1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
12

To plan a pizza party, one may want to order enough pizza for everyone. Use the slicesInPizza, slicesPerPerson, and totalGuests

variables to compute the total number of pizzas needed to feed all the guests and store the result in totalPizzas. The total may have a decimal place.
1 var slicesInPizza = 8; // Code tested with values: 8 and 12
2 var slices PerPerson = 4; // Code tested with values: 4 and 5
3 var totalI Persons = 12; // Code tested with values: 12 and 10
4
5 var pizzasNeeded = 0;
Computers and Technology
1 answer:
zheka24 [161]3 years ago
6 0

Answer:

Explanation:

The following code was written in Javascript. It asks the user to enter the values for each of the variables and saves it to them. Then it uses those values to calculate the total number of pizzas needed to feed everyone at the party. Finally, it prints out the total to the screen as an alert. Both test cases were used and the outputs can be seen in the attached images below.

var slicesPerPizza = window.prompt("How many slices per pizza?");

var slicesPerPerson = window.prompt("How many slices per person?");

var totalPersons = window.prompt("How many total people will attend?");

var pizzasNeeded = Math.round((slicesPerPerson * totalPersons) / slicesPerPizza)

alert(`You need a total of ${pizzasNeeded} pizzas.`)

You might be interested in
Which of these are examples of data sources? Check all that apply.
Rama09 [41]

Answer: databases, electronic archives, online libraries, spreadsheets (B,C,E,F)

Explanation: I just took the test :)) hope u have a great day and remeber u are beautiful <3

4 0
2 years ago
Read 2 more answers
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
How do you give <br>brainlieset ​
Ray Of Light [21]

It has to be two people answering.Then vote braniest to who's answer you think is better.

8 0
3 years ago
Which of the following items is an example of software? A. WORD PROCESSING PROGRAM B. KEYBOARD C. PRINTER D. MOUSE
Umnica [9.8K]
Well the only one that is actually a piece of programming is A. Word Processing Program. B, C and  D are all peripherals for a computer not actual software for it. Basically if you have to install it on the computer its software. Now B C and D may need software to make them compatible with your computer they themselves dont need to be installed.
8 0
3 years ago
Trailer nodes at the end of the list should contain avalue ____ than the largest value in the dataset.
omeli [17]

Answer:

b. larger

Explanation:

Trailer nodes at the end of the list should contain avalue larger than the largest value in the dataset.

4 0
3 years ago
Other questions:
  • Which of the following is considered a benefit when using slab allocator?
    6·1 answer
  • Select the correct answer.
    11·1 answer
  • Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O.
    7·1 answer
  • Internet is for everyone but it wont be if its users cannot protect their privacy and the confidentiality of transactions conduc
    6·1 answer
  • Kyle wants to access his school’s home page. How can he do this?
    8·2 answers
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Explain the following buttons as used in emails:compose,inbox and Draft.<br>​
    10·1 answer
  • I got a kahoot! Totally random pls join!<br><br> Code 08408519!
    12·2 answers
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
  • FREEEEE 100 POINTS COME TAKE COME COME COME<br><br> only if u like da black panther
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!