2. In many jurisdictions a small deposit is added to containers to encourage people to recycle them. In one particular jurisdiction, containers holding one litre or less have a $0.10 deposit, and containers holding more than one litre have a $0.25 deposit. Write a Python script that reads the number of containers of each size from the user. The script should compute and display the refund that will be received for returning those containers. Format the output so that it includes a dollar sign and displays exactly two decimal places.

Answers

Answer 1

Answer:

Here is the Python program:

small_container = int(input("Enter the number of small containers you recycled?"))

large_container = int(input("Enter the number of large containers you recycled?"))

refund = (small_container * 0.10) + (large_container * 0.25)

print("The total refund for returning the containers is $" + "{0:.2f}".format(float(refund)))

Explanation:

The program first prompts the user to enter the number of small containers. The input value is stored in an integer type variable small_container. The input is basically an integer value.

The program then prompts the user to enter the number of large containers. The input value is stored in an integer type variable large_container. The input is basically an integer value.

refund = (small_container * 0.10) + (large_container * 0.25)  This statement computers the refund that will be recieved for returning the small and larger containers. The small containers holding one litre or less have a $0.10 deposit so the number of small containers is multiplied by 0.10. The large containers holding more than one litre have a $0.25 deposit so the number of large containers is multiplied by 0.25. Now both of these calculated deposits of containers of each side are added to return the refund that will be received for returning these containers. This whole computation is stored in refund variable.

print("The total refund for returning the containers is $" + "{0:.2f}".format(float(refund))) This print statement displays the refund in the format given in the question. The output includes a $ sign and displays exactly two decimal places by using {0:.2f} where .2f means 2 decimal places after the decimal point. Then the output is represented in floating point number using. format(float) is used to specify the output type as float to display a floating point refund value up to 2 decimal places.

2. In Many Jurisdictions A Small Deposit Is Added To Containers To Encourage People To Recycle Them.
Answer 2

The required code which calculates the amount of refund made by returning the containers written in python 3 goes thus :

small_size = eval(input('Enter number of 1L or less containers to be returned: '))

#prompts user to enter the number of small sized containers to be returned

big_size = eval(input('Enter number of containers greater than 1L to be returned: '))

#prompts user to enter the number of big size containers to be returned

small_refund = (small_size * 0.10)

#calculates the total refund on small sized containers

big_refund = (big_size * 0.25)

# calculates the total refund on big size containers

total_refund = float((small_refund + big_refund))

#calculates the Cummulative total refund

print('Your total refund is $' + '{0:.2f}'.format(total_refund))

#displays the total refund rounded to 2 decimal places.

Learn more :https://brainly.com/question/14353514

2. In Many Jurisdictions A Small Deposit Is Added To Containers To Encourage People To Recycle Them.

Related Questions

what is the main experience in life after all completing studies​

Answers

Answer:

Problebly find love and have a stable job?

Explanation:

What process should be followed while giving a reference?
sam

Answers

Keep the information factual. Avoid opinions about issues such as personal conflicts
Qualify what you say. For example, “It was our experience or “In this situation
Make your praise specific. ...
Refer to specific tasks or projects
Avoid examples that highlight a candidate's weaknesses.

What are the importance of Help and Support feature of Windows​

Answers

Answer:

Explanation:

Start Menu Returns. It's what Windows 8 detractors have been clamoring for, and Microsoft has finally brought back the Start Menu. ...

Cortana on Desktop. Being lazy just got a lot easier. ...

Xbox App. ...

Project Spartan Browser. ...

Improved Multitasking. ...

Universal Apps. ...

Office Apps Get Touch Support. ...

Continuum.

what happens to files and subfolders within an efs encrypted folder?

Answers

When an EFS (Encrypting File System) encrypted folder is created, the files and subfolders within it are automatically encrypted.

When you enable EFS encryption on a folder in Windows, the files and subfolders contained within that folder are encrypted using the user's EFS certificate. EFS is a feature in Windows that provides file-level encryption to protect sensitive data from unauthorized access.

Once encryption is applied to the folder, the files and subfolders inherit the encryption attributes of the parent folder. This means that any new files or subfolders created within the encrypted folder will also be automatically encrypted. Similarly, any existing files or subfolders that are moved into the encrypted folder will be encrypted as well.

The encryption process converts the contents of the files into an unreadable form, making it inaccessible to anyone who does not possess the appropriate encryption key. When a user with the necessary credentials accesses an encrypted file or subfolder, the file or subfolder is decrypted on-the-fly, allowing the user to view and modify its contents.

Learn more about encrypted folder visit:

https://brainly.com/question/30530076

#SPJ11

what is application software?

Answers

Answer:

In information technology, an application ( app ), application program or application software is a computer program designed to help people perform an activity. Depending on the activity for which it was designed, an application can manipulate text, numbers, audio, graphics, and a combination of these elements.

Answer:

A set of programs that are used to solve particular problems of the user through computer is called application software.

Which filter gives a “squeezed” effect to an image?

Answers

Explanation:

When using the pinch filter, you simply select a percentage from -100 to 100 to pinch or squeeze your image. The Pinch filter squeezes a selection or layer inward or outward.

Briefly, describe how cell phones are able to affect "cartel"
members' pricing and why this didn't happen without the cell
phones.

Answers

Cell phones have had a significant impact on the pricing strategies of cartel members Instant Communication: Cell phones have revolutionized communication by enabling cartel members to communicate instantly with each other. Previously, members had to rely on slower.

Coordinated Pricing The ability to communicate quickly and effortlessly allows cartel members to coordinate their pricing strategies effectively. They can discuss and agree upon pricing levels that maximize their profits and minimize competition. By maintaining high prices collectively, they can manipulate the market and restrict competition, ultimately maximizing their revenues.

Cell phones also facilitate rapid response to changes in the market. Cartel members can quickly adjust their prices in response to shifts in demand or supply. For example, if a member notices a decrease in demand, they can immediately inform others to decrease prices accordingly.

To know more about cartel members visit :-

https://brainly.com/question/32177331

#SPJ11

a computer that contains a hard drive may be considered a sufficient enclosure for the outer packaging provided it does not reveal classified information.

Answers

This claim is accurate. Hard drive-equipped computers may be used as adequate outer packing as long as they don't disclose any sensitive information.

The hard drive is what?

The physical device that houses all of ones digital material is a hard disc. Digital material that is kept on a hard disc includes your papers, photos, audio, videos, programmes, application settings, and operating system. There are interior and external hard discs.

What is a hard drive and what does it do?

An electro-mechanical digital storage device known as a hard disc drive (HDD), hard disc, hard drive, as well as fixed disc saves and gets digital data using ferrous storage on one or more rigid quickly spinning platters coated with permanent magnets.

To know more about Hard drive visit:

https://brainly.com/question/28098091

#SPJ4

under the ueta, if a party does not follow the security procedures and then fails to detect an error, what happens?

Answers

Under the Uniform Electronic Transactions Act (UETA), if a party does not follow the agreed upon security procedure and then fails to detect an error, the party that conformed to the security procedure will be deemed to have accepted the electronic record.

However, this does not affect any other rights or remedies available to the non-conforming party.

UETA is designed to provide a legal framework for electronic transactions, and it is important to understand how it works in order to ensure that all parties involved in an electronic transaction are properly protected. It is important to make sure that the security procedure is followed correctly, and that all parties understand their rights and responsibilities under UETA.

Learn more about Uniform Electronic Transactions Act (UETA):

https://brainly.com/question/14655690

#SPJ4

What does a black box represent in the system input/output model?.

Answers

Answer:

es un elemento que se estudia desde el punto de vista de las entradas que recibe y las salidas o respuestas que produce, sin tener en cuenta su funcionamiento interno.

Explanation:

what is computer ? write the principle of computer ? ​

Answers

Answer:

Computer is an electronic machine which take raw data as an input process them according to the given instructions and gives helpful result as output.

In Text 1, Line 36. what happens?
if (tasks[i).elapsedTime >= tasks[i].period)
A. If true it's time to tick the state machine
B. If true, its time to reset the period
C. If false, the period needs to be increased
D. if false, elapsedTime is reset to O

Answers

In Text 1, Line 36, what happens is: If (tasks[i].elapsedTime >= tasks[i].period), then it's time to tick the state machine (Option A).

There is a syntax error in the given code snippet. The closing parenthesis after tasks[i) is misplaced and needs to be moved after elapsedTime to correctly access the elapsedTime member of the tasks[i] object.

Assuming the correct syntax is if (tasks[i].elapsedTime >= tasks[i].period), the answer is:

A. If true it's time to tick the state machine.

The if statement is checking if the elapsedTime of the ith task is greater than or equal to the period of the same task. If this condition is true, it means that the task has completed its period and it's time to execute its associated state machine (which is not shown in the given code snippet). This is typically done in real-time systems using a technique called "task scheduling". The task scheduler ensures that each task runs at its designated period by checking the elapsed time and triggering the associated state machine when the period is complete.

Learn more about Scheduling here:

https://brainly.com/question/15875370

#SPJ11

Convert Octal 623, to Decimal number ​

Answers

Answer:

\(403_{10}\)

Hope you got it

If you have  any question just ask me

If you think this is the best answer please mark me as brainliest

SOMEONE PLEASE HELP ME FAST PLEASE PLEASE !!!!

SOMEONE PLEASE HELP ME FAST PLEASE PLEASE !!!!

Answers

Answer:

what

Explanation:

i don't know this oustion ?

By default, tables are sorted in ascending order by this.


What’s the answer?

By default, tables are sorted in ascending order by this.Whats the answer?

Answers

Answer:

Record number

Explanation:

It simply can't be "data type" as there cant be more than one data type in a field. It won't be "primary key field" either as primary keys only set the field as unique. You can test this by changing the primary key to a different field. But for simplicity's sake, I did this experiment for you.

As you can see in the first and second attachments, ID is the primary key, set default by the program.

But when I set Field 8 as the primary key, shown in the third attachment, field 8 doesn't sort, shown in the fourth attachment.

By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?

Answer:

By default, tables are sorted in ascending order by record number.

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

If a password is salted with a 24-bit random number, how big is the dictionary attack search space for a 200,000 word dictionary?

Answers

You must verify 264 more password permutations in your dictionary attack when using a 64-bit salt, or 8 bytes. You must calculate 200,000 264 = 3.69 1024 using a 200,000-word dictionary.

Which password assault strategy targets a big number of accounts with a small number of passwords?

Using a common password or a group of passwords against a large number of potential usernames is known as a reverse brute force attack. focuses on a network of users whose data the attackers have already gotten.

What distinguishes a dictionary password assault from a brute force password attack?

Dictionary attack and brute force differ in the following ways: The dictionary assault differs from a brute force attack in that only the words with the greatest chances of success are examined; this takes less time than brute force. In brute force, all potential key permutations are checked.

to know more about attack search here:

brainly.com/question/14467106

#SPJ4

A LAN is usually confined in a single building.
True
False

Answers

Answer:

true

Hope it helps.you

What dimensions of data quality are directly supported by the primary key / foreign key relationships among tables?
- Completeness and Timeliness
- Uniqueness and Completeness
- Accuracy and Consistency
- Consistency and Uniqueness
- Timeliness and Accuracy

Answers

Accuracy, consistency, completeness, and validity are the aspects of data quality that are directly supported by primary key/foreign key relationships within tables.

What link does a main key have with a foreign key?

Foreign keys are a column or group of columns in a table whose values correspond to the primary key in another table.

What restrictions do the primary key and foreign key uphold?

A primary key constraint in a relational database management system is a column that uniquely identifies each entry in the table, as opposed to a foreign key, which creates a connection between two tables.

To know more about data visit:-

https://brainly.com/question/11941925

#SPJ1

you are the network administrator for your company. all computers are joined to a single active directory domain. several computers store sensitive information. you are configuring security settings that will be distributed to all computers on your network. you want to identify attempts to break into a computer by having the computer that denies the authentication attempt note the failed attempt in its security database. how can you create a policy that meets these requirements?

Answers

policy that meets these requirement Select Failure for Audit account logon events

Administrators use what to configure control and manage users and computers.?

Group Policy is a hierarchical infrastructure that enables a network administrator in charge of Micro soft's Active Directory to implement specific user and computer configurations. Group Policy is primarily a security tool, and can be used to apply security settings to users and computers.

What type of group is typically used to manage resources in a domain?

Domain local groups should be used to manage resource permissions because they can be applied anywhere in the domain. A domain local group can include members of any type in the domain and members from trusted domains.

Which of the following does an Active Directory client use to locate objects in another domain?

Active Directory stores location information on objects in the database, but it uses the Domain Name System (DNS) to locate domain controllers. Every domain in Active Directory has a DNS domain name, and every joined computer has a DNS name within that same domain.

learn more about DNS Visit:

brainly.com/question/17163861

#SPJ4

According to the reading on the course web pages, the earliest usage of cooking began around _____ million years ago.

Answers

Answer:

According to the reading on the course web pages, the earliest usage of clothes began around ____ million years ago. 3.4 1.5 0.8 0.5 1.7 2. According to the reading on the course web pages, lime mortar was probably discovered from annealing: Charcoal Obsidian Flint Glass 3.

Explanation:

which of the following statements is true about the restoration of convicted felons' civil rights?

Answers

The restoration of convicted felons' civil rights varies by state. In some states, felons automatically regain their civil rights upon completion of their sentence, while in others, they must apply for restoration. In some states, certain felony convictions can result in permanent loss of civil rights.

Some of the civil rights that can be lost include the right to vote, serve on a jury, hold public office, and own firearms. However, there has been a recent trend towards restoring felons' voting rights, with some states passing laws to automatically restore voting rights upon completion of a sentence or parole. In conclusion, the restoration of convicted felons' civil rights is not a one-size-fits-all policy and varies by state, with some states being more lenient than others in their restoration processes.

To know more about civil rights visit:

brainly.com/question/14397578

#SPJ11

When assigning a literal to a variable of the byte type, if the literal is too large to be stored as a byte value, it _________

Answers

When assigning a literal to a variable of the byte type, if the literal is too large to be stored as a byte value, it receives a compile error.

What is a compile error?

Compilation error is known to be one that connote the  state at which a compiler is known to have failed to put together a piece of computer program source code, and this can be due to errors in the code, or others.

Hence, When assigning a literal to a variable of the byte type, if the literal is too large to be stored as a byte value, it receives a compile error.

Learn more about byte value from

https://brainly.com/question/15981925

#SPJ1

Write a definition in your own words for intranet. Please don't copy and paste.

Answers

Answer:

An Intranet is a communication network, usually, a private network that was created using the World Wide Web software.

Explanation:

An Intranet is an private Network based on internet standards but only available within a business or other organizations.

you are the administrator of the eastsim domain, which has two domain controllers. your active directory structure has organizational units (ous) for each company department. you have assistant administrators who help manage active directory objects. for each ou, you grant one of your assistants full control over the ou. you come to work one morning to find that while managing some user accounts, the administrator in charge of the sales ou has deleted the entire ou. you restore the ou and all of its objects from a recent backup. you want to configure the ou to prevent accidental deletion. you edit the ou properties, but can't find the protect object from accidental deletion setting. what should you do so you can configure this setting?

Answers

1 ) Edit the properties for each OU to prevent accidental deletion.

2) Remove full control permissions from each OU. Run the Delegation of Control wizard for each OU, granting permissions to perform the necessary management tasks.

What is OU?

An organizational unit (OU) is a container that houses users, groups, and computers within a Microsoft Active Directory domain. It is the smallest unit to which an administrator can apply account permissions or Group Policy settings. Multiple organizational units may be contained within one another, but each containing OU's attributes must be distinct from the others. Other domain objects cannot be included in Active Directory organizational units.

"Organizational unit" is frequently abbreviated to "OU" in everyday speech. Even in Microsoft's own documentation, "container" is frequently used in its place. All terms are accepted as being accurate and interchangeable.

The majority of OUs at Indiana University are structured first around campuses, then around departments, and sub-OUs are then distinct divisions within departments.

Learn more about organizational units

https://brainly.com/question/13440440

#SPJ4

behave online in the same way as you wish to be treated true false​

Answers

True; you have treat others the way you want to be treated. It is the golden rule for meeting anyone, whether it's online or in real life. If you were being mean to someone online, would you want someone to be mean to you the same way you were mean to that person? So, the answer is true.

Can someone pls help with this (20 points)

Can someone pls help with this (20 points)

Answers

Answer:

1. A

2. D

3. C

4. B

Explanation:

Hope this helps! Not sure if this is correct but im pretty sure the answers I gave are accurate. If Im wrong about any of the answers i put someone please correct me in the comments! :)

Web technologies like Flash, CSS, Java, and HTML often depend on APIs to accomplish what task?

Answers

In Programming, web technologies like the front end part e.g Flash, CSS, Java, and HTML  depends on back end APIs for task like data persistence, sending and getting data e.g post and get request in summary perform CRUD(Create, read, update and delete) operations

The development of web application is basically divider into two

The front end, done basically with technologies like HTML CSS, JavaScriptBack end, this can be done using Python, C#, Java, or any suitable language

Th front end depends on the back end for sending and retrieving information

Learn more:

https://brainly.com/question/8391970

In a networking context, architecture refers to
A: the building that houses the network
B: design
C: the hardware
D: a well built network

Answers

Answer:

The Bootstrap Protocol (BOOTP) is a computer networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices

Explanation:

C

Answer:

B: Design

Explanation:

A(n) _____________ changes the order in which instructions are carried out by directing the computer to execute a statement elsewhere in the program.

Answers

Based on computer operation analysis, A sequence control structure changes the order in which instructions are carried out by directing the computer to execute a statement elsewhere in the program.

Generally, the sequence control structure is characterized by its line-by-line execution features.

It is a process of command by which statements are executed in a chronological order they are placed in the program.

Sequence control structure can be used for many operations, including the following:

Read or write operations, Arithmetic operations, Assignments to variables, etc.

Hence, in this case, it is concluded that the correct answer is "Sequence control structure."

Learn more about Sequence control structure here: https://brainly.com/question/24694068

Other Questions
The recognition that an organization's success is dependent on, and tied directly to, how well it values, engages, and includes the rich diversity of its community members is known as: 5. An adolescent has suspected infectious mononucleosis after exposure to the virus in the past week. The primary care pediatric nurse practitioner examines the adolescent and notes exudate on the tonsils, soft palate petechiae, and diffuse adenopathy. Which test will the primary care pediatric nurse practitioner perform to confirm the diagnosis?a. Complete blood countb. EBV-specific antibody testingc. Heterophile antibody testingd. Throat culture _____ describe the shared expectations group members have regarding each individuals communication behavior in the group. How did the Romanov dynasty make Russia agreat power? Why does the mode of fertilization correlate with the presence or absence of male parental care? |x+3| if x>5 |x+3 if x>2 |x+3| if x=2|x-3| if x>5|120+x| if x I need help, please im stuck on this problem Find two whole numbers that the 407 falls in between. Justify your answer. A 6,000-gallon pool is being filled.Graph A shows the amount of water in the pool as the pool fills.Graph B will show the amount of water needed to fill the pool as the pool fills.Complete each statement about the new graph.On Graph B, at 0 hours, the height of the graph will be at 0 gallonsat 3000 gallonsat 6000 gallonsThen, the graph will increase, decrease, or stay level until 8 hours, when the pool is full.At 8 hours, the height of Graph B will be at 0 gallons3000 gallons6000 gallons elton mayo's researchers concluded that worker motivation improved when managers listened to worker's ideas and suggestions. In the Thermo Fisher application note on lon Chromatography (Lesson 4), a method is described on the second page. What mobile phase is used in the beginning of the method? 10 mM KOH O 10 mM sodium carbonate O 10 ug/L bromate O 1000 ug/L NaF plsssss helppppp asapppppppppp why do we need to conserve electricity During self-construction of an asset by Richardson Company, the following were among the costs incurred: Fixed overhead for the year $1,000,000 Portion of $1,000,000 fixed overhead that would be allocated to asset if it were normal production 80,000 Variable overhead attributable to self-construction 100,000 What amount of overhead should be included in the cost of the self-constructed asset With the charactermany scholars believe that Chaucer is indirectly criticizing the church how do cells at the completion of meiosis compare with cells that have replicated their dna and are just about to begin meiosis 1 they have twice the amount of cytoplasm and half the amount of dna 2 they have half the number of chromosomes and half the amount dna 3? How does the graph of the function g(x) = 2x - 3 differ from the graph of f(x) = 2X? .A. It is moved up 3 units.B.It is moved down 3 units.C. It is moved right 3 units.D. It is moved left 3 units. TRUE/FALSE palliative care is provided in the location where it it is needed: home, medical offices, clinics, hospitals, nursing homes, and hospice facilities. A company purchases a building by signing a $200,000 10% interest bearing note due at the end of five years. at what amount should the building be recorded?