The Boffo Balloon Company makes helium balloons. Large balloons cost $13.00 a dozen, medium-sized balloons cost $11.00 a dozen, and small balloons cost $8.60 a dozen. Customer order information includes customer name, quantity ordered, and size. This program should output the customer order information and total sales according to what and how many balloons they have ordered.

Answers

Answer 1

Answer:

name = input("Enter customer name: ")

quantity = int(input("Enter quantity: "))

size = input("Enter size [large-medium-small]: ")

if size == "large":

   sales = (quantity / 12) * 13

if size == "medium":

   sales = (quantity / 12) * 11

if size == "small":

   sales = (quantity / 12) * 8.6

   

print(name + " ordered " + str(quantity) + " " + size + " ballons")

print("Total sales is $" + str(sales))

Explanation:

*The code is in Python.

Ask the user to enter name, quantity, and size

Check the size using if structure. Depending on the size, calculate the sales using the given cost for for a dozen.

Print the order information and total sales


Related Questions

To return the value of the cell D8, the formula should be OFFSETA1=________.

Answers

Answer:

The formula is =OFFSET( A1, 7,3,1,1 )

Explanation:

Microsoft excel is a statistical and analytical tool for data management and analysis. Its working environment is called a worksheet. The worksheets are made up of rows and columns also known as records and fields respectively.

Functions like OFFSET in excel is used to return a cell or group of cells. It gets the position to turn by start getting a starting port, then the number of records below it and the fields after, then the length and width of cells to return.

syntax:   =OFFSET( "starting cell", "number of rows below", "number of columns after", "height of cells to return", "width of cells to return" )

Write code to assign the number of characters in the string rv to a variable num_chars.

Answers

Answer:

rv = "hello"

num_chars = len(rv)

print(num_chars)

Explanation:

*The code is in Python.

Initialize the string rv, in this example I set it to "hello"

Use the len() method to get the number of characters in the rv and set it to the num_chars

Print the num_chars

Note that the result will be 5 in this case, because hello consists of five characters

3. List and explain FIVE (5) types of services performed by
operating system?​

Answers

Memory Management
Processor Management
Device Management
File Management
Security

Read the following program requirements prior to completing the Hands-on. A retail company must file a monthly sales tax report listing the total sales for the month and the amount of state and county sales tax collected. The state sales tax rate is 4 percent and the county sales tax rate is 2 percent. Write a program that asks the user to enter the total sales for the month. The application should calculate and display the following: • The amount of county sales tax • The amount of state sales tax • The total sales tax (county plus state) Step 1: Write the steps the algorithm:

Answers

Answer:

state_sales_tax_rate = 0.04

county_sales_tax_rate = 0.02

sales = float(input("Enter the total sales for the month: "))

county_sales_tax = sales * county_sales_tax_rate

state_sales_tax = sales * state_sales_tax_rate

total_sales_tax = county_sales_tax + state_sales_tax

print("The amount of county sales tax is " + str(county_sales_tax))

print("The amount of state sales tax is " + str(state_sales_tax))

print("The total sales tax is " + str(total_sales_tax))

Explanation:

*The code is in Python.

Set the  state_sales_tax_rate and county_sales_tax_rate

Ask the user to enter the sales

Calculate the county_sales_tax, multiply sales by county_sales_tax_rate

Calculate the state_sales_tax, multiply sales by state_sales_tax_rate

Calculate the total_sales_tax, sum county_sales_tax and state_sales_tax

Print the results

Although the original BBS system was simple, it increased people's ability to communicate

across multiple lines

across analog lines

with multiple messages

across long distances

Answers

Answer:

across long distances.

Explanation:

BBS is an acronym for bulletin board system and it can be defined as an application or computer system which is typically used for the sharing and dissemination of user informations or data such as messages or files over a network. It is generally considered to be an alternative to the world wide web (www) in the 1980s and early 1990s before the advancement of the internet.

Hence, the bulletin board system (BBS) was typically accessed using a Telnet or a dial-up modem.

Although the original BBS system was simple, it increased people's ability to communicate across long distances because users didn't have to be physically present to exchange messages or files.

Horizontal scaling of a client/server architecture means _____.
a. migrating the network to decentralized servers.
b. migrating the network to a faster communication media.
c. adding more proxy servers.
d. adding more workstations.

Answers

Answer:

D. I think

Explanation:

Horizontal scaling of a client/server architecture means adding more workstations. Thus the correct option is D.

What is client/server architecture?

A computing model which  places the majority of the services and features that the client requests on the server, which also hosts, delivers, and manages them are known as client-server architecture 

Most applications that call for a division of labor between the client and the server benefit from the client-server architecture. The accessibility performance of applications is improved.

Both horizontal and vertical scaling is possible for client/server architectures. If a network is scaled vertically, more powerful, faster servers are added to the network, whereas horizontal scaling involves adding additional workstations (clients).

Therefore, option D is appropriate.

Learn more about client/server architecture, here:

https://brainly.com/question/21755186

#SPJ5

What is one characteristic of a logic problem? A). a problem that can have three solutions B). a problem that can be solved in a methodical manner C). a problem that can have ill-defined steps D). a problem that can be solved using a chart

Answers

Answer:It can be solved in methodical manner

Explanation:

Because

The characteristic of a logic problem are, a problem that can be solved in a methodical manner. Option B is the correct option.

What is a logic problem?

A logic problem is the type of logic puzzle or problem which is solved by the help of deduction technique.

Characteristic of a logic problem are listed below;

Logic problems can be solved in a methodical manner.Logic problems should be solved in a well specified steps.The puzzle of logic problems should be well-defined.

Thus, the characteristic of a logic problem are, a problem that can be solved in a methodical manner. Option B is the correct option.

Learn more about the logic problem here:

https://brainly.com/question/3752381

#SPJ2

Which WPA mode allows users to provide authentication via a pre-shared key or password?

Answers

Answer:

WPA2 allows users to provide authentication via a pre-shared network key / password

Explanation:

The WPA mode that allows users to provide authentication via a pre-shared key or password is the personal mode. The correct option is a.

What is WPA mode?

The most recent and secure Wi-Fi protocol at the moment is WPA3 Personal. A pre-shared key is used by Personal WPA to verify users' first login information.

Wi-Fi security access All users on 2 pre-shared key (WPA-PSK) networks use the same passphrase. A security standard for computing devices using wireless internet connections is called Wi-Fi Protected Access (WPA).

It was created by the Wi-Fi Alliance to provide stronger user authentication and data encryption than the original Wi-Fi security standard, Wired Equivalent Privacy (WEP).

Therefore, the correct option is a. Personal mode.

To learn more about WPA mode, refer to the link:

https://brainly.com/question/29034850

#SPJ5

The question is incomplete. Your most probably complete question is given below:

a. Personal mode

b. Enterprise mode

c. Extensible Authentication Protocol mode

d. Wired Equivalent Privacy mode

you have 2 matching hdds in a system, which you plan to configure as a RAID array to improve performance. Which RAID configuration should you use.

Answers

Answer:

I think

Explanation:

RAID 5 improves performance over RAID 1.

Explanation

RAID provides both fault tolerance and improved performance RAID (mirroring) provides only fault tolerance with no performance benefit. Both RAID 5 and RAID 1 can only sustain a loss of one disk in the set. Use multiple disk controllers to provide redundancy for the disk controller.

A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act will be the person punished?

I-SPY
CFAA
Digital Millennium Act
SOPA

Answers

Answer:

Digital Millennium Act

Explanation:

The Digital Millennium Copyright Act  is a United States copyright law that implements two  treaties of the World Intellectual Property Organization . The aim of this ACT is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization  Copyright. The law has two basic functions. First, it protects copyright owners by providing them with a mechanism to enforce their rights without having to directly sue the infringer

Hope that helped.

which is a legal term which indicates an idea process or physical creation that come from the work of the mind

Answers

Answer:

copy right

Explanation:

don't copy right any major companys

Answer:

Intellectual property

Explanation:

9
of
Thich
the following Controls the process of
system? 6) User interface (b) Language Translator
c) platform (d) Screen Saver
teraction between​

Answers

Answer:

I'm sorry the answer is really difficult to understand, could you explain?

Explanation:

Do AirPods Pro have a person say “Low battery” or did I buy fake AirPods?

Answers

Fake AirPods

It would show low battery on the phone

Brainliest?
Fake air pods make it the
Brain 1

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
research spoofing
cyberstalking
phishing
pretexting

Answers

Answer:

Phishing.

Explanation:

Phishing is a form of internet fraud. It consists of defrauding people by luring them to a fake bank website, which is a copy of the real website, to have them log in there - unsuspectingly - with their login name and password or their credit card number. This gives the fraudster access to this data with all the associated consequences. The fraudster poses as a trusted body, such as a bank. Most forms of phishing are done via e-mail, as the mail contains a link to the false website.

What is the quickest way to remove filters from a worksheet?

Answers

Answer:If you want to completely remove filters, go to the Data tab and click the Filter button, or use the keyboard shortcut Alt+D+F+F.

The quickest way to remove filters from a worksheet is to Alt+D+F+F.

What is a worksheet?

Worksheets often refer to a paper that is blank with workouts or questionnaires on it that students must accomplish & record their responses on. They are utilized in most courses to some extent, and there are two main varieties in the lesson plan where things are often used.

Choose the Sort & Filter group, then click the Refine button. Click Clear Filter after selecting the tab. Removal of All Filters while selecting the worksheet. Designate Clear Filter after clicking each filter.

Columns in a spreadsheet allow you to enter facts and do calculations. Columns and rows have been used to arrange the cells. A textbook is where a workbook always is kept. Many worksheets may be found in a workbook.

Learn more about the worksheet, here:

https://brainly.com/question/13129393

#SPJ2

What is generalization error in terms of the SVM? a. How accurately the SVM can predict outcomes for unseen data b. How far the hyperplane is from the support vectors c. The threshold amount of error in an SVM

Answers

Answer:

a. How accurately the SVM can predict outcomes for unseen data

Explanation:

Generalization Error in terms of the SVM which is an acronym for Support Vector Machine, that deals with a form of administered learning standard, is a criterion of how accurately the Support Vector Machine algorithm can make a forecast of concluding information for formerly hidden data.

Hence, in this case, the correct answer is option A, which is Generalization error in terms of the SVM is "How accurately the SVM can predict outcomes for unseen data"

It should be noted that generalization error in terms of the SVM base on How accurately the SVM can predict outcomes for unseen data.

Generalization error can be regarded as the error which serves as a measure of how accurately an algorithm is, when predicting outcome values as regards the previously unseen data.

Therefore, option A is correct, generalization error serves as how accurately the SVM can predict outcomes for unseen data.

Learn more about generalization error at;

https://brainly.com/question/17220524

How many different values can be stored in a byte?

Answers

Answer:

255

Explanation:

1 byte has 8 bits, that is, 8 combinations of binary inputs, which can result in calculations up to the number 2 ^ 8-1 = 255 (-1 because 0 will always be the first number), a computer nowadays has 64 bits (8bytes ), thus being able to calculate numbers up to 2 ^ 64-1, an integer file has 4 bytes, being able to calculate up to 2 ^ 32-1, and so on.

Create a cell reference in a format by typing in the cell name or

Answers

Answer:

D. Create a cell reference in a formula by typing in the cell name or clicking the cell.

Further Explanation:

To create a cell reference in a formula the following procedure is used:

First, click on the cell where you want to add formula.

After that, in the formula bar assign the equal (=) sign.

Now, you have two options to reference one or more cells. Select a cell or range of cells that you want to reference. You can color code the cell references and borders to make it easier to work with it. Here, you can expand the cell selection or corner of the border.

Again, now define the name by typing in the cell and press F3 key to select the paste name box.

Finally, create a reference in any formula by pressing Ctrl+Shift+Enter.

Where does the CPU store its computations?
A. Registers
B. External Data Bus
C. Binary
D. Processor

Answers

Answer: A. Registers

Explanation:

Option A is correct. The CPU stores its computations in the Registers

The CPU is known as the Central Processing Unit.

The CPU is useful in reading data and instructions from memory and then stores the results of what was computed in its main memory.

This computation in the main memory is usually stored in the Register.

Hence we can conclude that the CPU store its computations in the Register.

Learn more here: https://brainly.com/question/18259388

briefly summarize two examples of cybercrime stories.
quick pleaseeee

Answers

A cyber-crime is a crime that involves computers. For example, the computers could be breached, threaten someone, steal money, etc. Some examples of cyber-crime in real life include:

Former amazon employee breaches Capital One and steals private data.Visa Cards were able to be bypassed without contacts.ASCO received an attack that was ransomware.

Best of Luck!

During the past decade ocean levels have been rising faster than in the past, an average of approximately 3.1 millimeters per year. Write a program that computes how much ocean levels are expected to rise during the next 15 years if they continue rising at this rate. Display the answer in both centimeters and inches.

Answers

Answer:

Program in Python is as follows:

rise = 3.1

for i in range(1,16):

     print("Rise in Year "+str(i))

     cm = rise * 0.1 * i

     inch = rise/25.4 * i

     print(str(cm)+" centimetres")

     print(str(inch)+" inches")

     print

Explanation:

This line initializes the rise of the ocean level

rise = 3.1

The following iterates from 1 to 15 (which stands for year)

for i in range(1,16):

   print("Rise in Year "+str(i))

This calculates the rise in each year in centimetre

   cm = rise * 0.1 * i

This calculates the rise in each year in inches

   inch = rise/25.4 * i

The line prints calculated ocean rise in centimetres

   print(str(cm)+" centimetres")

The line prints calculated ocean rise in inches

   print(str(inch)+" inches")

     print

1) Create the following 2D array in one instruction: {{1,2,3,4,5}, {1,2,3,4,5}, {1,2,3,4,5}} // your code goes below:
2) Create the above 2D array using a for loop and the below method: public static int[] simpleArray(int n) { int[] result = new int[n]; for (int i=0; i

Answers

Answer:

1)

int[][] a2dArray = {{1,2,3,4,5},{1,2,3,4,5},{1,2,3,4,5}};

2)

public class Main

{

public static void main(String[] args) {

   

    int[][] a2dArray2 = new int[3][5];

    for (int i=0; i<3; i++) {

        a2dArray2[i] = simpleArray(5);

    }

   

    for (int i=0; i<a2dArray2.length; i++) {

        for (int j=0; j<a2dArray2[i].length; j++){

            System.out.print(a2dArray2[i][j] + "");

        }

        System.out.println();

    }

 

}

public static int[] simpleArray(int n){

    int[] result = new int[n];

    for (int i=0; i<n; i++) {

        result[i] = i+1;

    }

    return result;

}

}

Explanation:

1) To create a 2D array you need to write the type, two brackets and the name on the left hand side. Put the values on the right hand side.

2) Declare the array. Since there will be 3 rows and 5 columns, put these values in the brackets on the right hand side.

Create a for loop that iterates 3 times. Call the method simpleArray inside the loop so that each row of the a2dArray2 array will be set. Be aware that simpleArray method takes an integer as parameter and creates a 1D array, the numbers in the array starts from 1 and goes to the parameter value. That is why calling the method simpleArray (with parameter 5) 3 times will create a 2D array that has 3 rows and 5 columns.

Then, use a nested for loop to display the 2D array.

Are scripted languages easier or more difficult to port than programming languages? Why?

Answers

Answer:

Scripting languages are easier to port to various platforms due to the compiling and interpreting tools it uses to read the source code.

Explanation:

Programming languages are used to create source codes for various applications from web programming to mobile application implementation.

A programming language can be a scripting language, only with the required tools like a compiler or an interpreter. For example, C source codes are compiled to executable scripting file with the GCC compiler and python codes are interpreted with the cpython interpreter.

declare a variable to store 1009.87 in computer​

Answers

Answer: float n1=1009.87;  

hope this helps

plz mark brainleist

what is the function of control unit? in computer.

Answers

Answer:

The control unit of the central processing unit regulates and integrates the operations of the computer. It selects and retrieves instructions from the main memory in proper sequence and interprets them so as to activate the other functional elements of the system at the appropriate moment…

The central processing unit's control unit regulates and integrates the computer's operations.

What is central processing unit?

The central processing unit (CPU) of a computer is basically the component that retrieves as well as executes instructions. A CAD system's CPU is essentially its brain.

It is comprised up of an arithmetic along with logic unit (ALU), a control unit, and a number of registers. The CPU is frequently referred to simply as the processor.

The processor, also referred to as the CPU, provides the instructions and processing power required by the computer to perform its functions.

The control unit (CU) is a component of the central processing unit (CPU) of a computer that directs the processor's operation.

It instructs the computer's memory, arithmetic/logic unit, and input and output devices how to respond to the instructions of a program.

Thus, this is the main function of control unit.

For more details regarding central processing unit, visit:

https://brainly.com/question/13117851

#SPJ6

Write a Java application that reads three integers from the user using a Scanner. Then, create separate functions to calculate the sum, product and average of the numbers, and displays them from main. (Use each functions' 'return' to return their respective values.) Use the following sample code as a guide.

Answers

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter a number: ");

 int n1 = input.nextInt();

 System.out.print("Enter a number: ");

 int n2 = input.nextInt();

 System.out.print("Enter a number: ");

 int n3 = input.nextInt();

 

 System.out.println("The sum is: " + calculateSum(n1, n2, n3));

 System.out.println("The product is: " + calculateProduct(n1, n2, n3));

 System.out.println("The average is: " + calculateAverage(n1, n2, n3));

}

public static int calculateSum(int n1, int n2, int n3){

    return n1 + n2 + n3;

}

public static int calculateProduct(int n1, int n2, int n3){

    return n1 * n2 * n3;

}

public static double calculateAverage(int n1, int n2, int n3){

    return (n1 + n2 + n3) / 3.0;

}

}

Explanation:

In the main:

Ask the user to enter the numbers using Scanner

Call the functions with these three numbers and display results

In the calculateSum function, calculate and return the sum of the numbers

In the calculateProduct function, calculate and return the product of the numbers

In the calculateAverage function, calculate and return the average of the numbers

Write a Java program to count the characters in each word in a given sentence?Examples:Input : geeks for geeksOutput :geeks->5for->3geeks->5

Answers

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

   

    Scanner in = new Scanner(System.in);

   

    System.out.print("Enter a sentence: ");

    String sentence = in.nextLine();

   

    String[] words = sentence.split("\\s");

   

    for(String s : words)

     System.out.println(s + " -> " + s.length());

}

}

Explanation:

Ask the user to enter a sentence

Get each word in the sentence using split method and put them in words array

Loop through the words. Print each word and number of characters they have  using the length method in required format

Write a MATLAB function named lin_spaced_vector with two inputs and one return value. The first input will be a single real number representing a lower bound The second input will be a single real number representing an upper bound The return value must be a list of 200 numbers evenly spaced between the lower bound and the upper bound.

Answers

Explanation:

==================  

lin_spaced_vector.m  

==================  

function out=lin_spaced_vector(in1,in2)%defining function

out=linspace(in1,in2,200);%200 spaced numbers between in1 and in2

end​

===================  

Executable File

===================

clear all%clears history

clc%clears screen

lin_spaced_vector(1,10)%calling function​

clear all

clc

lin_spaced_vector(1,10)

What is the range of possible values for the variable x?

int x = (int)(Math.random() * 10);

Answers

Answer:

int number = (int)(Math. random() * 10); By multiplying the value by 10, the range of possible values becomes 0.0 <= number < 10.0

please mark me as the brainliest answer and please follow me for more answers.

Which two statements are true about the Data Sync functionality? (Choose two.)
A. Data Sync can create and manage surrogate keys in target tables.
B. Data Sync is the only mechanism available in Oracle Analytics Cloud Standard Edition for loading data into DBaaS tables.
C. To manage extractions and loads from cloud-based sources, Data Sync can invoke the REST APIs of the Oracle Database Cloud Service as well as the Oracle
D. Data Sync cannot load incremental source insertions and updates; only full refresh loads are supported.

Answers

B and C are the correct answers

The statements 'Data Sync can create and manage surrogate keys in target tables' and 'Data Sync can invoke the REST APIs of the Oracle Database Cloud Service as well as the Oracle' are TRUE (Option A and C).

Data synchronization (Data Sync) refers to the process of synchronizing data between different devices, as well as the automatic update of the changes.

Oracle database cloud service refers to a cloud category that reaps the advantages of Platform as a Service (e.g., subscription-based services, self-service access to different elastic and reliable cloud environments, etc).

This service (Oracle Database Cloud Service) can support different Oracle database versions.

In conclusion, the statements 'Data Sync can create and manage surrogate keys in target tables' and 'Data Sync can invoke the REST APIs of the Oracle Database Cloud Service as well as the Oracle' are TRUE (Option A and C).

Learn more in:

https://brainly.com/question/22982136

Other Questions
Why is it relevant that finance tends to attract large amounts of money? a. Money can be used for good or evil b. Finance attracts people from around the globe c. Financial markets are a critical components of economic success d. All of the above How does society influence identity and experience? A pair of jeans cost $30. There is a 6% sales tax determine the total cost of the jeans What type of condition is an eating disorder? No answer text provided. moral physical psychological What was the long parliament Erin counted 8 commercials in 15 minutes. Find how many commercials areshown in 1 minute.Your answer (Finance: An overview) There are three basic questions that are addressed by the study of finance. They are: (Select all that apply.) A. What long-term investments should the firm undertake (capital budgeting decisions)? B. How can the firm best manage its cash flows as they arise in its day-to-day operations (working capital management decisions)? C. How should the firm raise money to fund new investments (capital structure decisions)? D. Which parts of the company should receive less capital (capital rationing)? What is the product of the polynomials below (7x^3+4x)(x^2+2) the questioning of SCIENCE will lead to the questioning of EVERYTHING, especially who has, or is given, the power to govern or lead. True or false? A sports car accelerates at 2.80 m/s2 along a straight road. At t1 = 5.00s and t2 = 5.50 s it passes two marks that are 35.0 m apart. What is the car's velocity at t0 = 0 s? What is the area of the triangle?(-6,3)(-3,-5)(-1,3) Given the function defined in the table below, find the average rate of change, insimplest form, of the function over the interval 2 < x < 4.C251339429521615 Which problem is equivalent to 3/5 A 3 x 5B5 x 3C3 5D5 3 The first Ferris wheel was built in 1893 in Chicago. Its diameter was 250 feet. How many feet did the Ferris wheel rotate with one complete turn? Use 3.14 for Pi what is --6|x+4|=-24 Explain how prepositional phrases work together to improve a piece of writing. 1. Working in the laboratory, a student find the density of a piece of pure aluminum to be 2.85g'om? The accepted value for the density of aluminum is 2.699 g/cm? What is the student'spercent error? 5/4+x/2 =3Hey can someone explain this please! A company produces 3 products that use labor and raw material. The labor usage, raw material usage, and profit per pound produced of each product are seen below. 500 hours of labor and 300 pounds of raw material are available. If fractional pounds of each product can be produced, what is the maximum profit the company can earn (rounded to the nearest dollar) Read this passage. Explain how the writer's choice words helps readers see that the Gleasons were not used to eating like Chinese people. I I glanced at Meg, to see if she needed more food, and my eyes nearly popped out at the sight of her plate. It was piled with food: the sweet-and-sour meat pushed right against the chicken shreds, and the chicken sauce ran into the prawns. She had been taking food from a second dish before she finished eating her helping from the first! Horrified, I turned to look at Mrs. Gleason. She was dumping rice out of her bowl and putting it on her dinner plate. Then she ladled prawns and gravy on top of the rice and mixed everything together, the way you mix sand, gravel, and cement to make concrete. I couldn't bear to look any longer, and I turned to Mr. Gleason. He was chasing a pea around his plate. Several times he got it to the edge, but when he tried to pick it up with his chopsticks, it rolled back toward the center of the plate again. Finally he put down his chopsticks and picked up the pea with his fingers. He really did! A grown man!