1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
2 years ago
15

With the cold winter months fast approaching, Lungi wants to improve the overall effectiveness of operations at his NGO. He want

s to keep track of all the blankets he has in stock and be able to determine how many he has left on distribution days. In the past, it has happened that Lungi thought he had blankets to hand out but in fact had none left. Lungi found out that you are an IT student who needs to find a client for their final year IT project. He has volunteered to be your client. Q.1.1 Plan the logic for Lungi’s application using pseudocode. The logic needs to satisfy the following needs:  The application will need to allow Lungi to enter the number of blankets he wishes to distribute on a given day.  The application should keep track of the number of blankets handed out to ensure that Lungi does not hand out more blankets than he has.  The application will need to warn Lungi when he has only one (1) blanket left to hand out.  Once all the blankets have been handed out, the following report should be produced:  The pseudocode should incorporate the use of modules.  The pseudocode should implement the features of good program design.  Use at least one loop structure appropriately.  Use at least one selection structure appropriately.
Computers and Technology
1 answer:
igor_vitrenko [27]2 years ago
5 0
There would not be enough blankets
You might be interested in
What are the examples of shareware?
Igoryamba

Answer:

An example of shareware a compression program like Stuffit for Macs or Windows. An example of shareware is a budgeting software program that only allows you to use three categories instead of having the ability to create a full budget.

8 0
3 years ago
Read 2 more answers
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
3 years ago
You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is
cupoosta [38]

Answer:

Explanation:

The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int[] person = new int[5];

       System.out.println("Enter age of individual 1: ");

       person[0] = in.nextInt();

       System.out.println("Enter age of individual 2: ");

       person[1] = in.nextInt();

       System.out.println("Enter age of individual 3: ");

       person[2] = in.nextInt();

       System.out.println("Enter age of individual 4: ");

       person[3] = in.nextInt();

       System.out.println("Enter age of individual 5: ");

       person[4] = in.nextInt();

       int youngest = person[0];

       for (int x = 0; x < person.length; x++) {

           if (person[x] < youngest) {

               youngest = person[x];

           }

       }

       double discount = 1 - (((double)youngest) / 100);

       double output = 50 * discount;

       System.out.println("Total Price: " + output + " the youngest is " + youngest);

   }

}

8 0
3 years ago
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to
ArbitrLikvidat [17]

Answer:

A virtual privte network is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

5 0
2 years ago
Electric Bill Problem 3.0 (20 Points) What is the total cost of using the following at /kWh? a. 1600 W air conditioner for 6h b.
gulaghasi [49]

Answer:

The total const is 13025 KWh

Explanation:

These are the steps to solve this problem:

  1. Convert all the powers from W to KW dividing by 1000.
  2. Convert all the times on minutes to hours dividing by 60.
  3. Then you can apply energy consumption formula Energy = Power*Time for any of the appliances. the results will be at KWh.
  4. Sum all the consumtions and you will have the total cost.

Attached you will have a spreadsheet as a guidance. Any  questions, just let me know.

Download xlsx
7 0
3 years ago
Other questions:
  • Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing individual and departmental goa
    9·1 answer
  • Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att
    12·1 answer
  • What are the features of a strong résumé? Check all that apply.
    7·1 answer
  • What is the base for a hexadecimal number system?
    11·1 answer
  • The __________ method can determine whether a string contains a value that can be converted to a specific data type before it is
    12·1 answer
  • The function of while loop is
    14·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
  • Discuss the concept of the “state of a process”. Give examples to illustrateyour answers?
    5·1 answer
  • Provide 3to 4 sentence overview of microsoft windows features?
    10·1 answer
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!