1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jobisdone [24]
3 years ago
10

JavaScript

Computers and Technology
1 answer:
Mekhanik [1.2K]3 years ago
3 0

Answer:

C. 40

Explanation:

The code uses IF and ELSE statements to carry execute a block of code if any of the statements hold true

OrderTotal here is greater than 100, and this allows the second IF ELSE block to be executed.

The code to be executed is discountAmount = OrderTotal * 0.2

This will be discountAmount = 200 *0.2

therefore, discountAmount = 40.

You might be interested in
The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
11111nata11111 [884]

Answer:

Deployment

Explanation:

Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.

So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.

8 0
3 years ago
Answer to this if you have apex legends on either pc xbox one or PS4 for the one that answers and does gets brainliest please do
stealth61 [152]

Answer:

Already answered , Thanks for points !

Have a good day/afternoon/ night .

Sleepy~

6 0
3 years ago
Read 2 more answers
Which of the following statements is false? People tend to shortcut security procedures because the procedures are inconvenient.
Dahasolnce [82]

Answer:

E. The online commerce industry isn’t willing to install safeguards on credit card transactions.

Explanation:

With the advent of several online platforms for commercial transactions and with the risk associated withe these transactions, the online commerce industry avails themselves to measures that could curb fraudulent activities. One of such means used in preventing fraud is the use of a high quality payment processor which enables an efficient payment and the verification of the customer's details before transaction.

They also employ the act of storing data so as to avoid requesting too much data from the customers. The use of Secure Sockets Layer, a cryptographic means for digital security is also used by these online sites. Several other measures are employed by businesses to ensure safety during transactions.

8 0
3 years ago
Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems developm
hram777 [196]

Answer:

Agile/adaptive methods.

Explanation:

The user has just decided to join a firm and will also be accountable to determine whether that system development technique that group uses to establish the latest software for a significant medical distributor to his position as just a lead analyst.

After that, he consumes a week for the purpose to understand his group members for reason to know their strengths and weakness and how would they work under pressure.

So, the following method is required for him to understand about the disadvantages of each of them.

4 0
3 years ago
Universal Containers are using Salesforce for Order Management and has integrated with an in-house ERP system for order fulfilme
Crazy boy [7]

Answer:

1. The change can be performed in Production, as it is a configuration change.

2. Integration with the ERP system may not function as expected.

Explanation:

3 0
3 years ago
Other questions:
  • When an instance of a class, or object, is specified as a parameter to a method, a reference to the said object is passed to the
    15·1 answer
  • Why do the holes at the top of parachutes make it go slower
    12·1 answer
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • A program to that would accept the length and width of a rectangle and display the results​
    14·1 answer
  • Explain why interrupt times and dispatch delays must be limited to a hard real-time system?
    8·1 answer
  • Dgvdsgf cvdzgb fgvsdxchygfdrzvdszfgvsdzxd
    9·1 answer
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
  • What is a presentation program? Name any<br> presentation programs.
    10·1 answer
  • A.m. client appears at the top of every page
    5·1 answer
  • What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!