1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
4 years ago
6

1.6.6 Night out for codehs

Computers and Technology
1 answer:
Yuliya22 [10]4 years ago
5 0

Answer:

import java.util.*;

public class NightOut

{

   public static void main(String[] args)

   {

       Scanner input = new Scanner(System.in);

       double cost;

       double cost2;

       double cost3;

       double grandtotal;

       

       System.out.println("How much did dinner cost?");

       cost = input.nextDouble();

       

       System.out.println("How much is mini-golf for one person?");

       cost2 = input.nextDouble();

       

       System.out.println("How much did dessert cost?");

       cost3 = input.nextDouble();

       

       grandtotal = cost + cost2 * 2 + cost3;

       

       System.out.println("Dinner: " + cost);

       System.out.println("mini-golf: " + cost2);

       System.out.println("Dessert: " + cost3);

       System.out.println("Grand Total: " + grandtotal);

   }

}

Explanation:

You might be interested in
When a module is processed:
a_sh-v [17]

Answer:

B. The computer jumps to the module, executes the instructions in the module, and then returns to the next executable instruction.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

A module can be defined as a separate software component or unit of a hardware program that comprises of one or more repeatable functions (tasks). A module is portable and as such can be used in various software applications or systems through a programming interface. Also, they are interoperable because they are generally compatible with various components of a software application or system.

When a module is processed, the computer jumps to the module, executes the instructions in the module, and then returns to the next executable instruction.

This ultimately implies that, the execution of an instruction by a computer is done sequentially and once the task is completed, the computer moves to the next executable instruction or command.

3 0
3 years ago
Which security option should be used to ensure the integrity and validity of an Access database?
Fynjy0 [20]

Answer:

The best security which could be used to ensure integrity and validity of Access database is:  

O. database password

Explanation:

Database password is the only option that best guarantee the integrity of an Access database due to the fact that, it limits the number of people who would be able to have access to it. This password is an administrative right given to those who are meant to access it and it is expected to be renewed every few months (probably every 3 months).

<em>Without the password, no other person can be able to login. Also, no two individual can be able to login in same time using same credential login details assigned (that is, in scenario of using the same Username and password)</em>

3 0
3 years ago
Read 2 more answers
An interactive online representation of geospatial data, which can be accesses via a Web browser is a(an): a. Web Application b.
Mashcka [7]

Answer: Web Map

Explanation:

7 0
2 years ago
If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be
Sergio [31]

If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be flawed.

<h3>What are algorithms being used for?</h3>

Algorithms are known to be tools that are made to help in calculation, data processing, and a kind of automated reasoning.

Hence, If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be flawed.

Learn more about algorithm from

brainly.com/question/23282908

#SPJ1

6 0
2 years ago
In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation,
ahrayia [7]

Answer:

The loop counts the count() function length of n-1 times with respect to n.

Explanation:

The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.

The n represents the number length of a range of numbers or iterables (like an array).

4 0
3 years ago
Other questions:
  • Jasmine took many pictures at a photo shoot. She wants to transfer these pictures from her camera to her laptop for image enhanc
    10·2 answers
  • Wrire a code that display elements at indices 1 and 4 in the follwoing array.
    12·1 answer
  • A peer-to-peer (p2p) network is an example of ________ administration
    5·1 answer
  • You must obey any special signs or instructions as you pass a construction zone.
    14·2 answers
  • What is Geocortex and how does it work in web or mobile?
    11·1 answer
  • Show the CREATE TABLE statements for HAPPY INSURANCE database for the table CLIENT (assume that non-primary key columns can be o
    7·1 answer
  • Match the ocean floor feature with its characteristic.
    6·1 answer
  • Find products that satisfy BOTH conditions below:______
    6·1 answer
  • Multiple Choice
    5·1 answer
  • In a(n) ____________________ device, the movement of electrons performs essentially the same functions as gears and wheels in me
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!