the graph 9. Based on the text, why is the U.S. Constitution important? If you can do something fast and with strength, you have balance.A. TrueB. False why are astronauts weightless in the space station? what part of the brain is responsible for thirst and hunger easy ratio questions !! - giving brainly if correct and both questions are answered :) question in the file ^ why did early humans begin to set up permanent villages? A. they had to protect themselves from flooding rivers. B. they started to farm crops for the first time C. They could no longer find animals to hunt for food. D. they were unable to gather plants due to changing weather helpppppppppppppppppppppppppppppp meeeeeeeeeeeeeeeeeee plsssssssssssssssssssssss there is more but plss help mee Organelles that are surrounded by two membranes and contain DNA are thea nucleus, the endoplasmic reticulum, and lysosomes.b. nucleus, the endoplasmic reticulum, and chloroplasts.c. nucleus and mitochondria.d. endoplasmic reticulum and the Golgi apparatus. from the illustration of the potassium atom fill in the periodic table selection The table gives the supply and demand schedules in a market for apartments. A government price control is implemented that results in a shortage of 300,000apartments. Which price control must have been used?(1 point)O a price floor of $2,000O a price floor of $1,000O a price ceiling of $1,000O a price ceiling of $2,000