Write a program to handle student data in an input file

Assignment Help Computer Engineering
Reference no: EM132210018

Question :

Write a program to handle student data in an input file. Each line in the file represents information for one student. Each line consists of data separated by spaces in this order: student last name, student first name, 6 exam grades. Write your program to handle a file for any number of students.

If there is a student last name on a line, you can assume that there will be a complete line of data as described. Use last name as the variable to control your loop for reading until eof. Copy the file "coursegrades.txt" from the COSC1436 folder on the network share drive.

You will use this file to test your program and prepare your report. Write a program to produce a well formatted report to an output file.

Your report will include:

Title line, including programmers' name and date of report

One line for each student giving first name, last name, 6 exams, and student average (in that order!) Use the correct output manipulators to line up the columns. Strings should be left aligned; numbers should be right aligned.

After all student info has been printed, give how many students are in the class, and the class average of all final averages.

All averages should be printed with one place after the decimal. You will need to include and name two string variables for last name and first name. Input these strings Deal with the 6 exams per student with a loop. Do not put each exam into a separate variable.

Reference no: EM132210018

Questions Cloud

New computer or upgrading computer for organization : What you think are the top three hardware components to consider when selecting a new computer or upgrading a computer for an organization.
Write a program that generate a report of utility : Write a program that generate a report( bill) of utility using the folloing text file as an input.(the text file has: AcctNum, name, previous , current).
Write a program that executes the multiplication : Write a program that executes the multiplication of two numbers entered by the user using only addition operation.
Distinguish between individual personality : It is sometimes difficult to distinguish between an individual's personality and:
Write a program to handle student data in an input file : Write a program to handle student data in an input file. Each line in the file represents information for one student.
How is this significant to consumer behavior : Discuss learning and perception. How are the two connected? How is this significant to consumer behavior?
Marx theory of industrial and employment relations : Examine the similarity(ies) of the feature(s) of unitary theory and Marx theory of Industrial/employment relations?
Were any changes adopted in any accounting methods : Were any changes adopted in any accounting methods? How stable are the company’s operations?
Why is pfizer interested in improving diversity : Why is Pfizer interested in improving diversity and inclusion at the company?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Construct a product vision statement for the product

Use an Internet search engine such as google or bing to research a product of your interest. Make sure you are capable of writing a product vision statement.

  Write a class that encapsulates a deck of cards

Write a class (and a client class to test it) that encapsulates a deck of cards. A deck of cards is made up of 52 cards. You should have three instance variables.

  Does the source of information make any difference

Does the source of information make any difference to you? If so, how will you rank the reliability of each of the sources listed?

  What are the possible values of salt

What are the possible values of salt?, What is the hash of password + salt for salt =110? Explain the protocol for Authentication.

  Create a singly linked list and a doubly linked list

Create a singly linked list and a doubly linked list with 20 elements in each one. You can chose any type of data you want to fill these but they must be pre-populated. for each type of linked list, swap 2 adjacent elements by adjusting only the l..

  Proposed a plan of action which includes security plans

The CISO has proposed a plan of action which includes developing system security plans using guidance from NIST SP-800-18 Guide for Developing Security Plans.

  What is the result of executing subprogram swap

What is the result of executing subprogram Swap if one of the parameters is a value parameter and one of the parameters is a reference parameter?

  When does recursive is palindrome method stop calling itself

Do we have to give the same name to both is Palindrome methods? When does the recursive is Palindrome method stop calling itself?

  Who will generate the error message

Somewhere in middle of the United States are two Internet routers with routing tables. If so, who will generate the error message, and what might it look like?

  Write essay about what is two-factor authentication

Write a three page essay about What is two-factor authentication make sure you don't copy or plagiarize

  List and in brief describe the five-component model of an

list and briefly explain the five-component model of an information system. how can you use them?your response should

  Define an enumeration type

Write a function, triangleShape, that takes as parameters three numbers, each of which represents the length of a side of the triangle.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd