1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
14

Assume that a function with this header: function amountSaved(price, discountRate, salesTaxRate) already exists. Write a single

line of JavaScript code to call that function and assign the value returned from that function to a variable named saved.
Computers and Technology
1 answer:
Levart [38]3 years ago
4 0

Answer:

let saved = amountSaved(12, 0.9, 0.06);

Explanation:

By presuming there is a JavaScript function <em>amountSaved() </em>that takes three input parameters, <em>price</em>, <em>discountRate</em> & <em>salesTaxRate</em>.  To call the function, just simply write the function name, <em>amountSaved</em> followed with a pair of parenthesis. Within the parenthesis, include three testing values, 12, 0.9, 0.06 as arguments. These argument values will be held by the three parameter <em>price</em>, <em>discountRate</em> and <em>salesTaxRate</em>, respectively.

The function will operate on the three input values and return the result to the main program where the returned result is assigned to a variable name <em>saved</em>.

You might be interested in
How to get administrator privileges on windows 7?
Phoenix [80]
If you are on the admin account, you will already have them, but if you are on a different account, it's pretty impossible But you can get through by using command prompt.
4 0
3 years ago
What text structure this is
jasenka [17]

Compare And Contrast.

6 0
3 years ago
You are required to justify the need to implement a three-tier campus network. Which justification below makes sense for a three
Murrr4er [49]

Answer:

Correct answer is (d) Scalable solution for an enterprise environment

Explanation:

Scaling and enterprise simply means adding up resources to the business need. By adding hardware (s) or by upgrading the existing hardware without changing much of the application, one will be able to implement a three-tier campus network.

8 0
3 years ago
Explain which implementation of the protection matrix is more suitable for the following operations___________.
Mars2501 [29]

Answer:

See explanation.

Explanation:

(a)

• To grant read access to a file for all users, access control list (ACL) is the best option.

o Create a group called 'all' with all users in it (assume the group name as 'all').

o Make a ACL for the file name with ACL as 'all:R'.

• It can also be done with capability list. With capability lists. it is sufficient to place the capability for the file in appropriate place in a capability system.

(b)

• To revoke write access for a file from all users, access control list (ACL) is the best option.

o Edit the ACL by removing the write access.

o If the group 'all: W' was the entry added to ACL, remove it from the ACL.

• It can also be done with capability list by changing the check field stored with the object.

(c)

• To grant write access to a file to John, Lisa. Christie and Jeff either the access control list method or the capability list can be used.

• It can be implemented with ACL as follows:

o Construct ACL for the file for all users,

o Then the ACL for file would be 'Christie, Jeff. John, Lisa: W'.

• It can be implemented using capability list method as follows:

o First construct the capability list for the file, 'file:W'.

o Then assign the above capability for each user named John, Lisa, Christie and Jeff.  

(d)

• To revoke execute access for a file from Jana, Mike, Molly, and Shane, access control lists are the only possibility.

o Edit the ACL by removing the execute access.

Hope this hels!

5 0
3 years ago
Explain how dvd audio and cd audio differ
Alexandra [31]
Dvd is mainly for vidoes while cd is for music
5 0
3 years ago
Other questions:
  • True or False. It is required to restart the client computer after the DLP agent has been installed.
    9·2 answers
  • What type of socket should be used with an air impact wrench
    12·1 answer
  • Which part of a fax cover sheet helps the recipient verify the successful transmission of all the pages? A) REMARKS: be) TOTAL N
    7·2 answers
  • Your friend called and told you that he saw information about the classified XYZ program on the Internet. As a cleared employee
    14·1 answer
  • George, a user, has contacted you to complain that his issue has not been resolved. He has already contacted your department twi
    9·1 answer
  • Even though a high-level programming language
    11·1 answer
  • What are the three fundamental principals of mnemonics? <br><br>HELP FASTTT!
    15·1 answer
  • In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
    14·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
    7·1 answer
  • Describe a situation in which a robot may have to avoid an obstacle without coming to a complete stop before turning.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!