1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
15

Create a simple self-checkout system. Prompt for the prices and quantities of three items. Calculate the subtotal of the items.

Then calculate the tax using a tax rate of 6.5%. Print out the line items with the quantity and total, and then print out the subtotal, tax amount, and total.
Computers and Technology
1 answer:
navik [9.2K]3 years ago
8 0

Answer:

subtotal = 0

total = 0

tax_rate = 6.5

for i in range(1,4):

   price = float(input("Enter the price for item " + str(i) + ": "))

   quantity = int(input("Enter the quantity for item " + str(i) + ": "))

   subtotal += (price * quantity)

tax = subtotal * tax_rate/100

total = tax + subtotal

print("Subtotal: " + str(subtotal) + ", Tax: " + str(tax) + ", Total: " + str(total))

Explanation:

- Initialize the variables

- Create for loop that iterates 3 times

- Ask the user for the price and quantity of each item

- Calculate the subtotal with given inputs

- When the loop is done, calculate the tax and total

- Print the subtotal, tax, and total

You might be interested in
Most microsoft windows fatal errors (blue scree of death) are caused by:
MAVERICK [17]
Errors in kernel mode (CPU running in ring 0) are usually fatal. This happens mostly inside device drivers.
7 0
3 years ago
What is the defining difference between computer security and information security?
Alekssandra [29.7K]
Computer security is protection from theft or damage to their hardware, software, or information, as well as disruption or misdriection of the services they provide. As information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of information.
4 0
3 years ago
Cybersecurity is defined as the set of techniques to protect the secrecy, integrity, and availability of computer systems and da
natka813 [3]

Answer:

<h3>The answer is true because it protects our secret account </h3>
7 0
2 years ago
What is the best motivation that you can do/give to make your employees stay? ​
Lorico [155]

i'd give fringe benefits to them every month

Explanation:

to encourage them to work on the mission statement and the business goal

8 0
3 years ago
A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
lord [1]

Answer:

For this wild card mask 0.0.15.255 the ACE IP address will be 172.16.47.254

Explanation:

ACL is the access control list that is used to enlist the ip addresses that allowed or restricted to access the network. ACE is an IP address from the list ACL that has all rules and regulations related to access of network. The ACE could be in the range of IP address in ACL. ACL can be calculated with the help of initial IP address adding with wild card mask.

So

Initial IP address is = 172.16.32.0

Wild card mask =0.0.15.255

by adding above values we can find the last IP address of ACL.

after addition

Final IP address is = 172.16.47.255

The options that are available with question, Only option between the range is  172.16.47.254. So we can say that This is the only ACE IP address in options.

7 0
3 years ago
Other questions:
  • The ____ operator eliminates duplicate values in the results of a query.
    11·1 answer
  • HELP ASAP!! Ohms law homework
    11·1 answer
  • Which of the following is the formula used to calculate the risk that remains after you apply controls? a. ALE=SLExARO b. Total
    9·1 answer
  • What symbol do we use to denote a character?
    9·2 answers
  • Original list:0,0,0,0,0,0,0,0
    10·1 answer
  • A new systems development project is Pete’s first experience as a project manager, and he has led his team successfully to the p
    13·1 answer
  • What is the purpose of the 5 Whys Strategy? How could you use the 5 Whys strategy in your day-to-day life? (Site 2)
    5·1 answer
  • 13) When developing film, how do you dispose of fixer as opposed to developer?
    10·1 answer
  • Identify the reasons that numeric data representation is important to computer programmers. Check all that apply.
    12·2 answers
  • What are the advantages of cloud computing over computing on premises?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!