1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anton [14]
4 years ago
11

Create a pseudocode showing logic steps to perform the required task below.

Computers and Technology
1 answer:
Ludmilka [50]4 years ago
4 0

Answer:

#Function for the calculcations needed

function subtotal_gratuity_total(subtotal,gratuity_rate):

  gratuity_rate = gratuity_rate/100 #this is assuming the user enters the gratuity as a percentage value (e.g. 15)

  gratuity = subtotal*gratuity_rate

  total = subtotal+gratuity

  return subtotal, gratuity_rate, gratuity, total

#Reading the values the user enters

Output(“Input subtotal”)

input (subtotal)

Output(“Input gratuity rate”)

input (gratuity_rate)

#Calling function we created with the values the user enters as inputs,

#and  the 4 values required as outputs

subtotal,gratuity_rate,gratuity, total = subtotal_gratuity_total(subtotal,gratuity_rate)

You might be interested in
Your sister wants to purchase Microsoft Office 2013 for her new laptop. She doesn't want to pay for a subscription, and she want
Pavel [41]

I would buy Microsoft Office 2013 Home and Business Pc License. Its better to purchase the product in all rather than a subscription.

5 0
3 years ago
How do u type faster
eduard

Answer:

by learning the right home keys and how to place the fingers

Explanation:

the left hand side : A,S,D,F

the right hand side: :, L, K, J

the two little fingers are guide keys

guide keys: letter A and column

5 0
4 years ago
What are natural threats to information systems?
Sati [7]
Power surges and fires could destroy data
5 0
3 years ago
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
4 years ago
An electronics technician who enjoys working "at the bench" would most likely want to work
tester [92]
D. for a TV or radio station.
8 0
4 years ago
Read 2 more answers
Other questions:
  • A college meal plan allows students to:
    7·2 answers
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • How do media and networks interact
    11·1 answer
  • What is the purpose of the backoff on Ethernet networks?
    5·1 answer
  • To illustrate a point in a Word document with a simple chart, what commands should you select?
    8·2 answers
  • What is the problem we can't build shelter on mars ?
    6·1 answer
  • In statistics, what is the mode of a data set?
    6·2 answers
  • Which line of code will print I like to code on the screen? print("I like to code") print(I like to code) print("I LIKE TO CODE"
    5·2 answers
  • Write code which takes inputs and creates two Rectangle objects (using the edhesive.shapes.Rectangle class) and compares them us
    7·1 answer
  • Accessibility is the degree to which a product or service is readily available and usable by _____.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!