Write a Python script that allows a user to input three exam scores. Display a congratulatory message if the average exam score across all three is greater than 95%. Your solution should follow these general steps; Obtain the first exam score from the user in the form score/max Example: 93/100 1. Obtain the second score 2. Obtain the third score 3. Check that the user provided numbers and compute the average test score 4. Display the average 5. If the average was greater than 95%, display a congratulatory message 6. Example: "Great work! Your average was over 95%!!!!"

Answers

Answer 1

This script follows the general steps you provided, allowing the user to input exam scores, calculating the average score, and displaying a congratulatory message if the average is greater than 95%.

To create a Python script that allows a user to input three exam scores and display a congratulatory message if the average is greater than 95%, you can use the following code:

```python
def get_score():
   score_input = input("Enter your exam score (format: score/max): ")
   score, max_score = map(int, score_input.split('/'))
   return (score, max_score)

# Obtain the first, second, and third exam scores
score1, max_score1 = get_score()
score2, max_score2 = get_score()
score3, max_score3 = get_score()

# Compute the average test score
total_max_score = max_score1 + max_score2 + max_score3
total_score = score1 + score2 + score3
average_score = (total_score / total_max_score) * 100

# Display the average
print(f"Your average score is: {average_score:.2f}%")

# If the average was greater than 95%, display a congratulatory message
if average_score > 95:
   print("Great work! Your average was over 95%!!!!")
```

Learn more about python script here:

https://brainly.com/question/30391554

#SPJ11


Related Questions

See if you can figure out what these tricky brain teasers are trying to say. *
THAN life

Answers

“THAN life”,, I’m pretty sure it means Bigger than Life. But If i’m wrong.. I’m sorry!

What does software alone enable a computer to do?
A. connect to the Internet
B. control processing speeds
C. interact with the user
D. manage other software

Answers

Answer: A) Connect to the Internet.

This is about understanding the uses of softwares.

D: manage other softwares.

Software is defined as a set of data, instructions and programs that are used in operation and execution of specific tasks in computers.

Thus is different from hardware because hardware is the physical parts of the computer.

However, for hardware to work, it needs softwares. In fact interaction among softwares are what makes the computer hardware to run.

Looking at the options;

Option A: Statement is wrong because software alone does not enable a computer connect to the internet. It needs an installed hardware known as NIC (network interface card).

Option B: Statement is wrong because processor speed is determined by processor cores and clock speed.

Option C: Statement is wrong because it is the hardware that the user interacts with.

Option D: Statement is correct because softwares interact with and manages other other softwares to make the hardware run.

Thus, option D is correct.

Read more at; brainly.com/question/18310888

In Python, if var1 = “Happy” and var2= “Birthday” and var3 = (var1+var2) *2, then var3 stores the string

A)“Happy BirthdayHappyBirthday”
B)“HappyHappyBirthday”
C)“HappyBirthdayHappyBirthdayHappyBirthday”
D)“HappyBirthdayBirthday”

Answers

Answer:

A

Explanation:

var3 is happy + birthday, ×2

l.e happy birthday happy birthday

Answer:

Your answer is A

How might you use what you learned about
creating a vision board in the future?

Answers

A vision board is a visual representation of your goals and aspirations that can help motivate and inspire you to achieve them. You can use what you learned about creating a vision board by creating one for yourself as a tool to help clarify your goals and focus on what you want to achieve. You can also use what you learned to help others create their own vision boards, either individually or in a group setting. This can be a fun and rewarding activity, and it can be especially helpful for people who are trying to make positive changes in their lives.

1. Symbols commonly seen on pictorial and line diagram.
2. What is the device used to protect against over-current and short circuit
conditions that may result in potential fire hazards and explosion?
3. A mark or character used as a conventional representation of an object,
function, or process.
4. It is performed at the end of the wire that allows connecting to the
device.
5. What kind of diagram uses slash to indicate the number of conductors
in a line?

Answers

Answer:

4. It is performed at the end of the wire that allows connecting to the

device.

Explanation:

hope this helps

Social media marketers need the ability to do what?
Code in JavaScript
Collaborate across teams
Communicate with customers
Make a website useful

Answers

Communication with customers
I believe the answer is communicate with customers

Which basic design principle is primarily made up of lines?​

Answers

Answer:

Shape

Explanation:

Select the correct answer from each drop-down menu. Computer memory stores data as a series of 0s and 1s. In computer memory, represents the absence of an electric signal and represents the presence of an electric signal.

Answers

Answer:

Zero (0); one (1).

Explanation:

Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.

The memory of a computer generally stores data as a series of 0s and 1s. In computer memory, zero (0) represents the absence of an electric signal i.e OFF and one (1) represents the presence of an electric signal i.e ON.

Which type of data is is usually collected as numerical data that can be presented in a graph or chart?

Answers

Answer:

Quantitative data

Explanation:

Quantitative data is information about quantities; that is, information that can be measured and written down with numbers. Some other aspects to consider about quantitative data: Focuses on numbers. Can be displayed through graphs, charts, tables, and maps.

euclidean distance between a string and qwerty keyboard python

Answers

The Euclidean distance between a string and the QWERTY keyboard in Python is a measure of the similarity between a string and a QWERTY keyboard.

The Euclidean distance is a way to measure the distance between two points in space, and in this case, the points are the characters in the string and the keys on the keyboard.
The Euclidean distance is defined as the square root of the sum of the squared differences between the corresponding elements in the two vectors. In the case of a string and a keyboard, we can think of each character in the string as a vector in a high-dimensional space, and the keys on the keyboard as another set of vectors.
To calculate the Euclidean distance between a string and a keyboard in Python, we first need to define a function that maps each character in the string to a vector. We can do this by using the ord() function, which returns the ASCII value of a character. We can then use the Euclidean distance formula to calculate the distance between each character in the string and each key on the keyboard.
Here's an example of how to calculate the Euclidean distance between a string and a keyboard in Python:
```
import math

def euclidean_distance(s):
   keyboard = ''
   keyboard_vectors = {}
   for i, c in enumerate(keyboard):
       keyboard_vectors[c] = (i // 10, i % 10)
   distance = 0
   for c in s:
       if c in keyboard_vectors:
           x, y = keyboard_vectors[c]
           distance += math.sqrt(x**2 + y**2)
   return distance
```
This function takes a string as input and returns the Euclidean distance between the string and the QWERTY keyboard. The function first defines a dictionary that maps each key on the keyboard to a vector in a two-dimensional space. It then iterates over each character in the input string, calculates the Euclidean distance between the character's vector and the keyboard vectors, and adds it to the total distance. Finally, it returns the total distance as the output.

Learn more about Python :

https://brainly.com/question/32166954

#SPJ11

i) What are Chronic Micro Traumas, and other physical injuries that gamers have faced?
ii) What are the mental/cognitive/emotional challenges that are mentioned in the article?
iii) Imagine a close friend of yours shares with you that they are facing the physical/cognitive/emotional challenges related to gaming/over usage of technology, what would you recommend for them to improve all forms of their health?

Answers

Some common physical injuries that gamers may face include:

Carpal Tunnel SyndromeEye StrainBack and Neck PainRepetitive Strain Injuries (RSIs)

ii) The mental/cognitive/emotional challenges are:

Addiction:Social IsolationPoor Sleep PatternsAttention and Concentration Issues

What are the mental/cognitive/emotional challenges

Chronic micro traumas are caused by excessive gaming/tech use, leading to repetitive stress injuries. Gamers may face physical injuries like Carpal Tunnel Syndrome, which causes pain, numbness, and tingling in the hand and arm due to repetitive wrist.

Common challenges related to gaming or excessive technology use include addiction, which interferes with daily life. Excessive screen time may cause social isolation. Late-night gaming or excessive screen time before bed can disrupt sleep, causing insomnia or poor sleep quality.

Learn more about   emotional challenges from

https://brainly.com/question/26162044

#SPJ1

Which are the external application-oriented devices that provide application security?

Answers

Firewalls, next-generation firewalls, IDS/IPS, and web application firewalls exist the external application-oriented devices that furnish application security.

What is external application-oriented devices?

Firewalls, next-generation firewalls, IDS/IPS, and web application firewalls exist the external application-oriented devices that furnish application security. A firewall functions as a barrier or gatekeeper between your computer and another network like the internet. It works like a traffic controller, monitoring and filtering traffic that desires to acquire access to your operating system. In computing, a firewall exists as a network security system that monitors and prevents incoming and outgoing network traffic established on predetermined security rules. A firewall typically establishes a barrier between a trusted web and an untrusted network, such as the Internet.

An Intrusion Prevention system can respond to this in real-time by blocking or preventing such actions. Network-based IPS systems utilize 'in-line' so that all network traffic can be monitored for malicious codes and attacks. A web application firewall (WAF) exists a firewall that monitors, filters, and blocks data packets as they transit to and from a website or web application. A WAF can be either network-based, host-based, or cloud-based and exists often deployed through a reverse proxy and positioned in front of one or more websites or applications.

To learn more about Firewalls refer to:

https://brainly.com/question/25798879

#SPJ4

How are game designers linked with game players?

A.
In order to be a game player, you must be a game designer.
B.
In order to be a game designer, you must have extensive experience playing video games.
C.
Game designers must survey potential game players before creating a new game.
D.
Game designers create a narrative that game players can shape and become personally involved in.

Answers

The way in which game designers linked with game players is that: D. Game designers create a narrative that game players can shape and become personally involved in.

What is a game development tool?

A game development tool can be defined as a set of specialized software programs that are used by game developers (programmers) for the design and development of a game such as the following:

EmulatorGame engineModeling toolLevel editorScripting tool

Additionally, the four (4) team responsibilities that are required to create a game include the following:

The game designer create the rules and characters.The programmer writes an executable set of instructions (code).The artist choose colors and design each characters.The game designers create a narrative that game players can shape.

Read more on game development here: https://brainly.com/question/13956559

#SPJ1

how do the peograms on a computer work

Answers

Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.

Explanation:

Back in the late 2000s, Rosa had to purchase a physical copy of software that she wanted to install. At that time, what installation method did Rosa MOST LIKELY use?

A.
internet

B.
CD

C.
app Store

D.
digital download

Answers

Since Rosa had to purchase a physical copy of software that she wanted to install. At that time, the installation method that Rosa MOST LIKELY use is CD.

What is meant by a CD?

CDs are known to be a very little plastic discs on which can be placed things or elements like sound, such as music, which can be recorded on it.

Note that these CDs can also be used to as a way of keeping safe that is saving information which can be used or later read by a computer. CD is a term that is known to be the short abbreviation for the word 'compact disc'.

CDs (or Compact Disc) are known to be in an obsolete phase of software that saves moderate rate of data.

Therefore, based on the above, Since Rosa had to purchase a physical copy of software that she wanted to install. At that time, the installation method that Rosa MOST LIKELY use is CD.

Learn more about software from

https://brainly.com/question/24321656
#SPJ1

NO FOOLISH ANSWERS!!! Please I need this for class and I don't have time to be played with.

35 points


Create an informational slide using ethical Internet research and citation practices.

Choose a topic on anything you think would be interesting to research – for example, a famous or historical person, a place, an animal, or a device or invention. You will use the Internet to complete your research. With this research, you will create an informational presentation slide that describes your topic. Your informational slide should contain the following elements:

• An introductory image - it can be a direct picture of the person/place/thing, or a photo that relates to it in some way. This photo must be free to use, meaning you will have to check the copyright details for any photo you select. (10 points)

• A 200- to 300-word explanation of the topic. Use Internet sources to research the topic, and then write an explanation in your own words based on what you have learned. (10 points)

• Properly cited Internet sources for both the image and written section. (5 points)

Answers

The informational slide should contain an introductory image that is free to use, a 200-300 word explanation of the topic written in the student's own words based on Internet research.

What are the requirements for creating an informational slide using ethical Internet research?

The task requires creating an informational slide on a topic of choice using ethical internet research and citation practices.

The slide should include an introductory image (with proper copyright), a 200-300 word explanation of the topic based on internet research, and proper citation of sources used.

It is important to use reliable sources and write the explanation in one's own words.

This task helps to develop research skills, proper citation practices, and the ability to effectively present information in a concise manner.

Learn more about informational slide

brainly.com/question/10368571

#SPJ11

A(n) ____ is a list of homogeneous elements in which the addition and deletion of elements occurs only at one end.

Answers

Answer:

Stack

Explanation:

In the stack, you add elements with push operation and obtain the last element added with pop operation.

A stack is a list of identical elements, where additions and deletions only happen at one end.

What is stack?

A stack is defined as an abstract data type used in computer science that functions as a collection of items. It has two basic operations: Push, which adds an element to the collection, and Pop, which removes the most recently added member that hasn't been removed yet.

A person may add items to the stack using the push operation, and you get the most recent element added using the pop operation. The evaluation of expressions with operands and operators can be done using a stack.

Stacks can be used for backtracking, or to verify if an expression's parentheses match. It can also be used to change the phrase from one form to another. It may be applied to formally manage memories.

Therefore, it is stack.

To learn more about the stack, refer to:

https://brainly.com/question/14257345

#SPJ6

Which symbol is at the beginning and end of a multiline comment block? &&& """ %%% ###

Answers

Answer:

#

Explanation:

I have notes on it we learned it in 8th

###

the other guy was correct.

Write a python application that allows a user to enter any number of student test scores until the user enters 999. If the score entered is less than 0 or more than 100, display an appropriate message and do not use the score. After all the scores have been entered, display the number of scores entered and the arithmetic average.

Answers

Answer:

This program is as follows

total = 0; count = 0

testscore = int(input("Score: "))

while testscore != 999:

   if testscore < 0 or testscore > 100:

       print("Out of range")

   else:

       total+=testscore

       count+=1

   testscore= int(input("Score: "))

print(count,"scores entered")

print("Arithmetic Average:",total/count)

Explanation:

This initializes total and count to 0

total = 0; count = 0

This gets input for score

testscore = int(input("Score: "))

The following iteration stop when 999 is entered

while testscore != 999:

This prints out of range for scores outside 0 - 100

   if testscore < 0 or testscore > 100:

       print("Out of range")

Otherwise

   else:

The total score is calculated

       total+=testscore

The number of score is calculated

       count+=1

Get another input

   testscore = int(input("Score: "))

The number of score is printed

print(count,"scores entered")

The average of score is printed

print("Arithmetic Average:",total/count)

Which type of keyword is "capital"?

Answers

Answer:

its a vocabulary term

Explanation:

does this help?

Answer:

It is a vocabulary term

Explanation:

I did the test.

", how much fragmentation would you expect to occur using paging. what type of fragmentation is it?

Answers

In terms of fragmentation, paging is known to produce internal fragmentation. This is because the page size is typically fixed, and not all allocated memory within a page may be utilized. As a result, there may be unused space within a page, leading to internal fragmentation.



The amount of fragmentation that can occur with paging will depend on the specific memory allocation patterns of the program. If the program allocates memory in small, varying sizes, there may be a higher degree of fragmentation as smaller portions of pages are used. On the other hand, if the program allocates memory in larger, consistent sizes, there may be less fragmentation.

Overall, paging can still be an effective method of memory management despite the potential for internal fragmentation. This is because it allows for efficient use of physical memory by only loading necessary pages into memory and swapping out others as needed.

To know more about memory allocation visit:

https://brainly.com/question/30055246

#SPJ11

give several examples where you need to use clustering instead of classification in business. what do you think the issues are in clustering algorithms? e.g., are they difficult to validate?

Answers

Classification techniques include support vector machines, naive bayes classifiers, and logistic regression. The k-means clustering algorithm, the Gaussian (EM) clustering algorithm, and others are instances of clustering.

Two methods of pattern recognition used in machine learning are classification and clustering. Although there are some parallels between the two processes, clustering discovers similarities between things and groups them according to those features that set them apart from other groups of objects, whereas classification employs predetermined classes to which objects are assigned. "Clusters" are the name for these collections.

Clustering is framed in unsupervised learning in the context of machine learning, a branch of artificial intelligence. For this kind of algorithm, we only have one set of unlabeled input data, about which we must acquire knowledge without knowing what the outcome will be.

Know more about machine learning here:

https://brainly.com/question/16042499

#SPJ4

In the Information technology arena, information is important based on your role and perspective. Based on the ISM role what is the most important factor concerning data retention

Answers

The most important factors concerning data retention include availability/storage of media, regulatory and/or business needs,  and confidentiality of data. It is fundamental for Informix Storage Manager.

Informix Storage Manager (ISM) and data storage

Informix Storage Manager (ISM) can deliver efficient storage of data and other management services

Informix Storage Manager functions in the International Business Machines (IBM) Informix database server.

IBM Informix is a service of IBM's Information Management part focused on delivering database management systems.

Learn more about IBM Informix here:

https://brainly.com/question/6447559

write down the features of spread sheet package​

Answers

Answer:

Features of Spreadsheet

Microsoft Excel is easy to learn and thus, it does not require any specialised training programme.

MS Excel basically provides an electronic spreadsheet where all the calculations can be done automatically through built in programs

Spreadsheets are required mainly for tabulation of data . It minimizes manual work and provides high degree of accuracy in results

It also provides multiple copies of the spreadsheets

It presents the information in the form of charts and graphics.

Uses

By default, it creates arrangement of data into columns and rows called cells .

The data that is input into the spreadsheet can be either in the form of numbers, strings or formulae.

The inbuilt programs allow you to change the appearance of the spreadsheet, including column width, row height, font colour and colour of the spreadsheet very easily .

You can choose to work with or print a whole spreadsheet or specify a particular area, called a range

in gc plus, which of the following can provide serial over ethernet capabilities for device control?

Answers

In GC Plus, the following devices can provide serial over Ethernet capabilities for device control:


- GC-100
- iTach IP2SL
- iTach WF2SL
- Flex Link Serial Cable

These devices can be used to connect and control serial devices over an Ethernet network, allowing for remote control and monitoring of the devices. The GC-100, iTach IP2SL, and iTach WF2SL are all network adapters that can be used to convert serial data to Ethernet data, allowing for communication between serial devices and a network.

The Flex Link Serial Cable is an accessory that can be used to connect a serial device to one of these network adapters, allowing for serial over Ethernet capabilities.

Learn more about Ethernet:

https://brainly.com/question/1637942

#SPJ11

Drag each label to the correct location on the image. Match the movie qualities with the right period of movies.

Answers

Bro where is the table

explain whether the information in the microsoft office file properties is reliable for forensic purposes.

Answers

The information found in Microsoft Office file properties may not always be reliable for forensic purposes.

While these properties can provide valuable information such as the file creator, creation and modification dates, and version, they can also be easily manipulated or deleted. In addition, metadata stored in file properties may not be comprehensive and may not capture all actions taken on the file.

Therefore, it is important to supplement the information found in file properties with other forensic techniques and tools to ensure the accuracy and reliability of the evidence collected.

You can learn more about Microsoft Office at: brainly.com/question/14984556

#SPJ11

What are some tasks for which you can use the VBA Editor? Check all that apply.


typing code to create a new macro

sharing a macro with another person

viewing the code that makes a macro work

starting and stopping the recording of a macro

modifying a macro to include an additional action

jk its a c e

Answers

Answer:

typing code to create a new macro

viewing the code that makes a macro work

modifying a macro to include an additional action

Explanation:

Typing code to create a new macro, viewing the code that makes a macro work and modifying a macro to include an additional action are some tasks for which you can use the VBA Editor. Hence, option A, C and D are correct.


What is Typing code?

In computer science and computer programming, a data type is a group of probable values and a set of allowed operations. By examining the data type, the compiler or interpreter can determine how the programmer plans to use the data.

If a variable is highly typed, it won't immediately change from one type to another. By automatically converting a string like "123" into the int 123, Perl allows for the usage of such a string in a numeric context. The opposite of weakly typed is this. Python won't work for this because it is a strongly typed language.

The symbol used to create the typecode for the array. the internal representation of the size in bytes of a single array item. Create a new element and give it the value.

Thus, option A, C and D are correct.

For more information about Typing code, click here:

https://brainly.com/question/11947128

#SPJ2

What is the name of Thompsons computer language?

Answers

Answer:

below

Explanation:

Bon programming language

Answer:

Explanation:

Bon programming language

While writing Multics, Thompson created the Bon programming language

what is full form of RAM??? ​

Answers

Answer:

Random Access Memory, it's used to store working data and machine codes

Explanation:

Hope it helped !
Adriel

Other Questions
Look at the diagramComplete the following sentences.Angle e= Angle , as they are alternate angles.Angle f= Angle , as they are alternate angles.Angles a, b and c add up to , as they are on a straight line.Therefore, angles e, f and b also add up to Which of the following is NOT true about the role tectonic forces play in the rock cycle? 1. When plates pull apart, rocks melt, and magma forms igneous rocks. 2. When plates crash together, rocks are buried and form metamorphic rocks. 3. When plates slide over & under each other, the heat & pressure form igneous rocks. 4. When rocks push upward & form mountains, the erosion of the mountains can produce sediment. ok yall helppp Today, you will be investigating the teacher. Your first task is to observe the suspect (your teacher) and the scene (the classroom).What evidence do you notice and what does it say about your teacher?Use the handout to record your evidence, then analyze each piece of evidence to see what it reveals about the suspect. Finally, summarize your conclusions.** Your goal is to describe your teacher, and the classroom, as thoroughly as possible (consider things like personality, style, attitude, hobbies, etc)i chose Most Likely To Awards sooo what do i dooooooo What was the message of President Obama's FOIA memorandum? What is the best/worst advice you ever got? Why?Who do you turn to when you need advice? Why?What kind of advice do you normally give others?What advice would you give your parents/teachers?2 paragraphs a mandated reporter who fails to make a report suspected abuse may be punished up to six months in jail and/or a $1000 fine. True or False Why were the Selma to Montgomery marches significant to the civil rights movement apex? What led to the formation of many new churches, especially in the Southern backcountry?A. The Bill of RightsB. The EnlightenmentC. The Great AwakeningD. The Glorious Revolution ction A: Complete the table by giving five examples of each type of nouns in Spanish. pt each) ustantivos Comun Sustantivos propios Sustantivos abstractos tiful which of the nouns are singular and What is the equation of the line that passes through the points (2,6) and (4,10) Solve for z.A= x + 5 + Z Why must organisms continuously acquire energy and materials from the external environment to maintain homeostasis? What is the solve for r 9 = -3 -r? Which statements describe a characteristic of a right pentagonal pyramid? Select two options.The bases are parallel and congruent.The segment from the top to the center of the base is perpendicular to the base.All the faces are congruent pentagons.The base is a pentagon and the sides are triangles.The base must be a regular polygon. Sorry no files just type it In a system's processing load consists of 60% cpu activity and 40% disk activity. you can upgrade your disks for $8,000 to make them 2.5 times faster. and, you can upgrade your cpu to make it 1.4 as fast for $5,000 19. The product of two numbers is 120 and the sum of their squares is 289. The sum of the number is (a) 20 (b) 23 (c) 169 (d) None of these Stewie is a 1-year old criminal genius. One day, with considerable malice and premeditation, he pulls out a gun and cold-bloodedly murders his mother, father, brother, sister and the extremely annoying family dog. What will happen to Stewie under both common law and the law of Ohio? 30% less of 180...................................................... katsu, inc. has a small car division that operates as a profit center. below is a partially completed responsibility report for the first quarter.