Answer:
#here is code in python.
# read the food bill
tot_bill=float(input("Please enter the food bill:"))
# tax on food
tax=0.06
#choice for tip by user
choice=int(input("enter your choice for tip:(1 for 15%, 2 for 18% and 3 for 20% :)"))
// calculate the total food bill
if choice==1:
tot_food_bill=tot_bill+tot_bill*tax+tot_bill*(.15)
elif choice==2:
tot_food_bill=tot_bill+tot_bill*tax+tot_bill*(.18)
elif choice==3:
tot_food_bill=tot_bill+tot_bill*tax+tot_bill*(.2)
else:
print("invalid choice:")
#print the total food bill
print("total food bill is ",tot_food_bill)
Explanation:
Read the food bill from user and assign it to variable "tot_bill".Initialize the tax=0.06 (i.e. 6%) on the bill.Then ask user to give his choice for tip. if the choice is 1 then tip will be 15%, if 2 then 18% and if choice is 3 Then tip will be 20% of the bill.Calculate the total food bill and assign it to variable "tot_food_bill".
Output:
Please enter the food bill:100
enter your choice for tip:(1 for 15%, 2 for 18% and 3 for 20% :)2
total food bill is 124.0
Influencers are trusted above many other information sources because of their perceived Authenticity and Transparency.
<h3>Who is an influencer?</h3>
An influencer is known as a person that does the work of exerting their influence on a product or services.
Note that they help or act as guides or they inspire the actions of others and as such Influencers are trusted with lots of information sources because of their perceived Authenticity and Transparency.
See options below
Influencers are trusted above many other information sources because of their perceived ______ and ______.
a. Authenticity.
b. Transparency.
c. Expertise.
d. A & B.
e. A & C.
Learn more about Influencers from
brainly.com/question/26242633
Answer: Remote Access Trojans (RATs) is the malware that is used by the hackers to attack the computer and operating system remotely.The working of RATs is done by download the malware and executing it to create a server .After the server is created ,hacker sends this server along with a crypter to eliminate the antivirus program's function present in the user's system.
Thus, RAT gets invoked in the system of the user and the hacker can control the user's system .Attacker can hack the complete functioning of the user's system and can steal, destroy ,execute etc any confidential data and application.
The user or the network administrator can get to know about the RAT's activity by steps like checking the open port, checking the activities through Task Manager of Windows, observing any unusual activity and appearance of the display screen etc.
Answer:
b. False
Explanation:
Decomposing and modularizing means that a large software is being divided into smaller named components that have a well-defined interfaces which basically describes the component interactions. The main goal is to place these different functionalities as well as the responsibilities in different components.
Decomposition and modularization forms the principle of software design.
Hence, the answer is false.