Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that recor the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and th Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20. Assume also the last names and first names do not contain whitespaces. The program performs the following tasks: . Read the file name of the tsv file from the user. • Open the tsv file and read the student information. • Compute the average exam score of each student. • Assign a letter grade to each student based on the average exam score in the following scale: o A: 90=
Q: Does a certain system type that adapts to agile development approaches especially well?
A: What is Software developement: Software development refers to the process of designing, creating,…
Q: Master social media. Cloud computing vs. autonomous computing? These examples show desirable traits.…
A: Social media has become an integral part of our daily lives, and it has revolutionized the way we…
Q: Explain why incremental development is preferable to the waterfall method by giving three concrete…
A: Incremental development and waterfall model are two popular software development methodologies. The…
Q: Make a class named ClassList that stores an arraylist of strings and create an add method that adds…
A: Define a new class called ClassList Declare a private instance variable called stringList of type…
Q: Study social media. Cloud computing's autonomous computing role? They're all perfect instances.…
A: Social media refers to online platforms and tools that enable individuals and organizations to…
Q: Consider your project in light of the article's example and decide whether waterfall is right for…
A: The software development process is often managed using the Waterfall method of project management.…
Q: I would appreciate it if you could cite two instances of arguments that have taken place between…
A: The field of computers is vast and continuously evolving, with new technologies, trends, and issues…
Q: "Multi-factor authentication" refers to the use of two or more different authentication procedures.…
A: The likelihood that hackers will successfully access a stolen account relies on a number of…
Q: In what ways does the waterfall approach differ from other SDLC models in terms of the stages it…
A: An organized procedure known as the Software Development Life Cycle (SDLC) provides the fastest…
Q: Is it possible for me to make a copy of my Linux installation?
A: The answer is given below step.
Q: By using the DJNZ command and indirect addressing, create the data given below to the addresses…
A: The 8051 microcontroller is an 8-bit microcontroller designed in 1980 by Intel for use in embedded…
Q: Explain the advantages of the middleware that the operating system includes. You should also keep a…
A: Middleware connects operating systems and applications. Middleware manages data and communication…
Q: Consider your project in light of the article's example and decide whether waterfall is right for…
A: The Waterfall technique, a type of project management, is frequently used to oversee the software…
Q: What proportion of developing countries now make use of the Internet and technologies based on the…
A: According to the International Telecommunication Union (ITU), by the end of 2020, the global…
Q: Let's have a look at how some of the most popular server operating systems stack up against one…
A: Dear learner, hope you are doing well, I will try my best to to answer this question. Thank you!!
Q: I would appreciate it if you could explain why creating a challenge-response authentication…
A: What is Authentication mechanism: An authentication mechanism is a process or system that verifies…
Q: Why may it be a bad idea for email service providers to go through the messages sent and received by…
A: Our daily routines have become increasingly dependent on email service providers (ESPs), which…
Q: Expansion or new features may result. Provide instances to distinguish the two ideas. How can you…
A: Expanding a project's or product's scope and incorporating new features are the two ideas you…
Q: Do network administrators morally value email security?
A: In this question we have to understand Do network administrators morally value email security? Let's…
Q: Identify web-using industries and the issues they face throughout development, testing, and…
A: Online technology has transformed the way businesses function and created new opportunities for…
Q: Why are emails misconstrued more often? Email may be professional in two ways. Is this another…
A: Email is a widely used form of communication in the modern world, with people from all walks of life…
Q: Learn everything you can about social media. Autonomous cloud computing is opposed despite its…
A: Social media refers to online platforms and applications that enable users to create, share, and…
Q: Compare and contrast the top two server OSes?
A: A server operating system (OS) is designed to operate on a server computer and provide the necessary…
Q: Please provide examples of how calls and returns work together.
A: In programming, a function call is a statement that executes or invokes a function. A function is a…
Q: Whether the cascade technique is right for your project, consider its pros and cons.
A: The waterfall model is the sequential development process where each step of a project is completed…
Q: Can the Internet help programmes in many ways? These services vary significantly.
A: The Internet has made possible a huge number of services that help with programming in different…
Q: You should also define the three basic communication channels that operating systems have with end…
A: Software allows user-hardware communication. It runs many programmes on our machine. One programme…
Q: How may internet tools improve health? What makes telesurgery different from telemedicine?
A: By providing access to medical information and resources, online resources can boost health in…
Q: Explain the many processes involved in acquiring software, including the production of traditional…
A: Acquiring software involves several processes, including selecting the type of software, identifying…
Q: if ("banana") { // 1 } else if ([]) { // 2 } else if ("") { // 3 } else { // 4 } 4. Which block in…
A: We have to explain the given by code and also we have to tell which option is correct.
Q: Use a computer with physical and logical partitions. Some benefits:
A: In computer systems, logical partitions can offer several advantages over physical sections.
Q: When it comes to the software that runs on computers, what are the most significant differences that…
A: Real-time operating systems: An operating system labeled real-time has been developed to react to…
Q: Why are emails misconstrued more often? Email may be professional in two ways. Is this another…
A: E-mail, often known as electronic mail, is a computer programme that allows users to communicate…
Q: What are three advantages of using an incremental development approach rather than a waterfall…
A: The Iterative Waterfall Model is a modified version of the traditional Waterfall Model, which allows…
Q: Operating systems' process execution is uncertain.
A: An operating system is software that controls how a computer uses its hardware components such the…
Q: Design a Turing Machine to accept the language anbn for n≥1. Submit the following: Analysis of the…
A: A Turing Machine (TM) is a mathematical model which consists of an infinite length tape divided into…
Q: Operating systems provide a wide variety of services, and you should detail the three main ways in…
A: Software makes it possible for the person and the hardware of the computer to talk to each other. It…
Q: Email service providers accessing client emails has what drawbacks?
A: Emails are digital messages exchanged and received via computer networks. Email is short for…
Q: Using a straightforward example, please provide a condensed explanation of virtualization as well as…
A: Virtualization has revolutionized the way modern computers work. It allows multiple operating…
Q: Software engineering and quality assurance are vital to your audience.
A: Software Engineering: It is the systematic and disciplined approach to the design, development,…
Q: How may internet tools improve health? What makes telesurgery different from telemedicine?
A: How may internet tools improve health? What makes telesurgery different from telemedicine answer in…
Q: How should Web application components communicate data?
A: In order to deliver a seamless user experience, Web application components are developed to…
Q: Why would viewing a customer's inbox be detrimental to an email service provider?
A: Hello student Greetings Hope you are doing great. Thank You!!!
Q: DMA may boost system concurrency, but how? What inhibits technological progress?
A: Computer systems employ direct memory access (DMA) as an approach of data transmission amongst…
Q: Several things might impact network functioning.
A: Numerous elements, from hardware to software settings, may have an impact on how a network…
Q: Summarize Solaris' advantages over server OSes. ?
A: Solaris: It is based on the Unix operating system. Its reputation for scalability,…
Q: IT pros worry about email encryption ethics?
A: CentOS is an open-source operating system that is based on Red Hat Enterprise Linux. (RHEL). It is…
Q: Study as much as you can about the world of social media. What role does autonomous computing play…
A: Social media has become an integral part of our daily lives, with billions of people around the…
Q: Interrupt vector table entries represent data groups.
A: IVT is a fundamental concept in computer architecture, particularly for microprocessors. It is a…
Q: How may internet tools improve health? What makes telesurgery different from telemedicine?
A: By giving people access to medical information and resources, online resources can improve health in…
Trending now
This is a popular solution!
Step by step
Solved in 4 steps with 3 images
- Write a program that reads student information from a text file, then creates a text file that records the course grades of the students and a final grade. Each row of the .txt file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student, each separated by a space. A sample of the student information is provided in StudentInfo.txt below. Assume the number of students is at least 1 and at most 20. The program performs the following tasks: • Read the file name of the .txt file from the user. • Open the .txt file and read the student information using readline() or readlines(). • Compute the average exam score of each student. • Assign a letter grade to each student based on the average exam score in the following scale: ◦ A: 90 =< x ◦ B: 80 =< x < 90 ◦ C: 70 =< x < 80 ◦ D: 60 =< x < 70 ◦ F: x < 60 • Output the first names, last names, exam scores, and letter…Write a program in Python that reads student information from a text file, then creates a text file that records the course grades of the students and a final grade. Each row of the .txt file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student, each separated by a space. A sample of the student information is provided in StudentInfo.txt below. Assume the number of students is at least 1 and at most 20. The program performs the following tasks: • Read the file name of the .txt file from the user. • Open the .txt file and read the student information using readline() or readlines(). • Compute the average exam score of each student. • Assign a letter grade to each student based on the average exam score in the following scale: ◦ A: 90 =< x ◦ B: 80 =< x < 90 ◦ C: 70 =< x < 80 ◦ D: 60 =< x < 70 ◦ F: x < 60 • Output the first names, last names, exam scores, and letter grades of the students into a text file named…Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20. Assume also the last names and first names do not contain whitespaces. The program performs the following tasks: Read the file name of the tsv file from the user. Open the tsv file and read the student information. Compute the average exam score of each student. Assign a letter grade to each student based on the average exam score in the following scale: A: 90 =< x B: 80 =< x < 90 C: 70 =< x < 80 D: 60 =< x < 70 F: x < 60 Compute the average of each exam. Output the last names, first names, exam scores, and letter grades of the…
- Write a program that reads student data from a file, compute their GPA and writes the results to a different file. 1. The user should have the option to either enter their text file that contains the student grades or use the provided text file that contains theinformation. The data in "indata.txt" should look similar to this, Lara_Croft75 70 91 69 89Chris_Redfield68 88 79 85 94Johnny_Cochran69 98 95 77 80Wanda_Maximoff84 86 98 95 92Luke_Skywalker74 96 80 98 97William_Kurt89 52 99 81 58Samuel_Jackson50 96 50 64 95END_OF_FILE This is supposed to be in python. This is what I have so far. I have no experience I apologise. I am trying to finish the GPA calculating program currently but am having trouble finishing it. grade = input("enter grades")points = 0 if grade is 90-99:total_points = 4.0if grade is 80-89:total_points = 3.0if grade is 70-79:total_points = 2.0if grade is 60-69:total_points = 1.0if grade is 50-59:total_points = 0.0gpa = total_points/len(grade)print(gpa,"is gpa")Write a program that reads the-zen-of-python.txt and writes each line to UpdatedZen.txt, a new text file. It capitalizes the first character of each line and adds a period to the end of each line before writing it back to updatedzen.txt. the-zen-of-python.txt file contents: beautiful is better than ugly explicit is better than implicit simple is better than complex complex is better than complicated flat is better than nested sparse is better than dense readability counts special cases aren't special enough to break the rules although practicality beats purity errors should never pass silently unless explicitly silenced in the face of ambiguity, refuse the temptation to guess there should be one-- and preferably only one --obvious way to do it although that way may not be obvious at first unless you're Dutch now is better than never although never is often better than *right* now if the implementation is hard to explain, it's a bad idea if the implementation is easy to explain, it…Write a program that asks any number of students to enter their final grade and enables you to store these grades into a grades.txt plain text file. Then it reads the grades from the grades.txt file, and displays the individual grades and their count and average.
- consider a program that reads data from a text file called: "klingon-english.txt" (shown below). How would one construct such a program with the following conditions: 1. Ask the user to choose a Klingon consonant they want to practice with. Ask again if the user’s answer is not a valid Klingon consonant, until the user enters a valid consonant. 2. Find a Klingon word that starts with the chosen consonant (the text file contains only one word that starts with any given consonant, so you don’t need to use the random library) 3. Ask the user to translate the chosen word into Klingon 4. Print "Correct" if the user’s answer is correct 5. Print "Sorry, you’re wrong!" if the user’s answer is wrong 6. Print The correct answer is ... if all three user’s answers are wrong You will also factor in this version: 7. If the answer is incorrect, show the first hint: the first and last characters of the correct Klingon word. When showing a hint, replace all other characters with a star (*) 8. If the…After every word on a line is spellchecked, it should be written to an output file called checked.txt. The arrangement of words on lines should be the same in the document and in checked.txt. The difference between the document and checked.txt is that in checked.txt each word is in lowercase and there is no punctuation. Also, some words might be changed by the spellcheck process. For example, suppose the document contains the following: The Hunter Moon waxed round in the night sky, and put to flight all the lesser stars. But low in the South one star shone red. Then checked.txt will contain: the hunter moon waxed round in the night sky and put to flight all the lesser stars but low in the south one star shone red (In a real spellchecker, the output will be in the same case as the original, and all punctuation will be retained. For simplicity, we will not worry about case and punctuation.) How to Process Words Which Are Not in the Dictionary The spellcheck method also needs to handle…Write a program that receives a filename as user input. The file is structured as multiple lines containing numbers separated by a single space.For example, this would be an acceptable file: 1 2 3 4 5 6 7 2 Your program should open this file and: print all its contents; write the median of all numbers to a new file called result.txt. IMPORTANT NOTES: the median is the element in the middle when you sort the values; the median of values (2, 1, 3) is 2, because when you sort them, you get 1, 2, 3, and 2 is the value in the middle. you can assume there will be no empty lines; there might be any arbitrary number lines in the file; there might be any arbitrary number of elements in a single line; you can assume there will always be an odd number of elements. Example 1: If input is: file1.txt and the contents of file1.txt are: 1 2 2 you should first print the content, and then write 2 to result.txt. Example 2: If input is: file2.txt and the contents of file2.txt are: 1 2 3 4 5 1 7 you…
- Suppose you have a file Monster.txt that lists the Monster Energy Drinks the company offers, on one line and the price for a case of 24, with the customer ratings on a scale of 1-5 on the second line. The following shows the first few lines of the file: Monster Energy Nitro Super Dry Maximum Strength Drink 39.99 4.5 Monster Energy Ultra Red, Sugar Free Energy Drink 39.99 5 Red Bull Energy Drink, Zero 92.23 4.5 Red Bull Energy Drink, Coconut Berry 41.18 5 Monster Energy Juice, Pipeline Punch 34.98 5 Red Bull Energy Drink, Coconut Berry 41.18 5 The first line means the drink name is: Monster Energy Nitro Super Dry Maximum Strength and the second line means that a case of 24 cost $39.99 and it was rated 4.5/5. NOTE: WE DO NOT KNOW HOW MANY LINES THERE ARE IN THE FILE. Write the C++ program (with comments) that reads the data from the file, lists only those drinks rated 5 stars, and indicates if the five star drink comes with a free six pack or not.The customer gets a free six…Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number and display whether it is valid. An account number is valid only if the last digit is equal to the remainder when the sum of the first five digits is divided by 10. For example, the number 223355 is valid because the sum of the first five digits is 15, the remainder when 15 is divided by 10 is 5, and the last digit is 5. Write only valid account numbers to an output file, each on its own line.*Note that the contents of the file AcctNumsIn.txt will change when the test is run to test the program against different input. AcctNumsIn.txt 345619789400871208901156984334723422172257100000273699237485761200555500936716763542999995 import java.nio.file.*;import java.io.*;import java.nio.channels.FileChannel;import java.nio.ByteBuffer;import static java.nio.file.StandardOpenOption.*;public class ValidateCheckDigits {public static void main(String[] args) {Path…Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number and display whether it is valid. An account number is valid only if the last digit is equal to the remainder when the sum of the first five digits is divided by 10. For example, the number 223355 is valid because the sum of the first five digits is 15, the remainder when 15 is divided by 10 is 5, and the last digit is 5. Write only valid account numbers to an output file, each on its own line.*Note that the contents of the file AcctNumsIn.txt will change when the test is run to test the program against different input. AcctNumsIn.txt345619789400871208901156984334723422172257100000273699237485761200555500936716763542999995 ValidateCheckDigits.javaimport java.nio.file.*;import java.io.*;import java.nio.channels.FileChannel;import java.nio.ByteBuffer;import static java.nio.file.StandardOpenOption.*;public class ValidateCheckDigits {public static void…