The following pseudocode describes how a widget company computes the price of an order from the total price and the number of the widgets that were ordered. Read the number of widgets. Multiple the number of widgets by the price per widget of 9.99. Compute the tax (5.5 percent of the total price). Compute the shipping charge (.40 per widget). The price of the order is the sum of the total widget price, the tax, and the shipping charge. Print the price of the order

Answers

Answer 1

Answer:

The program in Python is as follows:

widget = int(input("Widgets: "))

price = widget * 9.9

tax = price * 0.55

ship = price * 0.40

totalprice = price + tax + ship

print("Total Price: $",totalprice)

Explanation:

The question is incomplete, as what is required is not stated.

However, I will write convert the pseudocode to a programming language (in Python)

Get the number of widgets

widget = int(input("Widgets: "))

Calculate price

price = widget * 9.9

Calculate the tax

tax = price * 0.55

Calculate the shipping price

ship = price * 0.40

Calculate the total price

totalprice = price + tax + ship

Print the calculated total price

print("Total Price: $",totalprice)


Related Questions

Write a method that prints on the screen a message stating whether 2 circles touch each other, do not touch each other or intersect. The method accepts the coordinates of the center of the first circle and its radius, and the coordinates of the center of the second circle and its radius.

The header of the method is as follows:

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2)


Hint:

Distance between centers C1 and C2 is calculated as follows:
d = Math.sqrt((x1 - x2)2 + (y1 - y2)2).

There are three conditions that arise:

1. If d == r1 + r2
Circles touch each other.
2. If d > r1 + r2
Circles do not touch each other.
3. If d < r1 + r2
Circles intersect.

Answers

Answer:

The method is as follows:

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2){

    double d = Math.sqrt(Math.pow((x1 - x2),2) + Math.pow((y1 - y2),2));

    if(d == r1 + r2){

        System.out.print("The circles touch each other");     }

    else if(d > r1 + r2){

        System.out.print("The circles do not touch each other");     }

    else{

        System.out.print("The circles intersect");     }

}

Explanation:

This defines the method

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2){

This calculate the distance

    double d = Math.sqrt(Math.pow((x1 - x2),2) + Math.pow((y1 - y2),2));

If the distance equals the sum of both radii, then the circles touch one another

    if(d == r1 + r2){

        System.out.print("The circles touch each other");     }

If the distance is greater than the sum of both radii, then the circles do not touch one another

   else if(d > r1 + r2){

        System.out.print("The circles do not touch each other");     }

If the distance is less than the sum of both radii, then the circles intersect

   else{

        System.out.print("The circles intersect");     }

}

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.

Answers

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.

Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts

The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.

Hence, chosen ciphertext attempts the use of modular exponentiation.

Learn more : https://brainly.com/question/14826269

How are dates and times stored by Excel?​

Answers

Answer:

Regardless of how you have formatted a cell to display a date or time, Excel always internally stores dates And times the same way. Excel stores dates and times as a number representing the number of days since 1900-Jan-0, plus a fractional portion of a 24 hour day: ddddd. tttttt

Explanation:

mark me as BRAINLIEST

follow me

carry on learning

100 %sure

Dates are stored as numbers in Excel and count the number of days since January 0, 1900. Times are handled internally as numbers between 0 and 1. To clearly see this, change the number format of cell A1, B1 and C1 to General. Note: apparently, 42544 days after January 0, 1900 is the same as June 23, 2016
Other Questions
On the image below, which is the correct answer? is the sum of two rational numbers sometimes zero ture or false? at the present time, gerald is eight less than five times his nephews age. seven years ago gerald was 9 times his nephews age. (A)if g represents geralds age now and n represents his nephews age today. use a system of equations that could be used to model this scenario?(B)than use the equations to determine algebraically the ages of both Gerald and his nephew.(C)than determine in how many years Gerald will be three times as old as his nephew? How do I solve this? (3^0y)^2x2(xy)^0 3(x-1) (x+1) -6. Topic is Linear inequalities 2. A carpenter wants to cut a wood board that is feet longd on5into pieces that are feet long. How many whole piecescan be cut from the board? How much wood is left over16 Sienna is determining the solution 6b + 12 = 102 A:15 B:17 C:90 D:102 Which of these is provided by a government website and intended to reduceinjuries? Rosalia White will invest $3,000 in an IRA for the next 30 years starting at the end of this year. The investment will earn 13 percent annually. How much will she have at the end of 30 years The list shows the number of points Emma scored in eight basketball games.5, 11, 9, 9, 4, 5, 6, 7 Find the mean. A boy pushes his little brother on a sled. The sled accelerates from rest to (4 m/s). If the combined mass of his brother and the sled is (40.0 kg) and (20 W) of power is developd, how long time does boy push the sled?16s300s15s23s Which best expresses the uncertainty of the measurement 32.23 cm?A.) 0.05 cmB.) 0.1 cmC.) 1%D.) 0.01 cm? according. to mohs scale, which of the following minerals properly corresponds to the hardest and least hard? 20% of 2kg ( in g). Please help Razon trigonometra que se requiere para calcular la altura de la torre si desde una distancia de 50 m se observa su punto mas alto con un ngulo de 48 Kyle buys a bag of cookies that contains 4 chocolate chip cookies, 9 peanut butter cookies, 9 sugar cookies and 7 oatmeal cookies. What is the probability that Kyle randomly selects a sugar cookie from the bag, eats it, then randomly selects a peanut butter cookie Which formula gives the coordinates of the midpoint of the segment connecting points (a, b) and (c, d)?attached below is the optionsthis is worth 100 points How many Cs of Credit are there? A. 8 B. 6 C. 5 D. 7 Which energy store is increased when an object is heated? PLEASE HELP ME PLEASE HELP ME PLEASE HELP ME PLEASE HELP ME PLEASE HELP ME