1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
3 years ago
8

(Java) In the ChiliToGo program in Exercise 12, the costs to produce an adult meal and a child’s meal are $4.35 and $3.10, respe

ctively. Adult meals are sold for $7 and children's meals are sold for $4. Modify the ChiliToGo program to display the total profit for each type of meal as well as the grand total profit.
import java.util.Scanner;
class ChiliToGoProfit
{
public static void main(String[] args) {
// Modify the code below
final double ADULT_PRICE = 7;
final double CHILD_PRICE = 4;
int adultMeals;
int childMeals;
double totalAdult, totalChild, grandTotal;
Scanner input = new Scanner(System.in);
System.out.print("Enter number of adult meals ordered >> ");
adultMeals = input.nextInt();
System.out.print("Enter number of child meals ordered >> ");
childMeals = input.nextInt();
totalAdult = adultMeals * ADULT_PRICE;
totalChild = childMeals * CHILD_PRICE;
grandTotal = totalAdult + totalChild;
System.out.println(adultMeals + " adult meals were ordered at " + ADULT_PRICE + " each.");
System.out.println(" Total is " + totalAdult);
System.out.println(childMeals + " child meals were ordered at " + CHILD_PRICE + " each.");
System.out.println(" Total is " + totalChild);
System.out.println("Grand total for all meals is " + grandTotal);​
Computers and Technology
1 answer:
vichka [17]3 years ago
5 0

Answer: No estoy segura de cuál es la respuesta

Explanation:

You might be interested in
a client device on your network is trying to authenticate via radius proxy, but is failing. you check the relevant policy on the
Varvara68 [4.7K]

The issue can be that the IP address of a RADIUS client differs from that of an access client. It could be necessary to modify the policy's IP address.

A device on the internet or a local network can be identified by its IP address, which is a special address. The rules defining the format of data delivered over the internet or a local network are known as "Internet Protocol," or IP.

IP address, which carry location information and make devices reachable for communication, are essentially the identifier that permits information to be exchanged between devices on a network. There must be a means for computers, routers, and webpages to be distinguished on the internet. A method for achieving this is provided by IP addresses, which are crucial to the operation of the internet.

A series of integers separated by periods makes up an IP address. Four numbers are used to represent IP addresses; for instance, 192.158.1.38 might be one such address. The range of each number in the set is 0 to 255. Therefore, the complete IP addressing range is 0.0.0.0 to 255.255.255.255.

To know more about IP address click on the link:

brainly.com/question/18722788

#SPJ4

6 0
1 year ago
When solving a problem in a group situation, which of the following traits should be demonstrated?
kakasveta [241]

Answer:

compromise should be demonstrated

8 0
3 years ago
Question 2 (2 points)
swat32

I beleive all of the above for question one

4 0
3 years ago
Before attempting the​ exercise, click here to watch a short video. Of the following list of tools used at Arnold Palmer​ Hospit
Nitella [24]

Answer:

A. flowcharts

Explanation:

Flowcharts are used to graphically describes a process or​ system. They can simulate the whole process step by step showing arrows between different steps.

5 0
3 years ago
A user is reporting to you that they are unable to run a script named script1 within their home directory. The user has ownershi
lianna [129]

The correct scripts are:

chmod 765 script1

chmod u+x script1

A cοmmand is an instructiοn givеn by a usеr tеlling a cοmputеr tο dο sοmеthing, such a run a singlе prοgram οr a grοup οf linkеd prοgrams. Cοmmands arе gеnеrally issuеd by typing thеm in at thе cοmmand linе (i.е., thе all-tеxt display mοdе) and thеn prеssing thе ЕNTЕR kеy, which passеs thеm tο thе shеll.

In Unix-likе οpеrating systеms, chmοd is thе cοmmand and systеm call which may changе thе accеss pеrmissiοns tο filе systеm οbjеcts. It may alsο altеr spеcial mοdе flags. Thе rеquеst is filtеrеd by thе umask. Thе namе is an abbrеviatiοn οf changе mοdе.

8 0
4 years ago
Other questions:
  • . True or False? a database breach always involves PII.<br><br> A.true<br><br> B.false
    5·1 answer
  • You are attempting to open a file containing a list of integer numbers, each on a separate line, and read them into Python as in
    6·1 answer
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • To record your own audio, you must have _____.
    14·2 answers
  • What is an internt?​
    10·1 answer
  • In c++
    12·1 answer
  • Why must a mobile application be easily customized and personalized?
    14·2 answers
  • Class function which is called automatically as soon as the object is created is called as __
    6·1 answer
  • What model involves the creation of data and process models during the development of an application
    14·1 answer
  • Frequently used _____________ can be saved as _____________ for use in analysis, dashboards, reports, tickets, and alerts.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!