1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yaroslaw [1]
3 years ago
7

Original Problem statement from the Text: A retail company must file a monthly sales tax report listing the sales for the month

and the amount of sales tax collected. Write a program that Asks for the month, the year, and the total amount collected at the cash register (that is, sales plus sales tax). Assume the state sales tax is 4 percent and the county sales tax is 2 percent. Example: If the total amount collected is known and the total sales tax is 6 percent, the amount of product sales may be calculated as: LaTeX: S\:=\frac{T}{1.06}S = T 1.06 S is the product sales and T is the total income (product sales plus sales tax). The program should display a report similar to this: Month: March, 2019 -------------------- Total Collected: $ 26572.89 Sales: $ 25068.76 County Sales Tax: $ 501.38 State Sales Tax: $ 1002.75 Total Sales Tax: $ 1504.13
Computers and Technology
1 answer:
uysha [10]3 years ago
8 0

Answer:

a

Explanation:

You might be interested in
How is the Internet Simulator similar to the Actual Internet? How is it different?
masya89 [10]
The Internet Simulator is a tool developed by Code.org for our new high school Computer Science Principles class. ... The Internet Simulator was designed to be used in a classroom with students working collaboratively in-person to solve problems.
4 0
3 years ago
You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determ
exis [7]

Answer:

Border Gateway Protocol is a protocol the routers use to determine the most optimal path to forward the traffic.

Explanation:

BGP is a path vector protocol which chooses the most optimal path. The protocol decides core routing decisions based on path, configuration and network.

This protocol gives all the notification about the status of the connection and router.

It is used to routing in an autonomous system and provides ways to measure the effectiveness of configuration.

6 0
2 years ago
What is a location where the embedded multimedia terminal is connected to both outside and inside wiring​
anygoal [31]

Answer:

The answer to this question is "The main closet or telecommunications closet".

Explanation:

A multimedia terminal or multimedia terminal adapter (MTA) is also known as a Landline modem that operates just like a wireless router, but in terms of high-speed Internet, an MTA can provide Home Phone service only.

  • In the case of a significant power failure, MTAs have only a backup battery that will fuel the MTA for many hours.
  • This device is used to connect to a main or telecommunications closet.

4 0
3 years ago
When a computer restarts without a hardware power-down-power-up cycle, it is doing a _______________?
tamaranim1 [39]
When a computer restarts without a hardware power-down-power-up cycle, it is doing an update.
4 0
3 years ago
What pointer appears when pointing to a hyperlink
Leokris [45]
Your answer would be: a hand pointer.
6 0
3 years ago
Read 2 more answers
Other questions:
  • OSHA requires that employers pay for most required personal protective equipment (PPE), including: A. Hard hats B. Logging boots
    5·1 answer
  • which of the following are used on cable trays to protect the cable insulation from direct sunlight? a. barrier strips b. solid
    5·1 answer
  • The logical view Select one: a. shows how data are organized and structured on the storage media. b. presents an entry screen to
    7·1 answer
  • In what ways are Outlook notes useful for personal or professional use? Check all that apply.
    13·2 answers
  • Which one of the following is NOT true about energy conversion devices? Group of answer choices Total Energy Input = Energy Diss
    8·1 answer
  • Please help!! Even if you help a little I will be very thankful!
    7·1 answer
  • Select the correct answer.
    6·1 answer
  • When discussing the business requirements of a WLAN design, what is the first question that should be posed
    15·1 answer
  • I need subscribers plz ​
    15·2 answers
  • A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!