Python program to display the mark report. If mark is above 90 Graded A+ If mark is between 80 and 90 Graded A If mark is between 60 and 79 Graded B If mark is less than 59 display Practice well

Answers

Answer 1

Answer:

grade = int(input("Enter grade: "))

if grade>90:

print("A+")

elif grade<90 and grade>80:

print("A")

elif grade>60 and grade<79:

print("B")

elif grade<59:

print("Practice well")


Related Questions

Write a qbasic program to convert distance from kilometer to miles​

Answers

Answer:

INPUT “Enter Distance into Kilometers”; km m = km * 1000 miles = km / 1.6 PRINT km ” Kilometers = “; m; ” meters “; PRINT km ” kilometers = “; miles; ” miles”;

Explanation:

A ____ can be used to prevent a user program from never returning control to the operating system. A) portal B) program counter C) firewall D) timer

Answers

Answer:

timer

Explanation:

If the range_lookup argument to the VLOOKUP function is set to TRUE, then the leftmost column of the table_array argument must be in ascending order.Group of answer choicesTrueFalse

Answers

In Microsoft Excel, the leftmost column of the table_array argument must be in an ascending order when the range_lookup argument to the VLOOKUP function is set to TRUE.

What is VLOOKUP function?

A VLOOKUP function can be defined as a type of function that is typically used to look up a value in a specific column in Microsoft Excel.

In Microsoft Excel, the leftmost column of the table_array argument must be in an ascending order when the range_lookup argument to the VLOOKUP function is set to TRUE.

This ultimately implies that, you have to sort the leftmost column of the table_array argument in an ascending order (a through z), in order to get the right results when the range_lookup argument to the VLOOKUP function is set to TRUE.

Read more on VLOOKUP here: https://brainly.com/question/16986179

Why might you want to collect multiple items in the Office Clipboard?

Answers

Answer:

So you have more items to work with.

Explanation:

Why might you use the More button in the Find and Replace dialog box?

Answers

Answer:

Use the More button to display more options to help narrow the search criteria.

Explanation:

I think hope this helps you!!

Match the terms related to the web with their explanations.

Answers

Answer:

1.) SMTP

2.) HTTP

3.) FTP

4.) AND

Explanation:

YOU'RE WELCOME :)

It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.

A. internet addresses that have.edu such as, si.edu (Smithsonian Institute)

B. internet addresses that have.gov extensions such as, kids.gov (US government)

C. internet addresses that have.com extensions, like wikis and blogs

D. any internet search results are appropriate

Answers

Answer:

I would go with A and B.

Explanation:

The .edu extension means that the information has been verified by educational institutions and most of the time even run by them. This is why it's good to trust sites with the .edu extension.

Similarly, .gov is run by government organizations so not just anyone can upload or edit content. Governments surely fact-check their information before uploading it to their website so they are trustworthy sources.

I would do A and B as well

Hope this helps!!

The processor itself provides only limited support for multiprogramming, and __________ is needed to manage the sharing of the processor and other resources by multiple applications at the same time.

Answers

Answer:

The answer is C. software

Explanation:

Julianna wants to put data inside a variable. Which symbol should be used?

A. =
B. ()
C. <>
D. +

Answers

Answer:

B

Explanation:

When writing a variable if you want to add something you have to use ().

5. An external CSS file is saved with D. Answer the following questions. 1. Explain the purpose and advantages of using CSS.​

Answers

When you create a single, simple web page, you can tag each item (such as a heading or a paragraph) with whatever font, size, color, and so on that you like. It's simple HTML.

If someone then asks, "Can we use a different font for the headings?" it's a 10-minute edit.

But when you have a site with a thousand pages of corporate content and your boss arrives to tell you that head-office has determined that the "corporate style" of such-and-such font must be applied to every web page...

Then you'll have a week's worth of work ahead of you.

When they tell you that the web page must utilize a different font and color in India than the rest of the world...

You're dealing with a nightmare.

CSS takes all of the scattered formatting and layout information from the real documents and centralizes it into "style sheets."

Now, if all of your web pages are constructed correctly with CSS, you can change the font, color, size, or anything else - possibly the entire look and feel of your website - with a single-line update in the CSS file.

This concept of separating the "data" from the "presentation style" is quite powerful...

Even on a small website, there is justification in doing so.

Three ways travellers should be considerate towards othe travellers when using public transport

Answers

hi

Let passengers exit before boarding

Don't block the aisles or the doors.

Put your bag or backpack in your lap or under your seat.

Hope this helps

scav

The author included this information most likely to – A) summarize the experimentation process scientists used B) Show the pride the scientists have in their work C) Encourage others to get involved in computer sciences D) Illustrate the flaws in the scientists’ logic.

Answers

The author included this information most likely to: C. Encourage others to get involved in computer sciences.

Who is an author?

An author is also referred to as a writer and can be defined as an individual who expresses his or her thoughts about a particular subject (topic) in writing.

This ultimately implies that, an author is saddled with the responsibility of putting written information across to his or her audience, so as to either enlighten, inform, encourage, persuade, or convince them.

In this scenario, the author included this information most likely to encourage others to get involved in computer sciences.

Read more on an author here: https://brainly.com/question/25857058

The major carriers of network traffic are known collectively as the internet ______.

Answers

Answer:

Backbone.

Explanation:

The major carriers of network traffic are known collectively as the internet backbone.

What key is in the upper-left corner of the keyboard?? ​

Answers

AnswertabAnswer:

(ESC) Escape

Explanation:

The function of this keyboard key is to escape the current t view or mouse inversion you are on, or it could be used as a keyboard shortcut when used with other keys.

In the Information technology arena, information is important based on your role and perspective. Based on the ISM role what is the most important factor concerning data retention

Answers

The most important factors concerning data retention include availability/storage of media, regulatory and/or business needs,  and confidentiality of data. It is fundamental for Informix Storage Manager.

Informix Storage Manager (ISM) and data storage

Informix Storage Manager (ISM) can deliver efficient storage of data and other management services

Informix Storage Manager functions in the International Business Machines (IBM) Informix database server.

IBM Informix is a service of IBM's Information Management part focused on delivering database management systems.

Learn more about IBM Informix here:

https://brainly.com/question/6447559

What is printed as a result of executing the code segment if the code segment is the first use of a SomeClass object

Answers

Code segments are codes taken out from a more complete code or program

The result of executing the code segment would print 14

How to determine the result

To determine the result, we simply run the program as follows:

public class SomeClass{

private int x = 0;

private static int y = 0;

public SomeClass (int pX){

x = pX;y++;

}

public void incrementY (){

y++;

}

public void incrementY (int inc){

y+= inc;

}

public int getY(){

return y;

}

public static void main (String [] args){

SomeClass first = new SomeClass (10);

SomeClass second = new SomeClass (20);

SomeClass third = new SomeClass (30);

first.incrementY();

second.incrementY(10);

System.out.println(third.getY());

}

}

The result of running the above program is 14

Hence, the result of executing the code segment would print 14

Read more about code segments at:

https://brainly.com/question/25781514

A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization.
a) untrusted; trusted
b) trusted; trusted untrusted;
c) untrusted trusted; untrusted

Answers

Answer:

b trusted,untrusted

Explanation:

List the various autofill option present in excel. Write the use of copy cell and fill formatting only option in filter.

Answers

Insert empty cells when filling down a series

Autofill multiple rows or columns

Use the AutoFill option to get repeating series

Autofilling horizontally and vertically

Excel - Fill down a series of values that contain text

hope this helps

Burglars can use a code _______________ to duplicate the electronic signal emitted from an automatic garage door opener.

Answers

The code that burglars can use to duplicate the electronic signal is; A Code Grabber

What is a Code Grabber?

Usually when it comes to security, experts in Police and security systems say that burglars use electronic “code grabbers” to record and play back the signal from an automatic garage-door opener that could be a distance of 100 ft away.

Now, the way these code grabbers work is that the grabber will receive and records the code emitted by the fob and then transfer it to a booster, which in turn uses it to trick the car into thinking the key fob is near.

Read more about burglar at; https://brainly.com/question/13186211

If two hosts are connected by five point-to-point networks, how physical links will there be when one host sends a packet to the other host

Answers

The answer is 1 my friend!

have a lovely day :)

You are performing a web application security test, notice that the site is dynamic, and must be using a back-end database. You decide you want to determine if the site is susceptible to an SQL injection. What is the first character that you should attempt to use in breaking a valid SQL request

Answers

The first character that the tester should use to attempt breaking a valid SQL request is: Single quote.

What is SQL?

SQL which full meaning is Structured Query Language is used to manage data in a computer database.

Making use of single quote character  makes it possible for user to easily know whether the site is susceptible to an SQL injection.

Based on this it is important to note single quote which is also know as apostrophe is the first character that you should use in breaking a valid SQL request.

Inconclusion the first character that the tester should use to attempt breaking a valid SQL request is: Single quote.

Learn more about single quote here:https://brainly.com/question/10217528

A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

Answers

worms are the type of malware that can copy/clone it's self hope this helps

scav

10 points + brainliest to first correect answer :) incorrect answers/ answers with no effort will be deleted this is easy im just making sure :)

Which of these is not the correct method for moving text in a document in Word 2016?
Select the text, press Ctrl+C, move the insertion point to desired location, and press Ctrl+V.
Select the text, right-click on the text and select "Cut," move the insertion point to the desired location, and press Ctrl+V.
Select the text, click the Cut button, move the insertion point to the desired location, and click the Paste button.
All the above statements are correct.

Answers

Answer:

The first option is incorrect

Explanation:

With the Control+C method, you copy the text. With the Control+V method, you paste it. You do not remove any of the text and instead create a duplicate

What are the three essential ingredients for a successful implementation of a basic structured cabling network

Answers

A telecommunications serverroom, cabling, work area

List the three words using in programing LOGIC statements

Answers

Answer: If, Than, Else.

Explanation: Programming languages control the flow of a program using logic statements which are a specific form of IF…THEN…ELSE statements.

Programming languages use logic statements, which are a combination of "if", "then," and "else" statements, to regulate the execution of a program.

What are the "if", "then," and "else" statements?

The "if or then" statements, together with its optional "else" clause, only require one statement to be performed for each of the two cases. Multiple statements can be combined together to execute more than one statement using a begin/end Block Statement:

if = (If something is true, do it; otherwise, do something else.)

{ if x < 10 then begin

 x := x+1;

 y := y+1;

end

else}

Even if just one statement is given, a begin/end statement block can be used as an option. This is a typical technique to keep code clean and understandable, as well as to prevent making the usual error of forgetting to add begin/end when later extending a single-line "if or then" statement.

Thus, programming languages use logic statements, which are a combination of "if", "then," and "else" statements, to regulate the execution of a program.

To learn more about the programming languages here :

https://brainly.com/question/11023419

#SPJ1

Which software program allows the user to create Flash presentations in a simplified manner?
A. Blinklist
B. Swish
C. PowerPoint
D. simply​

Answers

Answer: Your answer would be C. PowerPoint.

Hope this helps!

Answer:

B. swish

Explanation:

Took the test

Vulnerability scanners make use of common identifiers to facilitate sharing of intelligence data across different platforms. Currently, a security engineer has an interest in Common Weakness Enumeration (CWE) items. Which area does the engineer study

Answers

Answer: The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs are publicly distributed or sold.

Explanation:

Currently, a security engineer has an interest in Common Weakness Enumeration (CWE) items. The engineer study computer software and programs.

What is CWE?

The Common Weakness Enumeration is a classification scheme for flaws and vulnerabilities in both software as well as hardware.  This is supported by a community effort whose objectives are to comprehend hardware and software defects and develop bots that may be used to find, correct, and eliminate those problems.

The goal of CWE is to make it easier in using methods that could also locate, discover, and fix flaws, exploits, and exposes in computer code even before applications are made available to the general population or sold.

Common identities are used by penetration tests to enable the dissemination of intelligence information throughout many networks.

Learn more about CWE, here:

https://brainly.com/question/24469282

#SPJ5

Examples of 15 viruses in computer
Examples of 15 antiviruses in computer
Please fast​

Answers

Computer Viruses:

Morris Worm
Nimda
ILOVEYOU
SQL Slammer
Stuxnet
CryptoLocker
Conficker
Tinba
Welchia
Shlayer

Anti-viruses:

Esafe
Avast
Avira AntiVirus
e Trust Antivirus
Dr Web by
NOD32
F-Secure Antivirus
AVG Anti-virus
.Kaspersky Antivirus
McAfee Antivirus
eScan
PC-Cillin
Symantec Antivirus

This simple machine can directly utilize the wheel and axle to lift and maneuver heavy loads.

Inclined Plane
Lever
Pulley
Wedge

Answers

The answer is: C - Pulley

Answer:

inclined plane _____________(A)

Complete the code in this program that responds to moving a mouse over a message box.


from tkinter import *

def movingHandler(event):
print("Location: (", event.x, "," , event.y, ")")
return

myWindow = Tk()
message = "Hello."
eventArea = Message(myWindow, text = message)
eventArea.bind('<_______>',movingHandler)
eventArea.pack()
eventArea.mainloop()

Answer choices for the blank:
1. Button-3
2. Button-1
3. Moving
4. Motion

Answers

Code segments are extractions from a more complete program.

The code that completes the program is (4) Motion

How to complete the code

From the question, we understand that the program responds when the mouse is moved over a message box.

This means that, the message box reacts to mouse movement or motion on it.

Hence, the code that completes the program is (4) Motion

Read more about code segments at:

https://brainly.com/question/22654163

Answer:

motion

Explanation:

Other Questions
im doing homework with my little brother and i have no idea what this means, can someone help, quick? In what ways does the U.S. assist in the economic development of foreign countries? Select all thatapply.It helps Americans to establish businesses overseas.It refuses to give money to countries governed by dictators.It helps refugees who are fleeing from a war or a natural disaster.It signs treaties with foreign countries that allow them to trade with the U.S.It educates scientists and engineers who can help their country to industrialize. How many bodies were found during the gabby petito search. Four movie tickets cost $34.00. How much do seven movie tickets cost? Harper Electronics Corp. was forced to pay off the government representative of the foreign country before Harper Electronics was allowed to do business there. Which type of factor affected the company's cost of doing business PLEASE HELP I'LL GIVE BRAINLY AND POINTSSimplify the expression1/5 (-15w - 20) + 1/2 (3 - 4w) A randomly generated list of integers from 0 to 4 is being used to simulate anevent with the numbers 2 and 3 representing a success. What is theestimated probability of a success? 23345 (6789) long division please How did yellow journalism contribute to the start of the Spanish-American War? what is the markdown what was sebastains percent error on his prediction Solve the triangle for which A = 30 , B = 45 , and a = 20 . Round to the nearest whole number. Do not use a decimal point or spaces in your answer or it will be marked incorrect. b = please helppppppppppppppppppppppp True or false: The labor rate variance measures the productivity of direct labor. True false question. True False Why did the Spanish use the mission system in its northern territories? when camping alone , mr adam uses all of the water in 12 days, then when mrs adams and mr adams camp together they use all of the water in storage in 8 days. if mrs adams camps alone in how many days will she use all of the water? in class we r doing a debate we have to side with one thing . smoking or vaping we need a full explication to the answer by 12:00 midnight. Dogs have the ability to hear sounds up to 40,000 hz. If the speed of sound is 340 m/s, what is the most extreme wavelength dogs can detect?. Consider the arithmetic sequence presented in the table below.n 3, 64an 126 3,725Hint: an = a1 + (n - 1), where a is the first term and d is the common difference.Part A: What is the first term, a1, of the sequence? (2 points)Part B: What is the general term equation, an, for this sequence? (1 point)Part C: What is the value of the 13th term of this sequence? (1 point) Which of these is a group of three to four solo jazz musicians who play improvised jazz music?transposingembouchurecombowater key They have built a new hospital near the airport.change this sentence into passive voice