In a web-site for an on-line shop a customer is modelled by name, password, and unique id number. A product is modelled by its name, unique id number, and current price (an integer number of pence). Each customer has exactly one shopping basket, which maintains a list of items ready to be ordered. Each item in the basket has a quantity. A basket may be empty. (a) Draw a domain-level UML class diagram for the data model described above. Choose appropriate class names, and model the relationships between each class. (It is not necessary to show method names or fields.) (b) Using the data model described above (i) Write outlines of Java classes for the product and basket classes. Show only the class declarations and instance variables (i.e. method declarations are not needed); and (ii) Write a complete constructor for the basket class and a getTotalCost () method (which should do what its names implies, returning an integer).

Answers

Answer 1

(a) Domain-level UML class diagram:

   +-----------+                    +-------------+

   |  Customer |                    |   Product   |

   +-----------+                    +-------------+

   | String id |                    | String id   |

   | String name|                    | String name|

   | String pwd |                    | int price   |

   +-----------+                    +-------------+

         |                                   |

         +---------------------------------- +

                            |

                  +-----------------+

                  |     Basket      |

                  +-----------------+

                  | List<Item> items|

                  | Customer owner  |

                  +-----------------+

                                    |

                         +----------+----------+

                         |                     |

                  +------+------+      +------+-------+

                  |  Item         |      |       Quantity      |

                  +------+      +------+      

                  | Product      |      | int quantity |

                  | int quantity |      +--------------+  

(b) (i) Java classes for the Product and Basket classes:

java

public class Product {

   private String id;

   private String name;

   private int price;

   // Constructor

   public Product(String id, String name, int price) {

       this.id = id;

       this.name = name;

       this.price = price;

   }

   // Getters and setters

   public String getId() {

       return id;

   }

   public void setId(String id) {

       this.id = id;

   }

   public String getName() {

       return name;

   }

   public void setName(String name) {

       this.name = name;

   }

   public int getPrice() {

       return price;

   }

   public void setPrice(int price) {

       this.price = price;

   }

}

public class Basket {

   private List<Item> items;

   private Customer owner;

   // Constructor

   public Basket(Customer owner) {

       this.items = new ArrayList<Item>();

       this.owner = owner;

   }

   // Getters and setters

   public List<Item> getItems() {

       return items;

   }

   public void setItems(List<Item> items) {

       this.items = items;

   }

   public Customer getOwner() {

       return owner;

   }

   public void setOwner(Customer owner) {

       this.owner = owner;

   }

   // Method to get total cost of all items in basket

   public int getTotalCost() {

       int totalCost = 0;

       for (Item item : items) {

           totalCost += item.getQuantity() * item.getProduct().getPrice();

       }

       return totalCost;

   }

}

(b) (ii) Basket class constructor and getTotalCost() method:

java

public Basket(Customer owner) {

   this.items = new ArrayList<Item>();

   this.owner = owner;

}

public int getTotalCost() {

   int totalCost = 0;

   for (Item item : items) {

       totalCost += item.getQuantity() * item.getProduct().getPrice();

   }

   return totalCost;

}

Note: The Item and Customer classes have not been shown in the diagrams or code as they were not explicitly mentioned in the problem statement.

Learn more about UML here:

https://brainly.com/question/30401342

#SPJ11


Related Questions

question 4 what is the purpose of dns round robin technique? 1 point to resolve an ip to a domain name to redirect traffic from one domain name to another to route traffic to different destinations, depending on factors like location, congestion, or link health to balance traffic

Answers

The fundamental purpose of round robin DNS is to evenly divide the load among geographically dispersed Web servers.

What does the DNS round robin technique accomplish? Mutual exclusion .The primary function of DNS is to evenly divide the load among geographically dispersed Web servers.Routing method that distributes the requests among a list of IP addresses in an orderly form, balancing the traffic for those addresses.A DNS query is an information request to a DNS server.For instance, your browser performs a DNS query each time you input a domain name, such example.com, to find the IP address associated with that domain name. Circle RobinBy controlling the Domain Name System's (DNS) responses to address requests from client computers in accordance with an appropriate statistical model, DNS is a technique for load distribution, load balancing, or fault-tolerance provisioning multiple, redundant Internet Protocol service hosts (e.g., Web servers, FTP servers).

To learn more about round robin technique refer

https://brainly.com/question/16085712

#SPJ1

In a swap you need a _____________ variable so that one of the values is not lost.

Answers

Answer:

temp

Explanation:

:D

There are different type of variable in computer, In a swap you need a temporary variable so that one of the values is not lost.

What is a temporary variable?

A temporary variable is a variable that has a short lifetime,it is use to hold a data that will soon be discarded, or data that will soon be moved to a more permanent memory location.

Therefore, In a swap you need a temporary variable so that one of the values is not lost.

Learn more on temporary variable here,

https://brainly.com/question/13420617

You are writing an algorithm and want to tell the computer what to do if the user does not perform an action. Which type of statement should you include in your algorithm?

Answers

Answer:

If-else statements.

Explanation:

If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

pseudo code will look something like this:

if (condition):

do 1, 2, 3, ...

else:

do 4, 5 , 6, ...

If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

What is Algorithm?

In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

All aspects of information technology employ algorithms extensively. A simple technique that resolves a recurring issue is typically referred to as an algorithm in mathematics and computer science. Algorithms are essential to automated systems because they serve as specifications for processing data.

An algorithm may be employed for simple tasks like sorting lists of numbers or for more challenging ones like suggesting user content on social media. The starting input and instructions for an algorithm's computation are often provided.

Therefore, If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

To learn more about Statement, refer to the link:

https://brainly.com/question/2285414

#SPJ7

Select the correct answer.

Susan is writing a program that organizes weather data into a table using conditional phrases. If she wants to operate on the results of these conditional phrases, what must she do?

A use Boolean values for the results

B. use the results in more conditional phrases

C. use logical operators on the results

D use either >,<, or =​

Answers

Answer:

B.use the results in more conditional phrases

who presented pakistan resolution​

Answers

Search Results
Featured snippet from the web
Fazlul Huq, the Prime Minister of Bengal, was a formal political statement adopted by the All-India Muslim League on the occasion of its three-day general session in Lahore on 22–24 March 1940.

I got it from google!

which cloud model uses some datacenters focused on providing cloud services to anyone that wants them, and some data centers that are focused on a single customer?

Answers

Answer:Hybrid Cloud

Explanation:

The cloud model that uses some data centers focused on providing cloud services to anyone that wants them, and some data centers that are focused on a single customer is the Hybrid Cloud model.

which of the following is incorrect? group of answer choices the constructors in an abstract class are private. you may declare a final abstract class. the constructors in an abstract class should be protected. an abstract class contains constructors. an interface may contain constructors.

Answers

The incorrect statement is "you may declare a final abstract class". This is because an abstract class cannot be final. A final class is one that cannot be extended or inherited from, while an abstract class is meant to be extended or inherited from in order to create concrete classes.

Therefore, declaring a final abstract class is a contradiction and is not allowed in Java.

The other statements are correct. An abstract class can contain constructors, which can be private or protected. However, an interface cannot contain constructors, as it is meant to be implemented by other classes and does not have any instance variables or methods.

In summary, the incorrect statement is "you may declare a final abstract class" because an abstract class cannot be final.

Learn more about abstract class: https://brainly.com/question/29586772

#SPJ11

Aking sense of the death, the social consolidation after a death occurs, and caring for the dying are all functions of the: Multiple choice question. Sociology of death. Determinants of death. Death system. Psychology of death

Answers

The Death System is responsible for understanding the death, the social consolidation after a death occurs, and caring for the dying as it is the functions of the Death System.

The Death System comprises funeral homes, hospitals, cemeteries, crematoria, and various other entities that work to address the needs of the dying, the deceased, and the bereaved.A good understanding of the Death System is critical since it will help in comprehending the ways in which death and dying can affect various sectors of society.

The sociology of death is the study of the social structure, processes, and culture that surrounds death and dying. The determinants of death are the factors that cause or contribute to an individual's death. The psychology of death is the study of the psychological and emotional responses to death and dying.

To know more about responsible visit:

https://brainly.com/question/28903029

#SPJ11

Which is better Mac os, Windows or Linux?​

Answers

Answer:

\(Windows \: or \: Linux.......\)

Depends on what are you gonna do with it. Though all three are widely used, there are significant differences between Linux vs MAC vs Windows. Windows is dominant over the other two as 90% of users prefer Windows. ... Linux is free, and anyone can download and use it. MAC is costlier than Windows, and the user is forced to buy a MAC system built by Apple.

what is the effective access of the editor group on the copied file?

Answers

Without specific context or information about the file, its permissions, and the access rights granted to the editor group, it is not possible to determine the effective access of the editor group on the copied file.

The effective access would depend on the permissions and privileges assigned to the editor group at the file system level or any specific access controls implemented on the file.

Typically, file access permissions include read, write, and execute privileges for different user groups. The effective access of the editor group would be determined by the combination of permissions granted to the group and any individual user permissions within the group.

To determine the effective access of the editor group on the copied file, you would need to examine the file's permission settings and the specific privileges assigned to the editor group.

Learn more about effective access would here:

https://brainly.com/question/29803628

#SPJ11

"






Q2 This question is about Radio Frequency Identification (RFID) tags and their operation 00) Describe the difference in the way that NFC and UHF RFID tags communicate with readers

Answers

The main difference between the way that Near Field Communication (NFC) and Ultra High Frequency (UHF) Radio Frequency Identification (RFID) tags communicate with readers is their operating range. NFC works within a range of a few centimeters, while UHF RFID can operate over longer distances up to several meters away.

NFC and UHF RFID technologies are both used for tracking, identification, and data transfer in various applications. NFC operates at 13.56 MHz frequency, while UHF RFID can operate within 860-960 MHz frequency range.NFC technology is widely used for contactless payments, transportation ticketing, access control, and data sharing between two devices that are in close proximity. NFC readers are typically built into mobile devices such as smartphones or tablets, or specialized NFC readers, and require the NFC tag to be within a few centimeters of the reader.UHF RFID technology, on the other hand, is designed for a much broader range of applications, such as inventory tracking, supply chain management, asset tracking, and access control systems.

UHF RFID tags can be read from a distance of several meters away, allowing for more efficient and automated tracking of items or people.UHF RFID readers are typically stationary or handheld devices that emit radio waves to scan the environment for UHF RFID tags. When the reader detects a tag, it sends a signal to the tag, which then responds with its unique identification code. This process is known as backscatter, and it allows for quick and efficient identification of items even if they are not visible to the reader.UHF RFID technology is generally more expensive than NFC technology, and it requires more complex hardware and software systems to operate. However, its longer range and ability to operate in challenging environments make it a popular choice for many industries.Explanation:NFC and UHF RFID technologies differ in their operating range.

To know more about Near Field Communication visit :

https://brainly.com/question/3942098

#SPJ11

Sean is forecasting the time and cost of developing a customized software program by looking at the number of inputs, outputs, inquiries, files, and interfaces. Which of the following methods is he using?a. Ratiob. Templatec. Apportiond. Function pointe. Learning curve

Answers

The correct answer is option 'd. Function point'.Sean is using Function point (FP) method. Function point method is a software measurement approach for calculating the size of a software application or project, quantifying its functionality and complexity, and predicting its development and maintenance effort.

It measures software size from a functional user perspective, and is designed to reflect the business or end-user functions of the software, rather than its internal structure or implementation.Function point is used to forecast the time and cost of developing a customized software program by looking at the number of inputs, outputs, inquiries, files, and interfaces. Therefore, the correct answer is option 'd. Function point'.

More On Function: https://brainly.com/question/22340031

#SPJ11

Which panel is used to change the opacity of objects on a layer?

Answers

The panel that is used to change the opacity of objects on a layer is called the Layers panel. The Layers panel can be found in many graphics editing software, including Adobe Photoshop and Illustrator.


In the Layers panel, each layer is represented as a separate box or thumbnail. To change the opacity of an object on a layer, simply select the layer that contains the object and adjust the opacity slider located at the top of the Layers panel. This slider typically ranges from 0% (completely transparent) to 100% (completely opaque), allowing for a range of opacity levels to be set.
Alternatively, some graphics editing software may offer additional controls for changing the opacity of objects, such as a separate Opacity panel or a Transparency panel. These panels may offer more precise control over the transparency of an object, allowing for different levels of transparency to be applied to different areas of the object.
Overall, the Layers panel is an essential tool for managing the various elements in a design project and adjusting the opacity of objects on a layer can be easily done with this panel.

For more such question on thumbnail

https://brainly.com/question/6665379

#SPJ11

A school is creating class schedules for its students. The students submit their requested courses and then a program will be designed to find the optimal schedule for all students. The school has determined that finding the absolute best schedule cannot be solved in a reasonable time. Instead they have decided to use a simpler algorithm that produces a good but non-optimal schedule in a more reasonable amount of time. Which principle does this decision best demonstrate

Answers

Answer:

Heuristics

Explanation:

The principle that this kind of decision demonstrate is Heuristics , this is because Heuristics can be used to solve problems when there is no known algorithm to resolve the problem.

Heuristics is a simple algorithm that can provide a good but not optimal solution in the shortest possible time i.e. a shortcut to solutions

Answer:

a

Explanation:

 

What are the 2 types of Digital Imagery?

Answers

Answer:

vector or raster

Explanation:

Suppose you have a word processing application on your smartphone, your tablet, and your laptop. You are at home, and you need to write a paper for a class. A [_____] would be easiest to use for writing your paper.
the words you can use are
desktop
tablet
smartphone

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for the fill-in-blank of this question is desktop.

Because you can easily use the word application using the desktop. You can also use tablet and smartphone for writing a paper on a word processing application.  But you cannot comfortably and easily write the paper as compared to using the desktop for writing the paper. Furthermore, some wordprocessing features are limited in tablets and in smartphones as compared to desktop wordprocessing application.

So a desktop wordprocessor would be easiest to use for writing your paper.

Answer:

It's "Laptop"

Explanation:

ASAP help me I dont have enough time

ASAP help me I dont have enough time

Answers

Answer:third stage of parent-infant attachment

Explanation:

To register your content with the US Copyright Office, visit copyright.gov to get started. Online
registration usually costs between _____ and _____, and you'll have to send a copy of your completed
work to the U.S. Copyright Office either through the mail or via its website. Once your work is
registered, it will be added to the Library of Congress.
$35 and $55
O $25 and $65
O $15 and $35
O $85 and $105

Answers

Answer:

$35 and $55

Explanation:

Online registration usually costs between $35 and $55 , and you'll have to send a copy of your completed work to the U.S. Copyright Office either through the mail or via its website. The correct option is 1.

What is Copyright?

Copyright is a legal concept that grants creators of original works, such as literary, artistic, musical, and other types of intellectual works, exclusive rights.

These rights give the creators the ability to control how their works are used, distributed, and reproduced, as well as receive monetary compensation for their use.

Depending on the type of work and the filing option selected, online registration with the United States Copyright Office typically costs between $35 and $55 for a single work.

It should be noted that these fees are subject to change, and that additional fees may apply for specific services such as expedited processing or special handling.

Thus, the correct option is 1.

For more details regarding copyright, visit:

https://brainly.com/question/22399852

#SPJ6

Your question seems incomplete, the probable complete question is:

To register your content with the US Copyright Office, visit copyright.gov to get started. Online

registration usually costs between _____ and _____, and you'll have to send a copy of your completed

work to the U.S. Copyright Office either through the mail or via its website. Once your work is

registered, it will be added to the Library of Congress.

$35 and $55$25 and $65$15 and $35$85 and $105

What other size PCIe slot might you find on a motherboard? a. PCIe x16 b. PCIe x10 c. PCIe x3 d. PCIe x4.

Answers

Answer:PCIe x4

Explanation:

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which is initially in the top left square facing downwards.
Create a solution that would enable the robot to be in the position found below. Make sure to use CAN_MOVE () to receive credit.

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which

Answers

Using knowledge in computational language in python it is possible to write a code that Create a solution that would enable the robot to be in the position found below.

Writting the code:

import random

lis=[]

for i in range(0,10):

 num=random.randint(1,12)

 lis.append(num)

tot=sum(lis)

avg=tot/10

print(avg)

See more about python at brainly.com/question/18502436

#SPJ1

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

how do I fix this plz help will mark brainliast​

how do I fix this plz help will mark brainliast

Answers

Click yes
Hope this helped

You create an application security group named ASG1.which resource can use ASG1

Answers

An application security group (ASG) is a resource in Microsoft Azure that can be used to simplify network security for virtual machines (VMs).

When you add a VM to an ASG, you can use the ASG to define network security rules that apply to all VMs in the group.In Azure, ASGs can be used to define network security rules for the following resources:Virtual machines: You can use an ASG to define network security rules for one or more VMs in your Azure environment.Virtual machine scale sets: You can use an ASG to define network security rules for all VMs in a scale set.Load balancers: You can use an ASG to define network security rules for backend VMs associated with a load balancer.Network interfaces: You can use an ASG to define network security rules for one or more network interfaces attached to a VM., an ASG in Azure can be used to define network security rules for virtual machines, virtual machine scale sets, load balancers, and network interfaces. By using an ASG, you can simplify network security management and ensure consistent security across multiple resources.

To learn more about application click the link below:

brainly.com/question/28650148

#SPJ4

what is an example of a memo

Answers

Answer:

a memo is just a importent piece text for business like if you wanted to fire someone it would be

dear, insert name here.

   I belive that insert name here was trying to cheat the company for money. I was walking past his/her work space seeing that he was trying to cheat the place for money I would recomend that you should fire this person before this person makes you lose more money.

Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security

Answers

it’s exercise tax $5 tax on a cable television line

hope this helped

~ mo

Capital gains tax - 10% profits from sale of the house

Consumption tax - 6% tax on all sales

Excise tax - 5$ tax on cable tv line

Payroll tax - 15% tax to pay for social security

How to creatte a react app without a git hub repository

Answers

Answer:

You needn't be on Github. You just need to have the software, like visual code installed on your computer.

If you've got all these things sorted, then you'll be able to make apps without github.

Which of the following functions should be used to insert the current date and time in a cell?
A. =TODAY()
B. =NOW()
C. =DATE
D. =CURRENT()

Answers

The correct function to insert the current date and time in a cell is B. =NOW().

This function will display the current date and time in the cell, and will update automatically whenever the worksheet is opened or recalculated. The TODAY() function, on the other hand, will only display the current date, without the time component. The DATE function is used to create a date based on year, month, and day values that are input as arguments, while the CURRENT() function is not a valid Excel function. It's important to note that the date and time will be displayed in the default format, which can be customized using the cell formatting options.

To more about worksheet visit:

https://brainly.com/question/2554742

#SPJ11

The ____ function can be used to convert dates and numbers to a formatted character string.

Answers

The `sprintf` function can be used to convert dates and numbers to a formatted character string.

The `sprintf` function in programming languages such as C, C++, and PHP allows you to convert numerical and date values into a formatted character string. It takes a format string as its first argument, which specifies the desired formatting of the output. The format string can include special format specifiers, such as `%d` for integers, `%f` for floating-point numbers, `%s` for strings, and `%t` for dates. You can also specify additional formatting options, such as the number of decimal places or the width of the output. The function then returns the formatted string based on the provided values. This can be useful for displaying data in a specific format, such as for generating reports or displaying data to users.

Know more about sprintf function here:

https://brainly.com/question/29852413

#SPJ11

Write a program that lets the user enter a string and then the program prints out the character that appears most frequently in the string.
Write in Python.
8.10

Answers

Answer:

# Program to find the most frequent character in a string

# Get the string from the user

string = input("Enter a string: ")

# Create an empty dictionary

char_count = {}

# Iterate through the string and count the frequency of each character

for char in string:

if char in char_count:

char_count[char] += 1

else:

char_count[char] = 1

# Find the character with the highest frequency

max_char = ""

max_count = 0

for char in char_count:

if char_count[char] > max_count:

max_char = char

max_count = char_count[char]

# Print the result

print("The most frequent character is '" + max_char + "' with a frequency of " + str(max_count) + ".")

HELP PLEASE!!!!!!!!!
Please fix the coding! thanks I give brainliest

HELP PLEASE!!!!!!!!!Please fix the coding! thanks I give brainliest

Answers

Answer:

right you have 3 quotes if that is problem

Other Questions
What is added and removed from ATP/ADP Write the algebraic notation for dilation with a scale factor of which is the best short-term option to reach profitability? cut total expenses cut total expenses open new locations open new locations develop new markets develop new markets create a new product As described in your text, how did marketers at disney utilize technology to provide a more hassle-free experience at their theme parks? 449 students were surveyed about their preferences of sports. 146 students like football, 107 students like baseball, and 49 students like both sports. how many students like exactly one of the two sports? Simplify the expression that you wrote in part D, and explain what the number means with regard to the problem. if the value of x is 3 and the value of y is 5, what is displayed as a result of executing the code segment? Brainliest if correct each cell of the body combines nutrients and oxygen and produces energy and waste products through a process called: (a) Willow has created a hangman program that uses a file to store the words the program can select from. A sample of this data is shown in Fig. 3.Fig. 3crime, bait, fright, victory, nymph, loose.Show the stages of a bubble sort when applied to data shown in Fig. 3.(b) A second sample of data is shown in Fig. 4.Fig. 4.amber, house, kick, moose, orange, range, tent, wind, zebra.Show the stages of a binary search to find the word "zebra" when applied to the data shown in Fig. 4. in process-oriented and fixed-position layouts, it is important to minimize the costs of:_______. Due to renovations at her workplace, Luca must move from her current office into a temporary office. Her current office is a square room of dimension xx feet. Her temporary office will be a rectangular room with a length 33 feet greater than her current office's length and a width 55 feet less than her current office's width. Which of the following expressions gives the difference between the area, in square feet, of Luca's current office and the area, in square feet, of Luca's temporary office?A 2x+152x+15 B 2x-152x15 C -2x+152x+15 D -8x-158x15 E 8x+158x+15 What is the limiting reactant if 0.5 g Al is reacted with 0.5 g CuCl2?What is the theoretical yield of copper produced by this reaction? Could you explain to me how I'm supposed to solve this and all the steps? 7. The top of a tree is 35 feet above ground level. The roots reach down 22 feet below groundlevel. What is the difference between the top of the tree and the bottom of the roots? An equilateral triangle has a perimeter of24x + 6. What is the length of one side of the triangle? Did women in Europe have a Renaissance? Did the Renaissance improve the lives of women or did it entrench women further into their traditional gender roles? A woman with a vaginal infection repeatedly experienced pain during intercourse , leading her to eventually stop having sexual intercourse. This is an example of The combustion of FeS forms Fe2O3 and SO2. The combustion of SO2 forms SO3. The SO3 can be treated with water to form sulfuric acid, H2SO+. How many grams of H2SO4 can be produced from 422 grams of iron ore containing 75.0% FeS. TRUE / FALSE. "20. The 1950s witnessed great enthusiasm among many Americans,so much so that the Pledge of Allegiance was altered to say ""onenation, under God."" Group of answer choices