The code segment to read the unit price of a product, quantity purchased and to compute and print the amount of the purchase after the rebate if applicable in a department store is given below:
price = float(input("Enter the unit price of the product: "))
quantity = int(input("Enter the quantity purchased: "))
amount = price * quantity
if amount >= 20.0:
rebate = 0.10 * amount
amount = amount - rebate
print("Amount of the purchase after rebate: $", amount)
Code Segment to read unit price of a product, quantity purchased and to compute and print the amount of the purchase after the rebate if applicable in a department store is given below:
Step 1: Start
Step 2: Read the unit price of a product
Step 3: Read the quantity purchased
Step 4: Calculate the amount of the purchase using the formula, Amount = Quantity purchased × Unit Price
Step 5: Check if the amount of the purchase is at least $20.00
Step 6: If the amount of the purchase is at least $20.00, then calculate the amount of the rebate using the formula, Rebate = 0.10 × Amount of the purchase
Step 7: Calculate the amount of the purchase after the rebate using the formula, Amount after rebate = Amount of the purchase – Rebate
Step 8: Print the amount of the purchase after the rebate if applicable
Step 9: Stop
The code segment to read the unit price of a product, quantity purchased and to compute and print the amount of the purchase after the rebate if applicable in a department store is given below:
price = float(input("Enter the unit price of the product: "))
quantity = int(input("Enter the quantity purchased: "))
amount = price * quantity
if amount >= 20.0:
rebate = 0.10 * amount
amount = amount - rebate
print("Amount of the purchase after rebate: $", amount)
The above code segment reads the unit price of a product and the quantity purchased, computes the amount of the purchase, and checks if the amount of the purchase is at least $20.00.
If the amount of the purchase is at least $20.00, then it calculates the amount of the rebate, calculates the amount of the purchase after the rebate, and prints the amount of the purchase after rebate if applicable.
Learn more about code segment here:-
https://brainly.com/question/30506412
#SPJ11
What is a status update?
A. An automatic enhancement to a computer's performance
B. Any new software that can be downloaded for free
C. A short post in which users write what they are doing
D. A news flash that announces new government posts
The uniform commercial code is a major source of laws influencing data and privacy.a. Trueb. False
The correct response is b. False, A significant source of regulations affecting data and privacy is the universal commercial code.
A set of laws called a commercial code are meant to control business. By establishing procedures for handling frequent problems and disagreements, commercial codes can help trade. All 50 states in the US have ratified the Uniform Commercial Code (UCC). the trading and buying of products. Deals on commercial paper (for example, banking transactions, letters of credit) Deposits in a bank. The National Conference of Commissioners on Uniform State Laws (NCCUSL) and the American Law Institute (ALI) jointly developed the Uniform Commercial Code (UCC), whose main goal is to ensure that commercial operations are uniform and, consequently, effective, nationwide. All commercial transactions in the US are governed by the Uniform Commercial Code (UCC), a comprehensive body of law.
Learn more about commercial code here
https://brainly.com/question/27941016
#SPJ4
HELP ILL MARK BRAINLIETS!! What kind of statement is used to determine which path a program will take? priority statement
sometimes statement
first/then statement
conditional statement
Answer:
Conditional Statement
Explanation:
Answer:
Conditional statement
Explanation:
In computer science, conditional statements, conditional expressions and conditional constructs are features of a programming language, which perform different computations or actions depending on whether a programmer-specified boolean condition evaluates to true or false. A conditional statement, symbolized by p q, is an if-then statement in which p is a hypothesis and q is a conclusion. The logical connector in a conditional statement is denoted by the symbol. The conditional is defined to be true unless a true hypothesis leads to a false conclusion.
Use the conversion table below to help you answer the question.
What is the decimal value of the b-i-n-a-r-y number 1011?
0.1011
0.1100
11
13
Which are the external application-oriented devices that provide application security?
Firewalls, next-generation firewalls, IDS/IPS, and web application firewalls exist the external application-oriented devices that furnish application security.
What is external application-oriented devices?Firewalls, next-generation firewalls, IDS/IPS, and web application firewalls exist the external application-oriented devices that furnish application security. A firewall functions as a barrier or gatekeeper between your computer and another network like the internet. It works like a traffic controller, monitoring and filtering traffic that desires to acquire access to your operating system. In computing, a firewall exists as a network security system that monitors and prevents incoming and outgoing network traffic established on predetermined security rules. A firewall typically establishes a barrier between a trusted web and an untrusted network, such as the Internet.
An Intrusion Prevention system can respond to this in real-time by blocking or preventing such actions. Network-based IPS systems utilize 'in-line' so that all network traffic can be monitored for malicious codes and attacks. A web application firewall (WAF) exists a firewall that monitors, filters, and blocks data packets as they transit to and from a website or web application. A WAF can be either network-based, host-based, or cloud-based and exists often deployed through a reverse proxy and positioned in front of one or more websites or applications.
To learn more about Firewalls refer to:
https://brainly.com/question/25798879
#SPJ4
Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome
Using the knowledge of computational language in JAVA it is possible to write a code that input N numbers from the user in a Single Dimensional Array .
Writting the code:class GFG {
// Function to reverse a number n
static int reverse(int n)
{
int d = 0, s = 0;
while (n > 0) {
d = n % 10;
s = s * 10 + d;
n = n / 10;
}
return s;
}
// Function to check if a number n is
// palindrome
static boolean isPalin(int n)
{
// If n is equal to the reverse of n
// it is a palindrome
return n == reverse(n);
}
// Function to calculate sum of all array
// elements which are palindrome
static int sumOfArray(int[] arr, int n)
{
int s = 0;
for (int i = 0; i < n; i++) {
if ((arr[i] > 10) && isPalin(arr[i])) {
// summation of all palindrome numbers
// present in array
s += arr[i];
}
}
return s;
}
// Driver Code
public static void main(String[] args)
{
int n = 6;
int[] arr = { 12, 313, 11, 44, 9, 1 };
System.out.println(sumOfArray(arr, n));
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Write is an ipo cycle? Describe with figure
Answer:
The input–process–output (IPO) model, or input-process-output pattern, is a widely used approach in systems analysis and software engineering for describing the structure of an information processing program or other process.
PLEASE MARK ME AS BRAINLIEST
An employee at a large global firm is sending a document with sensitive information to a co-worker in another country. how should the contents of the document be protected?
The employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data with end-to-end encryption.
How document be protected?
There are many ways a computer file can be protected. The ways to protect the document are,
Using the cloud based secure file sharing sites.The protected view can be used to secure the contents of the document sending to another country.When the file is end-to-end encrypted between the employee and co worker, then no one can be seen the file in between.Thus, the employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data end-to-end encryption.
Learn more about the data protection here;
https://brainly.com/question/4219149
#SPJ2
Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?
The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,
One of the challenges of EDI is that it is ensuring compatibility between different systems and also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.
Learn more about EDI here
https://brainly.com/question/29755779
#SPJ4
Several small stores rent space within a larger shopping centre. The owners of the shopping centre have provided a physical network throughout the entire centre.
(a) Explain how virtual networking can be used to give each store a private logical network. Diagrams may be used in your answer.
Answer:
okay so my first question is what is this question for because I cant really answer without more info
the security system has detected a downgrade attempt when contacting the 3-part spn
Text version of LSA Event 40970 When contacting the 3-part SPN, the security system discovered an attempt to downgrade.
What is a three-part SPN?The service class comes first, the host name comes second, and the service name comes third (if it's present). Adding a ":port" or ":instancename" component as a suffix to the host name part is optional.Text version of LSA Event 40970 When contacting the three-part SPN, the security system discovered an attempt to downgrade. The error message reads, "The SAM database on the Windows Server does not have a computer account for the workstation trust relationship (0x0000018b)" An authentication refusal was made.In every domain of an Active Directory, there is a default account called KRBTGT. It serves as the domain controllers' KDC (Key Distribution Centre) service account.To learn more about Security system refer to:
https://brainly.com/question/29037358
#SPJ4
Ill give 100 points to whoever gives me the CORRECT answer. I keep getting syntax errors when I do the "add:" part. Can someone walk me through this code?
Part A One of the biggest benefits of writing code inside functions is that we can reuse the code. We simply call it whenever we need it! Let’s take a look at a calculator program that could be rewritten in a more reusable way with functions. Notice that two floats (decimal numbers, but they can also include integers) are inputted by the user, as an operation that the user would like to do. A series of if statements are used to determine what operation the user has chosen, and then, the answer is printed inside a formatted print statement. num1 = float(input("Enter your first number: ")) num2 = float(input("Enter your second number: ")) operation = input("What operation would you like to do? Type add, subtract, multiply, or divide.") if operation == "add": print(num1, "+", num2,"=", num1 + num2) elif operation == "subtract": print(num1, "-", num2,"=", num1 - num2) elif operation == "multiply": print(num1, "*", num2,"=", num1 * num2) elif operation == "divide": print(num1, "/", num2,"=", num1 / num2) else: print("Not a valid operation.") Your job is to rewrite the program using functions. We have already looked at a function that adds two numbers. Using that as a starting point, we could call the add function from within our program in this way: if operation == “add”: result = add(num1, num2) print(num1, "+", num2,"=",result) Now it’s your turn to do the following: Type all of the original code into a new file in REPL.it. Copy the add function from the unit and paste it at the top of your program. Write 3 additional functions: subtract, multiply, and divide. Pay careful attention to the parameters and return statement. Remember to put the three functions at the top of your Python program before your main code. Rewrite the main code so that your functions are called. Part B There are many different ways that a user could tell us that he or she would like to add two numbers in our calculator program. The user could type “add”, “Add”, “ADD”, or “+”, to name a few possibilities. Of cour
Answer:
sorry but there is not enough information to complete this
Explanation:
working on rewriting my code so i can paste it here! itll be done in a sec
Jason is the motion picture projectionist at the local IMAX theater. This means that he runs the huge movie projector so that customers can see the feature on the big screen. What pathway in the Arts, AV Technology, and Communication cluster does he work in? Question 1 options: AV Technology and Film Printing Technology Journalism and Broadcasting Telecommunications
Answer:
AV technology i think hopefully im right
Explanation:
K12
Which type of network activities are handled by the presentation layer of the osi model?
The presentation layer of the OSI model is responsible for managing the formatting and encryption of data exchanged between applications. It handles network activities such as data translation, compression, encryption, and decryption.
Here are some specific network activities handled by the presentation layer:
1. Data formatting: The presentation layer ensures that data is presented in a format that is understandable by the receiving application. For example, it may convert data from ASCII to Unicode or vice versa.
2. Data compression: The presentation layer compresses data to reduce the amount of data that needs to be transmitted over the network. This can help improve network performance and reduce bandwidth usage.
3. Encryption and decryption: The presentation layer can encrypt data before sending it over the network and decrypt it at the receiving end. This ensures data confidentiality and security during transmission.
4. Data syntax validation: The presentation layer checks the syntax and structure of data to ensure it is correct and compatible with the receiving application.
In summary, the presentation layer of the OSI model handles activities such as data formatting, compression, encryption, decryption, and syntax validation to ensure smooth communication between applications.
To know more about network activities visit:
https://brainly.com/question/27629086
#SPJ11
What does it mean when someone silences notifications?.
Answer:
Silencing notifications does not alert someone when the notification comes in. It is silent. These settings were invented to help avoid distractions. The notifications still come in just quietly without an alert and can be checked at any time. Lots of people silence notifcations at night, while sleeping, while studying, etc.
Explanation:
give two examples of situations or applications where electrical circuits are used
Answer:
An electric circuit incorporates a gadget that offers energy to the charged particles establishing the flow, like a battery or a generator.
Explanation:
Gadgets that utilization flow, like lights, electric engines, or PCs; and the interfacing wires or transmission lines.
Learn more about electrical circuits refer:
https://brainly.in/question/41016Two examples of situations or applications where electrical circuits are used include:
Electrical gadgets LightsElectrical circuits allow the movement of electricity from one point to another and are integral to the usage of anything that uses electricity.
Every and anything that uses electricity will have an electrical circuit and this includes:
electrical gadgets such as laptops, phones, video games etc lights - all kinds of electrical lights work with circuitsIn conclusion, so long as electricity is flowing through something, it uses an electrical circuit.
Find out more at https://brainly.com/question/22145752.
Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo
Answer:
Una red informática es una fusión de varios sistemas electrónicos técnicos, principalmente independientes que permite que los sistemas individuales se comuniquen entre sí. El objetivo aquí es el intercambio de recursos como impresoras de red, servidores, archivos y bases de datos.
La estructura de red más conocida es Internet, y los protocolos a través de los cuales se transmite la información más conocidos son el TCP (Protocolo de control de transmisión) y el IP (Protocolo de Internet), pero varios otros protocolos también desempeñan funciones importantes en Internet. Internet en sí no es una red homogénea, sino que consta de un gran número de subredes, algunas de las cuales tienen diseños muy diferentes, que solo tienen en común las capas de protocolo superiores y que manejan la transmisión de datos de usuario en las capas de protocolo inferiores en muy diferentes caminos.
What is the function of input device?
Answer:
The function of an input device is to communicate information to a computer or other sort of information processing equipment. Input devices are types of peripheral devices that communicate with processing units.
Combining the definitions of three words describes a data analyst. What are the three words? Select an answer: 1. analysis, analyze, and technology 2. data, programs, and analysis 3. analyze, data, and programs 4.data, analysis, and analyze
Data, analysis, and analyze. Data analysts use data, analysis, and the ability to analyze to gather insights and trends from various sources.
What is the Data?The data is any set of information which can be analyzed and used to make decisions. It can be collected from various sources such as surveys, research, experiments, observations, and historical records. Data can be qualitative or quantitative, and it can be structured or unstructured. Data analysis is the process of interpreting and making sense of the data in order to gain insights and make better decisions. Data analysis techniques include data mining, machine learning, and predictive analytics. Data is an important resource for businesses and organizations, as it provides valuable insights about their customers, processes, products, and services.
To learn more about Data
https://brainly.com/question/28498043
#SPJ1
what was the name of the telepresence system pioneered in the eller college of management that allowed for remote synchronous classroom instruction?
The device featured immersive touch input employing a full upper-body exoskeleton along with stereoscopic picture presentation from the remote environment. the first telepresence business to experience economic.
What kinds of telepresence systems are examples of?Telepresence applications include managing operations on a space mission, operating surgical equipment just a few feet away, manipulating deep-sea probes remotely, and interacting with hazardous substances.
A telepresence room is what?For the purpose of employing telepresence equipment during video conferencing, telepresence rooms are private, bookable spaces. These places are visually and acoustically private. From six to eighteen people can be accommodated in small, medium, and big rooms.
To know more about presentation visit:-
https://brainly.com/question/14896886
#SPJ1
Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
No messages will ever be blocked from the user’s mailbox.
Messages can still be blocked at the server level.
Messages cannot be blocked at the network firewall.
Most obvious spam messages will still reach the client computer.
Answer:
The last one
Explanation I think it is D because all of the other answers are saying what happen if you filter it.
The majority of obvious spam messages will continue to reach the client's computer. The correct answer is D.
What is junk mail?Email spam, also known as junk email, spam mail, or plainly spam, is an unrequested email sent in mass. The name is derived from a Monty Programming languages sketch that includes the name of a canned pork product is mentioned. Spam is pervasive, unavoidable, and monotonous.
Back out of the Folder or any message folders users are viewing to access the Mailboxes view. The Junk folder is located beneath the Drafts and Sent directories in the Mailboxes view.
The Junk Email Filter settings can be changed in the Junk E-mail Dialogue box. Click Junk in the Deactivate group on the Home tab, and then click Garbage E-mail Options.
Most obvious spam messages will still reach the client's computer. Then the correct option is D.
More about the junk mail link is given below.
https://brainly.com/question/28354330
#SPJ6
Which fraction represents the shaded part of this circle? 1 2 O 4 Check Answer /3rd grade/
Answer:
1/6 because there is one shaded and the total are 6
1. In which order do the problem solving steps happen?
A) Try, Define, Prepare, and Reflect
B) Reflect, Prepare, Try, and Define
C) Define, Prepare, Try and Reflect
D) Reflect, Try, Prepare, Define
The correct order for the steps that happen in the mechanism of problem-solving may include Define, Prepare, Try and Reflect. Thus, the correct option for this question is C.
What is Problem-solving?Problem-solving may be defined as an act or complete process of defining a problem. This is done by determining the cause of the problem; identifying, prioritizing, and selecting alternatives for a solution; and implementing a solution.
The process of problem-solving begins with identifying the issue followed by defining and preparing the problem with respect to the process. It is a mental process that involves discovering, analyzing, and solving problems. The ultimate goal of problem-solving is to overcome obstacles and find a solution that best resolves the issue.
Therefore, the correct option for this question is C.
To learn more about Problem-solving, refer to the link:
https://brainly.com/question/23945932
#SPJ1
What is the binary equivalent of the decimal number 138?
Answer:
10001010
Explanation:
covert algebraic expressions into mathematical expressions s=ut+at²
Answer:
Python Expression:
u*t+ (1/2)* a*t** 2
How could an online college utilize enterprise software? A. Develop new technical support jobs B. Improve course resources and navigation C. Provide access to course registration D. Supply online word processing software
Answer:
The answer is "Choice B"
Explanation:
The enterprise applications is a software program that is used to meet the demands of planning instead of individual users. It also is referred to as business software applications that include schools, stakeholders involved, clubs, charity organizations as well as the states. Its develops processes for the course or viewing software used by online courses.
Answer:
C. Provide access to course registration
7.3.4 Empty Array (Push/Pop) codehs
To find out, the empty array (Push/Pop) is written in the code below.
What is an empty array?The array's elements are all immediately destroyed when the length attribute is set to zero. A value for an array may not be empty, have a cardinality of zero, or be null.
An array with no elements, a null array value, and an array with all of its elements being the null value are all distinct from one another. A null array is an uninitialized array.
function start(){
var arr = [];
arr.push("3");
println("3");
println("hello");
println("false");
arr.push("12");
arr.push("1");
arr.push("3");
arr.push("5");
Therefore, the coding is written above.
To learn more about empty arrays, refer to the link:
https://brainly.com/question/18649548
#SPJ1
The question is incomplete. Your most probably complete question is given below:
how do i do 7.3.4: Empty Array (Push/Pop)
Cybersquatters:_________.
a. frequently launch denial-of-service attacks against popular Web sites
b. register domain names for famous trademarks or company names to which they have no connection remain connected to popular Web sites
c. for extremely long periods of time making it difficult for others to obtain service employ phishing tactics using the domain names of popular Web sites
It should be noted that cybersquatters b. register domain names for famous trademarks or company names to which they have no connection remain connected to popular Web sites.
What is Cybersquatting?Cybersquatting can be explained as registering as well as selling a domain name with the so that one can benefit from goodwill of someone else's trademark.
It serves as a practice of buying up domain names which is operating on names of existing businesses.
Learn more about Cybersquatting at;
https://brainly.com/question/21400963
starting a maintenance and security safety checklist may be helpful in addressing the important balance between sufficient building security and:
Starting a maintenance and security safety checklist may be helpful in addressing the important balance between sufficient building security and the impact of that security on building occupants.
In order to strike a balance between building security and occupant welfare, a building's maintenance and security checklist should take into account the following factors:
Code Compliance: Fire codes, life safety codes, building codes, and accessibility codes must all be followed for the safety of the building occupants.
Adequate staffing: Having adequate staffing for security personnel can ensure that the necessary security measures are implemented and that building occupants feel safe.
Learn more about Occupational Safety at:
https://brainly.com/question/14310859
#SPJ11
A(n) ____________________ is a special character that can stand for any other character or, in some cases, a group of characters.