1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
satela [25.4K]
2 years ago
5

Write a program that allow a customer to input the value of goods bought, The program should then decide the discount to give a

customer,
Computers and Technology
1 answer:
Thepotemich [5.8K]2 years ago
5 0

Answer:

geeksforgeeks is the answer

You might be interested in
What is the purpose of "display:table"?
igor_vitrenko [27]

Answer:

Modern browsers use CSS to style all their markup.

How would they render a <table> element if CSS had nothing that could express the appearance of one?

(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).

They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.

You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width

5 0
3 years ago
The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads
vladimir2022 [97]

Answer:

The solution is as follows.

class LFilters implements Lock {

int[] lvl;

int[] vic;

public LFilters(int n, int l) {

lvl = new int[max(n-l+1,0)];

vic = new int[max(n-l+1,0)];

for (int i = 0; i < n-l+1; i++) {

lvl[i] = 0;

}

}

public void lock() {

int me = ThreadID.get();

for (int i = 1; i < n-l+1; i++) { // attempt level i

lvl[me] = i;

vic[i] = me;

// rotate while conflicts exist

int above = l+1;

while (above > l && vic[i] == me) {

above = 0;

for (int k = 0; k < n; k++) {

if (lvl[k] >= i) above++;

}

}

}

}

public void unlock() {

int me = ThreadID.get();

lvl[me] = 0;

}

}

Explanation:

The code is presented above in which the a class is formed which has two variables, lvl and vic. It performs the operation of lock as indicated above.

6 0
3 years ago
Since the actions in a textual storyboard are often very close to actual program code, the statements in a textual storyboard ar
Kaylis [27]

Answer: Pseudo code

Explanation:Pseudo code is a false code that is written in the textual story board to make the fictional plot of the story more understandable in the layman terms for everyone.This is done to increase the readability of the code , which cannot be understood easily by the actual code.

It is implemented on the algorithms of a program in computer field so that the complex coding statements can be understood by the programmer.

7 0
3 years ago
You are applying for a secretary position. You have many skills but which of the following would not be one to include on the ap
zepelin [54]

A. How many marathons you have run, because it doesn't relate to the job you're applying for.

6 0
3 years ago
Read 2 more answers
What is the first thing you should do when you discover a computer is infected with malware? The second thing?
Goshia [24]

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

3 0
3 years ago
Other questions:
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • True or false An electronic form uses input fields in which the user can enter data from their own computer and then transmit t
    10·1 answer
  • The PATH environment variable.
    5·1 answer
  • You want to create Web pages that can easily adapt to and serve multimedia content to smartphones, tablets, gaming devices and s
    13·1 answer
  • Which role involves designing and creating advertisements for marketing purposes?
    14·2 answers
  • You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface elemen
    14·1 answer
  • Discuss, in detail, the usefulness of graphics and images in program development. Explain the importance of the interface of a c
    7·1 answer
  • Please help ASAP!
    7·2 answers
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
  • Identify a statement that accurately differentiates between short-term memory and working memory.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!