Write a function that accepts a cell array StudentScores consisting of the following:
a character array (i.e. text string) with a student's last name
a vector of their homework scores (HW) .
a vector of their quiz scores (QZ )
a vector of their exam scores (EX) .
a scalar with the final project score (PJ)
Your function should compute the total course score using the formula:
FinalScore = 0.25HW +0.20QZ +0.40EX +0.15PJ
where the bars indicate the average scores in each of the categories that have multiple scores. The final score should be stored in single precision. Your function should create and output a 1x2 cell array Finalscore with the student name in the first cell and the final score (in single precision) in the second cell.

Answers

Answer 1

Answer:

function FinalScore = grades(StudentScores)

FinalScore ={StudentScores{1,:};0.25*mean(cell2mat(StudentScores{2,:}))+0.20*mean(cell2mat(StudentScores{3,:}))+0.40*mean(cell2mat(StudentScores{4,:}))+0.15*StudentScores{5,:}}

endfunction

Explanation:

In the source code, the function FinalScore is defined to calculate the total student score and assign it to the variable FinalScore. Note that the code block in the function must be indented accordingly.


Related Questions

What is the output for the following line of code?
# print(3)
O3
O'3
O There is no output.
O An error statement is generated.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for this question is: There is no output.

Because this is a Python code. and it is a comment statement. The code line that begins with the # symbol considered a comment statement.  The comment statement code will not be executed when you run the program.

While the other options are not correct because:

The given line of code is considered as a comment statement. The comment statement will be executed on running the program. It is used for understanding the program that helps the program to read and understand the logic being written here. When you run the comment statement, it will not produce any output or error.

Answer: O There is no output.

Explanation:

The "#" is utilized as a comment statement in Python code. It is not meant to be put into effect when the program is ran.

(Confirmed on EDGE)

I hope this helped!

Good luck <3

Design an algorithm that takes in a stream z1, . . . , zM of M integers in [n] and at any time t can output a uniformly random element in z1, . . . , zt . Your algorithm may use at most polynomial in log n and log M space. Prove the correctness and analyze the space complexity of your algorithm. Y

Answers

Answer:

import random

def rand_select(*args):

   selected = random.choice(args)

   print( selected)

rand_select(12,32,43,54,2,34,65,2,64,74,97)

The space complexity of this program is O(1)

Explanation:

The list of arguments to the function is assigned to the variable "args" and the random's choice method randomly picks an item and assigns it to the variable "selected", then the variable is printed out on the screen. The memory used is 1 + 1 = 2, which is a constant, therefore making the space complexity to be O(1).

Mark is working on a feature film project. His job is to portray the economic status, occupation, and attitude of the characters visually. Which role is he playing?

Answers

Answer:

Videographer

Explanation:

Answer:

i think i would be costume designer

Explanation:

because if you spell videographer  it gives you the little red squiggly line

_________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.

Answers

Answer:

IPSec

Explanation:

IPSec is an acronym for Internet Protocol Security. It is a standardized protocol used in determining the cryptographic and authenticated packets across the Internet Protocol networks.

It can be utilized to establish access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.

To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
A) one
B) two
C) three
D) multi

Answers

The answer is D) multi

write c++ program from 1to 100 to find prime numbers using statement.

please help me​

Answers

Answer:

int count;

for (int i = 1; i <= 100; i++){

count = 0;

for (int j = 1; j <=i; j++)

if (i%j==0) count ++;

if (count == 2) cout << i << " ";

}

Which of these is an example of collective voice?
A. He hopes to make the world better for his children.
B. I have always dreamed of a kinder and better world.
C. We are here to make a better world for our children.
D. Your purpose is to make the world a better place.

Answers

Answer:

option C

hope it helps! please mark me brainliest..

Merry Christmas good day

Answer:

c

Explanation:

.A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables is called

Answers

Answer: Network interface controller

Explanation:

A network interface controller is also referred to as the network adapter or LAN adapter. It is simply a component of the computer hardware that is used to connects a computer system to a particular network.

It is a card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables.

59. When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this

Answers

Answer:

False Positive

Explanation:

A false positive or false positive error may be defined as a result which indicated that the given conditions seems to exists when it actually does not. It is classified as a type I error. It tests a check for a single condition and then falsely provides a positive or affirmative decision.

In the context, a false positive type of error occurred when the external router of the system administrator was accessed from the computer of the administrator that was used to update the configuration of the router.

An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as what type of attack

Answers

Answer:

An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as

TCP Session Hijacking.

Explanation:

TCP Session Hijacking is a cyber-attack in which illegitimate access is acquired to a client's server in the network.  The attacker then hijacks the TCP/IP session by reading and modifying transmitted data packets and also sending requests to the addressee's server.  To achieve this attack effectively, the hacker generates a large number of session IDs, thereby confusing the client's server to process them as a part of the users' sessions. Sessions (a series of interactions between two communication end points) are used by applications to store user parameters and, they remain alive until the user logs off.

FIRST TO ANSWER RIGHT GETS BRAINLIEST!!!!! Which of the following sets of data would be represented best in a histogram?

A. the number of toys sold in five price ranges

B. the average monthly sales for the Big Toy Company

C. the number of each type of candy sold last month

D. the temperature at which hard candy melts

Answers

Answer:

b

Explanation:

I think it would be B. The average monthly sales for the big toy company because its giving data over history

Which form of data does the image represent? (10 points)

A. Analog data
B. Digital data

Answers

Where is the image?, I cant answer if there is no image
b
.......…..................

Question # 6
Dropdown
Choose the line of code that completes this program.

Output:

dog named Tiger

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

def __str__(self):
return self.species + " named " + self.petName

def changeName(self, newName):
self.petName = newName

# main program
myPetA = pet('dog', 'Spot')


print(myPetA)

Answers

Answer:

myPetA.changeName('Tiger') should be it

Explanation:

Answer:

myPetA.changeName('Tiger')

Explanation:

Correct answer edge 2020

Overflow and roundoff errors result from real-world limitations in representing . . . (10 points)
A. number systems
B. fractions
C. place values

Answers

Answer:

C. place values

Explanation:

Place value can be defined as the numerical value representing a digit owing to its position in a number. Some examples of the various place values used in representing each digit are tenths, hundredths, thousandths, unit, tens, hundreds, thousands etc.

For example, in the number 316.2;

The place value of 3 is hundreds. The place value of 1 is tens. The place value of 6 is units. The place value of 2 is tenths.

In the real-world, their instances where there are limitations in counting and representing real numbers that are infinite (too small or too large). In order to overcome these limitations or barriers, we use place values.

An overflow error arises when a real number cannot be represented because it is too large and exceeds the upper limits of a range chosen.

Also, a roundoff error can be defined as the difference between the output generated from an algorithm using an exact or actual numbers and the output generated using rounded or finite-precision numbers.

Hence, overflow and roundoff errors result from real-world limitations in representing place values.

Database are pranized in
consist of a series of
which consist of a senes of​

Answers

Answer:

fields and records I guess is the answer

Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.

Answers

Answer:

A better RPG game all the one that are existing are the same dull thing

Explanation:

Answer:

There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.

Write a simple JavaScript function named makeFullName with two parameters named givenName and familyName. The function should return a string that contains the family name, a comma, and the given name. For example, if the function were called like this: var fn = makeFullName("Theodore", "Roosevelt");

Answers

Answer:

Explanation:

Ji

A JavaScript function exists as a block of code created to accomplish a certain task.

What is a JavaScript function?

In JavaScript, functions can also be described as expressions. A JavaScript function exists as a block of code created to accomplish a certain task.

Full Name with two parameters named given Name and family Name

#Program starts here

#Prompt User for Input "given Name and family Name "

given Name = input("Enter Your given Name: ")

family Name = input("Enter Your family Name: ")

#Define Function

def last F(given Name, Family Name):

  given Name = given Name[0]+"."

  print(Last Name+", "+Family Name);

last F(given Name, Family Name) #Call Function

#End of Program

To learn more about JavaScript function

https://brainly.com/question/27936993

#SPJ2

ark titanoboa taming

Answers

Huh???????................

it is a passive tame throw the an egg down and it will eat it if it attacks you or gets attacked it will reset the taming process

Explanation:

list down four ways to start word 2010​

Answers

1Locate the Word icon on the Start button's All Programs menu. Don't click to start Word now!
2Right-click the Microsoft Word 2010 menu item. A pop-up menu appears.
3Choose Send To→Desktop (Create Shortcut).
4Press the Esc key to hide the Start button menu and view the desktop.

Should the security researcher have published exploit code that affects every version of Windows and cannot be patched

Answers

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

Typically you will not find biometric devices in _________ security buildings. Low High Minimal Medium

Answers

Answer:

Low

Explanation:

Biometrics security systems are hardware scanners that are useful for capturing the biometric of individuals as a means of verifying identity. These scans would be matched against the saved database and in turn access would be approved or denied to the system. In other words, biometric security gives the human body the “key” to unlock your access into buildings.

You will not find such devices in low security buildings.

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Answers

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.


A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him
administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.
Which of the following security practices was violated?
Principle of least privilege
Strong password policy
Entry control roster
Multifactor authentication

Answers

Answer:

Principle of least privilege

Explanation:

The principle of least privilege means the user has only access to that data which is required to complete the task

Therefore as per the given situation, Joe who is an emloyee wants to access the client data base but later on he needs to access the payroll data base

So as per the given situation, the first option should be violated

Hence, the same is to be considered

The term structure, as it relates to programming, refers to the decisions you make to design your program to best meet its objective. Coral provides features to create clean, efficient code. How can the basic if/elseif/else control statements help meet structural design objectives in your code?

Answers

Answer:

Explanation:

if/elseif/else control statements help accomplish efficient code since it provides a condition. The program analyzes the code and determines if certain criteria are met, if so then it continues down a certain pre-defined path   which would be the most efficient path towards the main program objective. If these criteria are not met then the code would follow the next most efficient path. This is all controlled through if/elseif/else statements. They ultimately provide various options for reaching the final objective in an order of most efficient to least efficient.

.NET
It is considered the College database.
1. Create a console application to display the information
from the Teacher table.
2. Create a Windows Forms application for
entering the information in the Teacher table


3. For the Teacher table:
a) create its XML representation;
b) display the representation in a Windows application
Forms in alphabetical order by teacher name (
without idprof);
c) Display each name and surname of each teacher
together with the department to which he belongs.

Please help, need at least the first 2 exercises.

Answers

Answer:

This is called contradiction cloud responsibility (CCR)

Explanation:

Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?

Answers

Answer:

The port that should be set open to allow users to access this new server is:

TCP port.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.

Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way for her to do this? Use an existing template. Design a new theme for the presentation. Create a custom template for the presentation. Search for a design template online.

Answers

Answer:

The answer is A

Explanation:

Edge 2020

Zahid needs to ensure that the text flows around an image instead of the image being placed on a separate line as the text. Which tab on the Layout dialog box should Zahid use to perform this task? Position Text Wrapping Size He can’t do this on the Layout dialog box.

Answers

Answer:

I believe the answer is He can't do this on the layout dialog box

Explanation:

You use the format tab for text wrapping.

( Sorry if I'm wrong )

Answer:

B.) Text Wrapping

Explanation:

I think that's the right answer. It's how you can make the text flow around an image in doc so I assume it's right. I'm really sorry if it's wrong :(

Which of these are illegal activities? Check all that apply.

running a pyramid scheme
offering free gifts
threatening to harm property
downloading a virus
hacking a computer

Answers

Answer:

Offering free gifts

Explanation:

Answer:

ace

Explanation:

Which form of data does the image represent? (10 points)
A. Analog data
B. Digital data

Answers

The image in the photograph is representing A. Analog Data. Analog data is data that is represented in a physical way. Where digital data is a set of individual symbols, analog data is stored in physical media, whether that's the surface grooves on a vinyl record, the magnetic tape of a VCR cassette, or other non-digital media. Analog and digital signals are different types which are mainly used to carry the data from one apparatus to another. Analog signals are continuous wave signals that change with time period whereas digital is a discrete signal is a nature. Examples of analog technology: photocopiers. old land-line telephones. audio tapes. old televisions (intensity and color information per scan line). Analog and digital signals are the types of signals carrying information. The major difference between both signals is that the analog signals that have continuous electrical signals, while digital signals have non-continuous electrical signals.
Other Questions
Whats the square root of 36 The alpha decay of radon-198 Find the probability P(z < 0.37) using the standard normal distribution. 4(3n-2)=what and explain by righting out. each step i need help will mark brainliest !ASAP! what are the coefficients of 4x -7 - 8x +17 Help me with elar pls The additive inverse of the complex number a+bi is -a-bi. The sum of a complex number and its additive inverse is zero.Example: (5+4i)+(-5-4i)=0What is the additive inverse of 2 + 8i?2 + 8i2 8i2 8i2 + 8i Select the correct answer. Which statement best identifies the authors purpose in the excerpt? State of the Union Speech 1962by John F. Kennedy (excerpt)Members of the Congress, the Constitution makes us not rivals for power but partners for progress. We are all trustees for the American people, custodians of the American heritage. It is my task to report the State of the Union--to improve it is the task of us all.In the past year, I have traveled not only across our own land but to other lands-to the North and the South, and across the seas. And I have found--as I am sure you have, in your travels--that people everywhere, in spite of occasional disappointments, look to us--not to our wealth or power, but to the splendor of our ideals. For our Nation is commissioned by history to be either an observer of freedom's failure or the cause of its success. Our overriding obligation in the months ahead is to fulfill the world's hopes by fulfilling our own faith.A.to report on the current conditionB. to explain the goals of the administrationC.to motivate Congress to work togetherD.to remind Congress about its history True or False? The Townsend act placed a tax on imported goods? A circle has radius 50 cm. Which of these is closest to its area? Group of answer choices During migration, a gray whale swam 5,040 miles, The whale swam a total of 672 miles during its first 7 days of migration. If the wliale swam at the same rate during the entire migration, how many miles did it swim during the first 30 days of migration? Which expression is equivalent to (3x2)(x+6) ?A. 3x2+16x12B. 4x + 12x + 4C. 4x + 4D. 3x + 20x + 12 I dont have a question, I just wanted to say good luck everyone who have finals. dont be to stressed you will get through this even though we are all crying over all the essays that need to be written :( and so muchhh morreeeee :( :( but we will get this be positive and have an amazing Christmas ! :) Enter a value for x that makes the equation 7x - 2(x + 1) + 18 = 8x - 11 true. 2 What is the GCF of y2(y + 1) and y(y + 2)? In four to five sentences, compare and contrast the governments of Sparta and Athens. What is the slope of the segment with end points at (300, -2) and (500,6) Ann and Ruth bowled together and had a combined score of 410 points. Ann's score was 44 points less than Ruth's score. Write a system of equations that can be used to determine x, Ann's score and y, Ruth's score. Which kind of budget would cause the largest increase ina country's nationaldebt?A. One that decreases taxes and increases spendingB. One that decreases taxes and decreases spendingC. One that increases taxes and decreases spendingD. One that increases taxes and increases spending