Visual flowchart you produced

Assignment Help Basic Computer Science
Reference no: EM131289043

The other instructor loves the Visual Flowchart you produced. But he would really like it to be able to handle multiple students instead of just one at a time. He has asked you to expand the program so that multiple students and their test scores and results can be stored.

Starting with a valid flowchart from Week Three (you may start with the Week Three example posted), arrays will need to be added. Arrays must be used so the flowchart logic can keep track of mulltiple students, each with up to five test scores and a final. So, create and use arrays for the student's names, tests scores and final test scores. The arrays must be able to store at least ten students and their various scores. Individual test scores or the average scores can be stored in the array. If the first option is selected, the test scores array will need to be five times the size of the student name array.

The following logic midifications will need to be added:

  • Create an outer loop based on the name input. The loop control should be based on the size of the array (do not go past the end of the array). 
  • A decision statement just after the name entry will check to see if the flowchart should continue. A blank name ("" - two sets of double quotes) will cause the input logic to end (name entry sentinel value). 
  • The test score entry logic does not change, except for the use of arrays for the test scores or average.
  • Once all input is completed (no output until all input is finished), the flowchart output should display the the name, the test average, the final test score, and the correct letter grade (up to one point will be added back to your score if you add + and - letter grade logic). not changed.
  • Loops are required when using arrays. This is for both the input and the output. You can modify last week's Visual Logic flowchart or create a new one.

Reference no: EM131289043

Questions Cloud

What is the risk insured by private mortgage insurance : What are the principal features of an affordable housing loan qualification, and how are they different from those of recent temporary "Making Homes Affordable" programs?
Define willingness to pay and how it can be evaluated : In analyzing corporate credit, what further investigation would an underwriter employ beyond a careful study of the company's financial statements?
Command line tools : Suppose you are a network administrator and your boss indicates that a budget has been set aside to upgrade the network servers for the entire company. Your boss asks you to recommend whether the company should upgrade the network servers to Windo..
How their credit is reported protected and accessed : List the essential information that a prospective borrower must provide in a residential loan application, and in a commercial loan.
Visual flowchart you produced : The other instructor loves the Visual Flowchart you produced. But he would really like it to be able to handle multiple students instead of just one at a time. He has asked you to expand the program so that multiple students and their test scores ..
Identify an example of kennedys use of repetition : Outline Kennedy's speech by dividing it into its four major sections, stating the purpose of each section and identifying which paragraphs form each section.
Prepare the statement of cash flows for 2007 : Prepare the statement of Cash flows for 2007, using the indirect method, with the financial statements and Classify each of the following transactions as an operating activity, an investing activity or a financing activity cash flow, or a non cash ..
Companies to identify system vulnerabilities : If known vulnerabilities in software are entry points for an attacker, why are the software vulnerabilities not corrected before the software is released? Should hackers be hired by companies to identify system vulnerabilities?
How are interest rates determined on hud/ fha loans : Distinguish between the release of liability for a veteran and the restoration of entitlement.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What benefits do businesses gain by offering wireless

What benefits do businesses gain by offering wireless Internet access?

  Implement a binary search or avl tree

You are to implement a Binary Search or AVL tree containing the details of known criminals.  The criminal object must minimally contain the following information.

  Write the definition of a class counter containing

Write the definition of a class Counter containing: An instance variable named counter of type int . An instance variable named limit of type int . A static int variable named nCounters which is initialized to 0 .

  Draw a shell-and-tube heat exchanger

Draw a box furnace with an air preheater system and label its parts. Label and show flows with a red pen.

  What is qos what is it used for and how does it work

What is QOS what is it used for and how does it work and What are the differences between Inserv and Diffserv

  Determining line cost for three points

Points T1, T2 ,and T3 are 25 miles apart, and points C1 , C2, and C3 also are 25 miles apart. If telephone lines cost $1 per mile, determine the line cost for three?

  Effort required for various project

Estimation of the effort required for various project tasks is one of the toughest assignments for a project planner. In an organization, who is the best judge for the effort needed for specific tasks? Please explain the basis for your answer.

  Show that the method terminates at an optimal flow-price

Show that the method terminates at an optimal flow-price vector pair if a feasible solution exists.

  Why did wickard believe he was right

What was the reason the soldiers alked the students straight up the front steps rather than bring them in another entrance? Why did wickard believe he was right? Why did he not in his case?

  Which technology half or full duplex has a lower effective

Which technology (half or full duplex) has a lower effective throughput rate

  Hash algorithm used by protocols such as radius

1. In 1996, the Message Digest 5 (MD5) hash algorithm used by protocols such as RADIUS (Remote Authentication Dial In User Service) to protect passwords was found to have a weakness that could subject it to collision attacks. In 2004, researchers sho..

  What type of network do you have experience with

what type of network do you have experience with

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd