You are the class representative and your class advisor always requests your help to prepare the result analysis after each internal assessment. One of the tasks that your class advisor has assigned to you is to find whether a student has scored a 0 in a course.Given the scores of the 'n' students in the class, write a python program to find whether how many students have scored a zero in a course. Use arrays to store the marks of the students and assume that the maximum number of students in a class is 50

Question

You are the class representative and your class advisor always requests your help to prepare the result analysis after each internal assessment. One of the tasks that your class advisor has assigned to you is to find whether a student has scored a 0 in a course.Given the scores of the 'n' students in the class, write a python program to find whether how many students have scored a zero in a course. Use arrays to store the marks of the students and assume that the maximum number of students in a class is 50

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Engineering

Algorithms

Related Computer Engineering Q&A

Find answers to questions asked by students like you.

Q: design a logic circuit to produce a high output only if the input represented by  a 4 bit binary num...

A: The truth table will be: A B C D F 0 0 0 0 1 0 0 0 1 1 0 0 1 0 1 0 0 1 1 0 0 1 0 0 0 ...

Q: Write a Program to define a Student class, with member variables String name; intcms String DegreeP...

A: public class Student{   //creating specified data members private String name; private String Degree...

Q: INSTRUCTIONS: Write a Python script/code to do the given problems. EMOTIFY PROBLEM: Create a functio...

A: def alphabet_soup(inputString):         #takes a string as inpput        outputString="";           ...

Q: Why do you suppose the method area of a JVM is global to all of the threads running in the virtual m...

A: Method Area: Java Virtual Machine (JVM) is a virtual machine which has its own set of memory, meth...

Q: 1. Write a code using the if/else condition where user enters an integer value for percentage. You a...

A: Given,          If Percentage >80, grade A          If Percentage >70 but Percentage <=80, ...

Q: we said that magnetic disks are power hungry as compared to main memory. Why do you think this is th...

A: Magnetic storage is the volume of data on a charged medium. It utilizes various examples of charge i...

Q: Draw the graph of the NRZ-L, NRZ-I, Manchester scheme, differential Manchesterscheme using each of t...

A: Manchester: It  is the synchronous clock method used in OSI layers(open System Interconnection) whi...

Q: What are two different ways to turn on warnings in Perl?

A: warnings helps us to identify the syntax errors in the program we are writing. The two ways we can t...

Q: 2. CPU Scheduling Demonstrate multilevel queuing. Queue 1 uses SJF and Queue 2 use FCFS. Here Queue ...

A: In the multilevel queuing the priority to the system, the task is higher than that of a user task. H...

Q: The purpose of this activity is to create a working mini-database system from a user’s basic require...

A: SQL is the structured query language which is further divided into  1. DDL -Data Definition Language...

Q: coral programming Write a program that takes in a positive integer as input, and outputs a string of...

A: The C program is used where it takes the input as the positive integer from the user  and prints in ...

Q: We want to use a PIC16F84A microcontroller where 2 inputs (to the microcontroller) are to be connect...

A: PIC16F84A microcontroller is an 18-pin enhanced FLASH/EEPROM 8-bit microcontroller. It have 13 I/O p...

Q: Can you explain ? It's in python.

A: number=input("Enter an odd integer between 0 and 19: ");    #input a number number=int(number); #con...

Q: Host A is sending an enormous file to Host B over a TCP connection. Over this connection there is ne...

A: GIVEN: Using TCP connection, Host A is sending files to Host B. A packet loss or timer expiry has ne...

Q: Can you explain ? This is in Python. a = -1 b= 7 while( b > a ):         b =b - 1         print( ...

A: a = -1                      #initialize a to -1 b= 7                        #initialize b to 7 while...

Q: The following data shows the results for 20 students in one of the post graduate unit.42 66 67 71 78...

A:  Actually, the answer has given below:

Q: Write a do .. loop for the random number dice problem from Chap Three.  Add a counter variable that ...

A: A required Java program is as follows, import java.util.Random; public class Main {     public stati...

Q: I want detailed information and a guide for using Microsoft network monitor 3.1.؟

A: Microsoft Network Monitor 3.1: Wireless (802.11) capturing and monitor mode on Vista – With support...

Q: Please, discuss the implications of different network topologies and business benefits. Be very spec...

A: Network topology is a representation of the configuration of nodes ( e.g. network switches and route...

Q: What device must be installed on a DSL network to protect the sound quality of phone calls?

A: DSL represents Digital Subscriber Line. Clients get a fast data transmission association from a tele...

Q: Explain the following regular expressions: a) /\$/ b) ^[A-Z] c) [9876543210]

A: 1. /\$/  - This tests if the string or number contains the "$" sign or not.    2. ^[A-Z] -  Here  ^ ...

Q: Does cloud computing eliminate all of an organization’sconcerns about its computing infrastructure?

A: Cloud computing: Cloud computing is a type of computing that relies on computer resources sharing ...

Q: Abstraction is a concept in computer organization and architecture that is clearly demonstrated by t...

A: Abstraction is avoiding unnecessary information and provides the core values that needs to be implem...

Q: The shortcut key for copy selected text/picture in MS Word is Ctrl+C OCtrl+V Ctrl+X O Ctrl+Y

A: Shortcut key for copying text Copy is used for making duplicates that leaves the original intact. C...

Q: Given the two binary numbers 11111100 and 01110000:1. a) Which of these two numbers is the larger un...

A: a.

Q: Identify three development paradigms that represent the move away from strict adherence to the water...

A: Life Cycle software development has multiple methods and models for the progress of the software pro...

Q: Show that x = xy + xy′ Q. Using truth tables

A: The truth table of xy + xy′.

Q: BookID CustID Name Phone DateTimeRented DateTimeReturned 1 10 Henry Lawson (80...

A: Multivalued attributes : If any attribute have more than one value under field that is called multiv...

Q: Convert the following expression from reverse Polish notation to infix notation.Q.) W X Y Z − + ×

A: Introduction of the different Expression notation: An expression can be represented in three differe...

Q: Selecting a particular WAN solution because its theoretical maximum speed is faster than another sol...

A: Hey, since there are multiple questions posted, we will answer the first question. If you want any s...

Q: To move data from one part of the document to another, the following is used: O Cut and delete Cut a...

A: Moving data from one part of document to another Copy is used for making duplicates that leaves the...

Q: Firewall computers and software is another important method for control and security on the Internet...

A: Firewall: It is a software generally, used for maintaining the security of the private network. It ...

Q: using chapter 1to 7 from the book C how to pragram 8 edition

A: #include <stdio.h>int n;//Define a function to reverse the array elementsint *reverse(int a[])...

Q: 10. Design the logic circuit that obtains the relative magnitude of two binary numbers A1A0 and B1B0...

A: For the two binary numbers it will have four inputs and will have three outputs,  here two bit magni...

Q: A program stores the prime numbersin a file named PrimeNumbers.dat. Write a program that finds the n...

A: Note: Programming language is missing in the question. So we will answer this program in C++ languag...

Q: Explain why modern computers consist of multiple levels ofvirtual machines.

A: Modern computers having multiple levels of virtual machines Virtual machines divides the tasks to e...

Q: In a certain chemical-processing plant, a liquid chemical is used in a manufacturing process. The ch...

A: Actually, the answer has given below:

Q: Write a program to obtain answer by entering a Quadratic function from the ser.(using visual studio)

A: CODE: #include<bits/stdc++.h>using namespace std;int main(){    double a,b,c;    cout<<"...

Q: Q2: A positive integer is entered through the keyboard, write a function to display the Fibonacci se...

A: The program is written in c

Q: For the digraph below, use the decreasing time list algorithm to create a priority list, then schedu...

A: The priority list is created using decreasing time list algorithm. The priority list is created base...