Write a program to ask the user how many apples they are buying, and then output the total cost of the apples.

Answers

Answer 1

In python:

apple_price = (whatever price you choose)

apple_quantity = int(input("How many apples are you buying? "))

print(f"The total cost of {apple_quantity} apple(s) is ${apple_quantity * apple_price}")


Related Questions

Submit your three to five page report on three manufacturing careers that interest you.

Answers

Answer:

Manufacturing jobs are those that create new products directly from either raw materials or components. These jobs are found in a factory, plant, or mill. They can also exist in a home, as long as products, not services, are created.1

For example, bakeries, candy stores, and custom tailors are considered manufacturing because they create products out of components. On the other hand, book publishing, logging, and mining are not considered manufacturing because they don't change the good into a new product.

Construction is in its own category and is not considered manufacturing. New home builders are construction companies that build single-family homes.2 New home construction and the commercial real estate construction industry are significant components of gross domestic product.3

Statistics

There are 12.839 million Americans in manufacturing jobs as of March 2020, the National Association of Manufacturers reported from the Bureau of Labor Statistics.4 In 2018, they earned $87,185 a year each. This included pay and benefits. That's 21 percent more than the average worker, who earned $68,782 annually.5

U.S. manufacturing workers deserve this pay. They are the most productive in the world.6 That's due to increased use of computers and robotics.7 They also reduced the number of jobs by replacing workers.8

Yet, 89 percent of manufacturers are leaving jobs unfilled. They can't find qualified applicants, according to a 2018 Deloitte Institute report. The skills gap could leave 2.4 million vacant jobs between 2018 and 2028. That could cost the industry $2.5 trillion by 2028.

Manufacturers also face 2.69 million jobs to be vacated by retirees. Another 1.96 million are opening up due to growth in the industry. The Deloitte report found that manufacturers need to fill 4.6 million jobs between 2018 and 2028.9

Types of Manufacturing Jobs

The Census divides manufacturing industries into many sectors.10 Here's a summary:

Food, Beverage, and Tobacco

Textiles, Leather, and Apparel

Wood, Paper, and Printing

Petroleum, Coal, Chemicals, Plastics, and Rubber

Nonmetallic Mineral

Primary Metal, Fabricated Metal, and Machinery

Computer and Electronics

Electrical Equipment, Appliances, and Components

Transportation

Furniture

Miscellaneous Manufacturing

If you want details about any of the industries, go to the Manufacturing Index. It will tell you more about the sector, including trends and prices in the industry. You'll also find statistics about the workforce itself, including fatalities, injuries, and illnesses.

A second resource is the Bureau of Labor Statistics. It provides a guide to the types of jobs that are in these industries. Here's a quick list:

Assemblers and Fabricators

Bakers

Dental Laboratory Technicians

Food Processing Occupations

Food Processing Operators

Jewelers and Precious Stone and Metal Workers

Machinists and Tool and Die

Medical Appliance Technicians

Metal and Plastic Machine Workers

Ophthalmic Laboratory Technicians

Painting and Coating Workers

Power Plant Operators

Printing

Quality Control

Semiconductor Processors

Sewers and Tailors

Slaughterers and Meat Packers

Stationary Engineers and Boiler Operators

Upholsterers

Water and Wastewater Treatment

Welders, Cutters, Solderers

Woodworkers11

The Bureau of Labor Statistics describes what these jobs are like, how much education or training is needed, and the salary level. It also will tell you what it's like to work in the occupation, how many there are, and whether it's a growing field. You can also find what particular skills are used, whether specific certification is required, and how to get the training needed.11 This guide can be found at Production Occupations.

Trends in Manufacturing Jobs

Manufacturing processes are changing, and so are the job skills that are needed. Manufacturers are always searching for more cost-effective ways of producing their goods. That's why, even though the number of jobs is projected to decline, the jobs that remain are likely to be higher paid. But they will require education and training to acquire the skills needed.

That's for two reasons. First, the demand for manufactured products is growing from emerging markets like India and China. McKinsey & Company estimated that this could almost triple to $30 trillion by 2025. These countries would demand 70 percent of global manufactured goods.12

How will this demand change manufacturing jobs? Companies will have to offer products specific to the needs of these very diverse markets. As a result, customer service jobs will become more important to manufacturers.

Second, manufacturers are adopting very sophisticated technology to both meet these specialized needs and to lower costs.

If an artist would like a drawing to be freely available everyone, make it

Answers

Answer:

he first would draw it with paint and that it I want to say

Answer:

Is that a question or you are saying?

Explanation:

Code to be written in python:
Correct code will automatically be awarded the brainliest

You had learnt how to create the Pascal Triangle using recursion.

def pascal(row, col):
if col == 1 or col == row:
return 1
else:
return pascal(row - 1, col) + pascal(row - 1, col - 1)

But there is a limitation on the number of recursive calls. The reason is that the running time for recursive Pascal Triangle is exponential. If the input is huge, your computer won't be able to handle. But we know values in previous rows and columns can be cached and reused. Now with the knowledge of Dynamic Programming, write a function faster_pascal(row, col). The function should take in an integer row and an integer col, and return the value in (row, col).
Note: row and col starts from 1.

Test Cases:
faster_pascal(3, 2) 2
faster_pascal(4, 3) 3
faster_pascal(100, 45) 27651812046361280818524266832
faster_pascal(500, 3) 124251
faster_pascal(1, 1) 1

Answers

Answer:

def faster_pascal(row, col):

   # Create a list of lists to store the values

   table = [[0 for x in range(col + 1)] for x in range(row + 1)]

 

   # Initialize the first row

   table[1][1] = 1

 

   # Populate the table

   for i in range(2, row + 1):

       for j in range(1, min(i, col) + 1):

           # The first and last values in each row are 1

           if j == 1 or j == i:

               table[i][j] = 1

           # Other values are the sum of values just above and left of the current cell

           else:

               table[i][j] = table[i-1][j-1] + table[i-1][j]

 

   # Return the required result

   return table[row][col]

print(faster_pascal(3, 2))

print(faster_pascal(4, 3))

print(faster_pascal(100, 45))

print(faster_pascal(500, 3))

print(faster_pascal(1, 1))

Brainliest if this helps! :))

When a refrigerant enters the compressor, it is a___ and when it leaves the compressor, it is a ____?

Answers

When a refrigerant enters the compressor, it is a low-pressure gas, and when it leaves the compressor, it is a high-pressure gas.

In a typical refrigeration cycle, the refrigerant starts in the evaporator as a low-pressure gas, where it absorbs heat from the surrounding space and evaporates into a vapor.

This low-pressure vapor then enters the compressor, which raises the pressure of the refrigerant and compresses it into a smaller volume, causing an increase in temperature. This is why when the refrigerant leaves the compressor, it is a high-pressure gas.

The high-pressure gas then moves to the condenser, where it releases heat to the surroundings and condenses into a high-pressure liquid. The high-pressure liquid then flows through the expansion valve or capillary tube, where it undergoes a pressure drop, causing the liquid to rapidly expand and become a low-pressure gas again. This low-pressure gas then re-enters the evaporator to absorb more heat, and the cycle continues.

Learn more about refrigeration here:

brainly.com/question/13002119

#SPJ4

Write a function that receives a StaticArray where the elements are already in sorted order, and returns a new StaticArray with all duplicate values removed. The original array must not be modified. You may assume that the input array will contain at least

Answers

The code that remove duplicate is as follows:

def remove_duplicate(mylist):

    mylist = list(dict.fromkeys(mylist))

    return mylist

print(remove_duplicate([1, 1, 2, 3, 3, 5, 6, 7]))

Code explanation

The code is written in python.

we defined a function named "remove_duplicate" and it accept the parameter "mylist".The variable "mylist" is used to store the new value after the duplicate vallues has been removed.Then, wed returned mylist.Finally, we call the function with the print statement . The function takes the required parameter.

learn more on python here: https://brainly.com/question/21126936

Write a function that receives a StaticArray where the elements are already in sorted order, and returns

when did anyone ever ask

Answers

Answer:

ikr

Explanation:

Answer:

thxxxxx

Explanation:

g7g6cf6c6cyc6

Finish the VPython code to move the ball down seven units.

Answers

The ball's speed needs to be specified. By designating it as ball.velocity, you can make the ball's velocity an attribute.

What is the purpose of VPython?

VPython is a Python extension that enables simple, "pythonic" 3D. It's been utilized by research scientists to view systems or data in 3D. It is used in education for a range of purposes, include teaching physics and programming.

How can VPython be installed on Windows 10?

Make sure the installer can install Python27 in C:. Python 2.7.x from python.org is required for this version of VPython; any other version will not function properly. Make sure the installer can install Python27 in C:.

To know more about VPython visit:

https://brainly.com/question/20749336

#SPJ1

an affective website design should fullfill its intended by conveying its message while simultaneosly engaging the visitors?do you agree or disagree​

Answers

Answer: True

Explanation:

The statement that "an effective website design ought to be able to fulfill the function that it has by passing the message across while engaging the visitor at the same time" is true.

Some of thr factors which bring about a good website design are functionality, simplicity, imagery, consistency, colours, typography. A website that's well designed and built will help in the building of trust.

Question 1 of 4
OSHA requires which of the following trenches to have a protective system installed?
Select the best option.
O
A trench 1 foot deep.
A trench 3 feet deep.
A trench 14 feet deep.

Answers

Answer:

These are all wrong. OSHA requires a trench to have a protective system starting at 5 feet.

Explanation:

OSHA's own rules state this, unless it is in stable rock. If it is under 5 feet, it isn't required and can be decided by someone qualified.

A trench 14 feet deep would definitely require a protective system, due to the the minimum being 5 feet.

Your friend Alicia says to you, “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I don’t think I’m going to do that.” How would you respond to Alicia? Explain.

Answers

Since my friend said  “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I will respond to Alicia that it is very easy that it does not have to be hard and there are a lot of resume template that are online that can help her to create a task free resume.

What is a resume builder?

A resume builder is seen as a form of online app or kind of software that helps to provides a lot of people with interactive forms as well as templates for creating a resume quickly and very easily.

There is the use of Zety Resume Maker as an example that helps to offers tips as well as suggestions to help you make each resume section fast.

Note that the Resume Builder often helps to formats your documents in an automatic way  every time you make any change.

Learn more about resume template from

https://brainly.com/question/14218463
#SPJ1

What is a countermeasure that could be implemented against phishing attacks?
Smart cards
Biometrics
Two-factor authentication
Anti-virus programs

Answers

Two-factor authentication:- Two-factor authentication (2FA) is an additional layer of security that requires a second method of authentication in addition to a password. It is also known as multi-factor authentication (MFA).Smart cards, biometrics, and one-time passwords (OTPs) are all examples of 2FA mechanisms that are frequently used.

Antivirus programs:- Antivirus programs can assist in preventing phishing attacks by preventing malicious code from running on a user's device.

Smart cards:- A smart card is a secure device that can be used to store sensitive data, such as a user's private key or a digital certificate.

Biometrics:- Biometric authentication is a security measure that uses physical and behavioral characteristics to verify a user's identity.

Two-factor authentication:- Two-factor authentication (2FA) is an additional layer of security that requires a second method of authentication in addition to a password. It is also known as multi-factor authentication (MFA).Smart cards, biometrics, and one-time passwords (OTPs) are all examples of 2FA mechanisms that are frequently used.2FA works by asking the user to verify their identity in two different ways, such as entering their password and a one-time code generated by an app or sent to their phone. This makes it much more difficult for attackers to obtain access, even if they have obtained a user's password.

Antivirus programs:- Antivirus programs can assist in preventing phishing attacks by preventing malicious code from running on a user's device. Antivirus software can detect malware and spyware that are frequently delivered in phishing emails, and it can prevent these malicious files from being downloaded and installed on a user's device.

Smart cards:- A smart card is a secure device that can be used to store sensitive data, such as a user's private key or a digital certificate. Smart cards can be used for authentication, encryption, and digital signature functions, making them a useful tool for preventing phishing attacks.

Biometrics:- Biometric authentication is a security measure that uses physical and behavioral characteristics to verify a user's identity. Biometrics can include fingerprint scanning, facial recognition, voice recognition, and other biometric technologies. Biometric authentication can be used in conjunction with passwords or smart cards to provide an additional layer of security against phishing attacks.

For more such questions on Antivirus, click on:

https://brainly.com/question/17209742

#SPJ8

many people are now using the web not simply to download content, but to build communities and upload and share content they have created. this trend has been given the name

Answers

The term "Web 1.0" describes the early development of the World Wide Web. In Web 1.0, the vast majority of users were content consumers and there were very few content creators.

Personal websites were widespread and mostly included static pages maintained on free web hosts or web servers controlled by ISPs.

Web 1.0 forbids the viewing of ads while browsing websites. Ofoto, another online digital photography websites from Web 1.0, allowed users to store, share, view, and print digital images. Web 1.0 is a content delivery network (CDN) that allows websites to present the information. One can use it as their own personal webpage.

The user is charged for each page they see. Users can access certain pieces of information from its directories. Web 1.0 was prevalent from around 1991 until 2004.

Four Web 1.0 design requirements are as follows:

1.static web pages

2.The server's file system is used to serve content.

3.Pages created with the Common Gateway Interface or Server Side Includes (CGI).

4.The items on a page are positioned and aligned using frames and tables.

To know more about Web 1.0 click on the link:

https://brainly.com/question/14411903

#SPJ4

PLEASE HELP ASAP WILL GIVE 100 POINTS!!!!
Suppose a packet that is transmitted across the internet contains the following information (from left to right):

Bits 1-4: Packet sequence number within the message.
Bits 5-8: Total number of packets in the message.
Bits 9-16: Number identifying the sender.
Bits 17-24: Number identifying the receiver.
Bits 25-64: Part of the actual message being sent.

Here is one of the packets being sent over the internet:
01111011 10000001 11001110 01010110 00111100 10011100 11100010 10001111

Which of the following statements about this packet is true? Select one answer

A)This is packet 1 out of 8 total packets in the message.
B)This is packet 7 out of 11 total packets in the message.
C)This is packet 14 out of 22 total packets in the message.
D)This is packet 123 out of 129 total packets in the message.

Answers

Answer:

The correct answer is C.

The packet sequence number is stored in bits 1-4, which in this case is 10011100. This is equal to 23 in decimal.

The total number of packets in the message is stored in bits 5-8, which in this case is 01010110. This is equal to 22 in decimal.

Therefore, this is packet 23 out of 22 total packets in the message.

* * *

Here is a breakdown of the bits in the packet:

```

Bits | Description

------- | --------

1-4 | Packet sequence number

5-8 | Total number of packets in the message

9-16 | Sender ID

17-24 | Receiver ID

25-64 | Message data

`

Which steps will import data from an Excel workbook? Use the drop-down menus to complete them.
1. Open the database.
2. Click the *BLANK*
tab.
3. In the import & Link group, click *BLANK*
4. Click *BLANK* to locate a file.
5. Navigate to and open the file to import.
6. Select the Import option.
7. Click OK.
8. Follow the instructions in the wizard to import the object.

Which steps will import data from an Excel workbook? Use the drop-down menus to complete them.1. Open

Answers

Answer:

what are the blank options

Answer:

The answer is

1. External Data

2. Excel

3. Browse

Explanation:

EDGE 2021

The dealer’s cost of a car is 85% of the listed price. The dealer would accept any offer that is at least $500 over the dealer’s cost. Design an algorithm that prompts the user to input the list price of the car and print the least amount that the dealer would accept for the car. C++

Answers

Here is an algorithm in C++ that prompts the user to input the list price of the car and prints the least amount that the dealer would accept for the car:

#include <iostream>

using namespace std;

int main() {

   double list_price, dealer_cost, min_accepted_price;

   const double DEALER_COST_PERCENTAGE = 0.85;

   const double MIN_ACCEPTED_PRICE_OVER_COST = 500;

   cout << "Enter the list price of the car: ";

   cin >> list_price;

   dealer_cost = list_price * DEALER_COST_PERCENTAGE;

   min_accepted_price = dealer_cost + MIN_ACCEPTED_PRICE_OVER_COST;

   cout << "The least amount the dealer would accept for the car is: $" << min_accepted_price << endl;

   return 0;

}

The algorithm starts by including the library iostream and declaring the namespaces. Then it declares the variables that will be used in the program (list_price, dealer_cost, min_accepted_price) and the constants that will be used (DEALER_COST_PERCENTAGE and MIN_ACCEPTED_PRICE_OVER_COST). Then it prompts the user to enter the list price of the car. Next, it calculates the dealer's cost by multiplying the list price by the dealer cost percentage and the minimum amount the dealer would accept by adding the dealer's cost to the minimum accepted price over cost. Finally, it prints the least amount the dealer would accept for the car.

Write a method named isPalindrome that accepts a string parameter and returns true if that string is a palindrome, or false if it is not a palindrome. For this problem, a palindrome is defined as a string that contains exactly the same sequence of characters forwards as backwards, case-insensitively. For example, "madam" or "racecar" are palindromes, so the call of isPalindrome("racecar") would return true. Spaces, punctuation, and any other characters should be treated the same as letters; so a multi-word string such as "dog god" could be a palindrome, as could a gibberish string such as "123 $$ 321". The empty string and all one-character strings are palindromes by our definition. Your code should ignore case, so a string like "Madam" or "RACEcar" would also count as palindromes.

Answers

Answer:

The programming language is not stated;

However, I'll answer this question using Java Programming Language;

The method is as follows;

   public static void isPalindrome(String userinput)

    {

       String reverse = "";

       int lent = userinput.length();

int j = lent - 1;

while(j >= 0)

       {

           reverse = reverse + userinput.charAt(j);

           j--;

       }

       if(reverse.equalsIgnoreCase(userinput))

       {

           System.out.println("True");

       }

       else

       {

           System.out.println("False");

       }    

    }

Explanation:

This line defines the method isPalindrome with a string parameter userinput

public static void isPalindrome(String userinput) {

This line initializes a string variable

       String reverse = "";

This line gets the length of the userinput

       int len = userinput.length();

The following while-loop gets the reverse of userinput and saved the reversed string in reverse

int j = lent - 1;

while(j >= 0)

       {

           reverse = reverse + userinput.charAt(j);

           j--;

       }

The following if statement checks if userinput and reverse are equal (cases are ignored)

       if(reverse.equalsIgnoreCase(userinput))

       {

           System.out.println("True"); This line is executed if the if condition is true

       }

       else

       {

           System.out.println("False"); This line is executed if otherwise

       }  

    } The method ends here

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected

Answers

Considering the situation described here, the thing to do to ensure that the host OS is protected is to install a virtual machine.

What is a virtual machine?

Virtual Machine is the virtualization of a computer system. The purpose of a Virtual Machine is to deliver the functionality of a physical computer containing the execution of hardware and software.

How Virtual Machine is used to ensure that the host OS is protected

Virtual Machine is used to host the virtual environment and subsequently run the operating system within the virtual machine.

This process allows the sandbox to be isolated from the physical hardware while accessing the installed operating system.

Hence, in this case, it is concluded that the correct answer is to install a virtual machine.

Learn more about Virtual Machine here: https://brainly.com/question/24865302

Difference between single dimensional array and double dimensional array​

Answers

A one-dimensional array keeps track of a single list of elements with the same data type. An array of various arrays, a list of multiple lists, or an array of numerous one-dimensional arrays are all stored in a two-dimensional array. It is a list that represents several data pieces.


Integrated circuits are made up of that carry the electrical current

Answers

Answer:


solid-state components

Explanation:


Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Answers

Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.

Writting the code:

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

Number of DB pages allocated = 270

Sweep interval = 20000

Forced Writes are ON

Transaction - oldest = 190

Transaction - oldest active = 191

Transaction - oldest snapshot = 191

Transaction - Next = 211

ODS = 11.2

Default Character set: NONE

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

...

Default Character set: NONE

See more about SQL at brainly.com/question/19705654

#SPJ1

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

In reinforcement learning, an episode:

Answers

In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.

The reinforcement learning

During an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.

The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.

Read more on reinforcement learning here:https://brainly.com/question/21328677

#SPJ1

if you wanted to analyze user journeys across a website and an app, and see how new users were arriving at both, which of these techniques should you use for insights?

Answers

These techniques should be used with Analytics 4 properties if you wanted to investigate user journeys across a website and an app and see how new users were arriving at both.

An application for a mobile device, such as a phone, tablet, or watch, is referred to as a mobile application or mobile app. Mobile applications frequently contrast with web applications, which operate in mobile web browsers rather than directly on the mobile device, and desktop programs, which are created to run on desktop computers.

The public demand for apps led to a rapid expansion into other fields such as mobile games, factory automation, GPS and location-based services, order-tracking, and ticket purchases. Apps were initially intended for productivity assistance such as email, calendar, and contact databases, but there are now millions of apps available. A lot of apps need an internet connection. Typically, app shops are used to download apps.

Learn more about the app here:

https://brainly.com/question/11070666

#SPJ4

What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:


Width


Height


Length


They need to be written in this format: ___________X___________X___________


Fill in the blanks.
for my sibling.

Answers

Answer:

Length x Width x Hight

Explanation:

Discuss the decidability/undecidability of the following problem.
Given Turing Machine , state of and string ∈Σ∗, will input ever enter state ?
Formally, is there an such that (,⊢,0)→*(,,)?

Answers

Note that in the caseof the problem described, there is no algorithm that can determine with certainty whether   a given Turing machine, state, and input string will ever enter a specific state.

How is this so?

The problem of determining whether a given Turing machine, state, and string will ever enter a specific state is undecidable.

Alan Turing's   halting problem proves that thereis no algorithm that can always provide a correct answer for all inputs.

Due to the complex and unpredictable   behavior of Turing machines, it is impossible todetermine if a state will be reached in a general case.

Learn more about Turning Machine at:

https://brainly.com/question/31771123

#SPJ1

I have no clue how to find my recently viewed imaged on my windows 10. Please help!

Answers

To find your recently viewed images on a Windows 10 computer, follow these steps:

Open the File Explorer by clicking the folder icon on your taskbar or by pressing the Windows key + E on your keyboard.

Click on the "Pictures" folder in the left pane to view your images.

To see your recently viewed images, click on the "Recent" folder in the left pane.

To view images from a specific folder, click on the folder's name in the left pane.

If you cannot find the images you are looking for, you can use the search function to find them. To do this, click on the search box at the top of the File Explorer window and enter a keyword or phrase related to the image you are looking for.

I hope this helps! Let me know if you have any other questions or need further assistance.

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioned

item includes an ID number, item description, length of auction in days, and minimum required bid.

Design a flowchart or pseudocode for the following:

-a. A program that accepts data for one auctioned item. Display data for an auction only if the

minimum required bid is more than $250.00

Answers

The pseudocode for the program: Announce factors for the unloaded thing information, counting:

auction_id (numbers)

item_description (string)

auction_length (numbers)

minimum_bid (drift)

Incite the client to enter the auction_id, item_description, auction_length, and minimum_bid.

What is the pseudocode?

The program acknowledges information for one sold thing, counting the auction_id, item_description, auction_length, and minimum_bid. It at that point checks in case the minimum_bid for the unloaded thing is more prominent than or rise to to $250.00.

The pseudocode for the program pronounces factors for the sold thing information and prompts the client to enter the information. At that point it employments an in the event that articulation to check in case the minimum_bid is more noteworthy than or break even with to 250.00.

Learn more about pseudocode  from

https://brainly.com/question/24953880

#SPJ1

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioneditem

How have advancements in technology and social media impacted communication and relationships in our society?

Answers

Answer:The advancement of technology has changed how people communicate, giving us brand-new options such as text messaging, email,  and chat rooms,

Explanation:

Answer: the answer will be they allow faster and more efficient communication and can help build relationships.

Explanation:

Anna bought a box of blueberries for £7. She used 700 grams for a cheesecake and she has 450 grams left. How much did the blueberries cost per 100 grams?

Answers

0.61 (rounded up)

Explanation:

You add both 700 and 450 which will give you 1150g

You then divide 1150 by 100 which gives you 11.5

Then divide 7 by 11.5 which will give you 0.61 as cost of every 100 grams

1.
_______touchscreens detect changes in
electrical currents to register input.

Answers

Answer: Capacitive Touch Screen

Explanation: That is what they are called.

Other Questions
ANSWER QUICKLY PLEASEFill in the blank to complete the sentence. Binary Digit 1 0 0 0 0 0 1 1 Decimal Equivalent of Place Value 128 64 32 16 8 ? 2 1 A high level language like Python is converted to bytecode, and then binary when the program is executed. The missing place value is this binary number is _____ Read the article below and answer the question that follows.Science Mysteries: How Many Species Are There?You might think that after 200 years, the scientists who find, name, and describe Earth's species would be close to finished. But taxonomists, as organized as they may be, have no idea how many species Earth has. Nor can they even provide an educated guess. Although reporting over 16,000 new species every year, taxonomists still cannot predict how many more are undiscovered.In total, taxonomists have categorized and listed 1.2 million species on Earth. At this point, you would think scientists should be able to use the information they have gathered to make good predictions about how many species an ecosystem can support. This would help them make better predictions about how many species are left to identify. So far, however, the guesses seem to vary so greatly that it seems there is no good theory for making a prediction.One of the main problems is that most of the places that seem to have a lot of diverse species are in places that are hard to get to. One such place is the ocean, where scientists believe some 80 percent of Earth's creatures are hiding at depths too deep for us to study. In addition, many of the planet's most diverse areas are in remote places with few taxonomists.Despite all the unknowns, scientists have agreed that there are between five and 15 million species left to discover on Earth. This is a huge range, but whether it's five or 15, taxonomists clearly still have a lot of work to do. And who knows, there may yet be a dragon or a Loch Ness monster left to discover.Which of the following best paraphrases the paragraph that says One of the main problems is that most of the places that seem to have a lot of diverse species are in places that are hard to get to. One such place is the ocean, where scientists believe some 80 percent of Earth's creatures are hiding at depths too deep for us to study. In addition, many of the planet's most diverse areas are in remote places with few taxonomists.?A: One problem is that lots of places that may have lots of diverse species are hard to get to. Take the ocean, where taxonomists believe 80 percent of species are hiding. Also, the planet has diverse areas with remote places.B: Scientists have difficulty finding and identifying over three-quarters of the world's species due to their habitats being out of human reach. Due to deep oceans and isolated locations, many species will go undiscovered.C: The depth of the ocean makes it tough to see things. D: There is an issue with locating a large number of species because of the ocean. What is the citizenship clause ?. to increase profits, bob, the neighborhood drug dealer, decides to mix marijuana with some newly introduced drugs which will weaken the effects of marijuana. this practice is known as Consider the following destructive acts: soccer fans bludgeoning one another, young people throwing rocks at police officers, and Klansmen lynching African Americans. All of these are examples of the dangerous effects of How do you maintain a health singing voice Newborns have difficulty in transcribing the gene for CD40L. Does this help to explain the susceptibility of newborns to pyogenic infections why bananas are curved You have only one attempt. Use a text entry and answer the following questions: 1) When the string of a bow and arrow is pulled, the elastic energy is converted to energy of the arrow when the string is released. 2) Name the organelle involve in photosynthesis in plant cell. 3) What is autotroph term means? Provide an example 4) In Photosynthesis: carbon dioxide, water, and sunlight give you and What name is given to the Sahara by the Muslims? Marys utility function is U1(x1,x2)=x1x2 and Marias utility function is U2(x1,x2)=x11/2x21/2. Initial endowments are respectively (4,6)(4,6). Then which of the following allocations are on the contract curve?a.Mary: (4,6)(4,6)and Maria: (6,4)(6,4)b.Mary: (5,5)(5,5) and Maria: (4,4)(4,4)c.Mary: (3,3)(3,3) and Maria: (7,7)(7,7)d.Mary: (5,5)(5,5)and Maria: (6,6)(6,6) Why didn't this cure the plague: Plague-stricken patients hang toads around their necks, either dead or alive, whose venom should, within a few days, draw out the poison. Henre de RochasPhysicianLyon, France 134 Unit Activity: The Early and Mid-Nineteenth Century: RomanticismLiterary AnalysisConduct and write a literary analysis about any work you have read in this unit.Reread the work you select, making note of any particular literary element that stands out. Choose the literary element and aspect of the text that you will examine in your analysis. Follow the procedure outlined below to write your literary analysis. Your paper should be approximately two to three pages in length. It should include a logical introduction, body, and conclusion that develops and supports your thesis. Include a work cited page as well as in-text citations in MLA format to document your sources, including the literary text you selected to analyze. Explain why 1 + 1 equals 2 in the most complex way possible If the area of a triangleis 24 cm2what are some possiblebase & heightmeasurements? imagine that you were the creator of the AGe Rager write out an advertisement for this product What year was the Louisana Purchase Find the converse of the following statement. If x equals 5, then 4x equals 20. a. Ifx equals 5, then 4x does not equal 20. b. If 4x equals 20, then x equals 5. c. If 4x does not equal 20, then x does not equal 5. d. If 4x does not equal 20, then x equals 5. which of the following best describes the formatting of the list of references at the end of an apa-formatted paper? What are the legal responsibilities of Washington's citizens? Check all that apply.All workers must pay federal income taxes.All citizens must obey local, state, and national laws.All adults must be available for occasional jury service.All citizens who are government leaders are free to ignore laws they disagree withAll young men must serve in the military for at least one year.All young women must register with the Selective Service System