A function called findpassed that recieves two parameters

Assignment Help Computer Engineering
Reference no: EM132093843

Phyton program

You have a program that has 10 student names, 10 random student grades.

Names = StudentNames()

Grades = StudentGrades()

Function: Find passed students only.

Write a function called FindPassed that recieves two parameters which are a list of students names and another list that contain their grades.

The function returns back a list. The function first creates an empty list called PassedStudents.

Then, the function checks the grades of the students one by the one to see if the student passed the test 2 or not. The success grade is 50.

In case the student is passed then the function add his/her name to list PassedStudents.

At the end of the function, it returns back the list PassedStudents.
def FindPassed(Names, Grades):

PassedStudent = []

for i in range (0, len(Grades),1):
if Grades[i] > 49:
PassedStudent.append(Grades[i])
PassedStudent.append(Names[i])
print (PassedStudent)

return PassedStudents

Reference no: EM132093843

Questions Cloud

What are the potential barriers and risks for methodology : What are the potential barriers and risks for your methodology and possible solutions, including:
How do you define environmental scanning : How do you define environmental scanning? What is the main purpose of conducting an environmental scanning? Why is it important?
Especially during requirements elicitation : Eliminate this kind of misunderstanding when working to identify and resolve potential gaps, especially during requirements elicitation?
Nordea bank might realize from its data warehouse : What are other advantages (not mentioned in the case) that Nordea Bank might realize from its Data warehouse?
A function called findpassed that recieves two parameters : Write a function called FindPassed that recieves two parameters which are a list of students names and another list that contain their grades.
Why do you think union membership has been declining : Why do you think union membership has been declining? Do you think the downward trend will continu
What variables could lead to different outcomes : Using TVM principles, how much must you set aside each year to make sure that you hit your target goal if the interest rate is 5%?
Discuss the vision into performance model : Discuss the Vision into Performance Model and how it relates to the employee selection process?
Prices should reflect the value that consumers : Prices should reflect the value that consumers are willing to pay versus Prices should primarily just reflect the cost involved in making a product

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss the disadvantages of memory-mapped input-output

Why does the 68000 have a synchronous interface in addition to its asynchronous interface?

  What are the two rules that a reference monitor enforces

What are the two rules that a reference monitor enforces? What properties are required of a reference monitor?

  Design a program to simulate the daily service

Design a program to simulate the daily service of an elevator in a building - Implement the linked-list queue (e.g., for hall calls) and the BST

  Describe how such two-way communication can be accomplished

The composition of a TDMA frame permits the use of a single-carrier frequency for forward. Describe how such a two-way communication can be accomplished.

  How the selected product could be used by your client

Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance.

  Define computer systems and computer programs

What can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs

  What constraints did you experience in given problem

Describe an IT or similar business project you have done or are currently doing. In your discussion, provide information on the following.

  Examine instances where security conflicted with ease of use

Examine at least two (2) instances where security conflicted with ease of use. Propose a solution to the conflicts you have indicated.

  Clustered pipeline architecture

During instruction execution, there are other places where a physical might be freed. Briefly describe where else we need to put freeing logic and explain why

  Suppose cookies are not disabled on the client

suppose cookies are not disabled on the client.

  What materials will you use in the study

What materials will you use in the study? Will you use an interview protocol? If so, then provide the protocol that you will use for a qualitative study

  Draw the flow-dependence graph

COMP 326/5261 Assignment. Using the names 'l1' to 's1' for the first six instructions in the loop body, draw the flow-dependence graph for these instructions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd