Use the appropriate parameters to pass information

Assignment Help Operating System
Reference no: EM13948300

You receive a file that contains female and male student GPA's for certain courses. Due to confidentiality, the letter code f is used for female students and m for male students. Every file entry consists of a letter code followed by a GPA. Each line has one entry.

The number of entries in the file is unknown. Write a program that computes and outputs the average GPA for both female and male students. Format your results to two decimal places.

When creating this program please write the program so that the function main, in addition to the variable declaration, is merely a collection of function calls. Your program should use the following functions:

a. Function openFiles: This function opens the input and output files, and sets the output of the floating-point numbers to two decimal places in a fixed decimal format with a decimal point and trailing zeros.

b. Function initialize: This function initializes variables such as countFemale, countMale, sumFemaleGPA, and sumMaleGPA.

c. Function sumGrades: This function finds the sum of the female and male students GPAs.

d. Function averageGrade: This function finds the average GPA for female and male students.

e. Function printResults: This function outputs the relevant results.

f. There can be no global variables. Use the appropriate parameters to pass information in and out of functions.

Reference no: EM13948300

Questions Cloud

Calculate the unit cell edge length : Calculate the unit cell edge length  for an 80 wt% Ag-20 wt% Pd alloy. All of the palladium is in solid solution, the crystal structure for this alloy is FCC, and the room temperature density of Pd is 12.02 g/cm3.
Give a brief definition of sequential file processing. : Develop an example to illustrate your definition. (The example does not have to be as elaborate. Just a record with a simple explanation)
Identify the type of products or services company provides : Describe the company you chose (give an overview/history). Examine the company's core business/industry (also identify trends) and Identify the type of products or services the company provides (describe the problems these products/services solve)
Compute the nc equipments accounting rate of return : Compute the NC equipment's accounting rate of return. Compute the investment's net present value, assuming a required rate of return of 10 percent. Compute the investment's internal rate of return.
Use the appropriate parameters to pass information : When creating this program please write the program so that the function main, in addition to the variable declaration, is merely a collection of function calls. Your program should use the following functions
Corrosion prevention measures : Suggest an appropriate material for each  of the following applications, and, if necessary, recommend corrosion prevention measures that should be taken. Justify your suggestions.
Prepare a perceptual map for your chosen product : Identify the important attributes for your chosen product and select two key variables for your perceptual map. Prepare a perceptual map for your chosen product/brand and using a minimum of seven competitors, rank each product/brand on the two va..
Small businesses generally need more marketing : Research the steps entrepreneurs on restricted marketing budgets can us to market their companies' products and services. Provide in-text citations for your sources.
Define a one-to-many relationship between tables : Use the Find command to move to the record with the Firm# 1142 and delete the record. Answer Yes to any warning messages about deleting the record.

Reviews

Write a Review

Operating System Questions & Answers

  Calculate the maximum data rate in mb/second

b)How much cylinder skew is needed for an Oceangate disk operating at 20,000 rpm(new series for the Christmas promotions) which has a seek time of 0.5 milliseconds? This disk has 800 sectors of 512 bytes each on each track.c) Calculate the maximum da..

  Question about vpn communications

Discuss how routers and firewalls and IDSs inspect inbound and outbound traffic and explain how we use those features to our benefits in securing the network.

  Encoding the data using the generator polynomial

Encode the data bit sequence 10011011100 using the generator polynomial and provide the code word.

  What data security measures are utilized in your workplace

Why is it important for an organization to follow a standard systems acquisition process?

  Write a c++ program for little man''s computer

A text file containing machine code (not assembly code) for little man's computer following instruction set . Instructions are in different lines (no need for semicolon at the end of each instruction)

  Roles of network managers

In Many development companies and universities network managers must oversee a network that has several computers connected to it that are used through developers for design and product development reason.

  Accuracy of the storage and retrieval techniques

Evaluate the efficiency, speed, and accuracy of the storage and retrieval techniques that two (2) search engine organizations currently use. Evaluate the ease of use and efficiency of using both Windows and Unix file management systems

  Differences between logical and physical security

With the help of analogy to explain the differences between logical and physical security to a nontechnical person.

  Creating the sample database

nstall DB2 Express-C, construct the model database, and validate the installation and write a short paper describing your experience with the installation.

  Explains memory management requirements

Write a 2-page paper that explains memory management requirements. Write a 2-page paper that explains the differences in memory management between Windows and Linux

  Describe the ongoing maintenance that will be required

Describe all the necessary equipment and explain the costs involved in the creation of the system and describe the ongoing maintenance that will be required

  Discuss mitigation strategies

It is determined that 3-out of 5-businesses that experience downtime of forty-eight hours or more will be out of business within three years.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd