1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
11

Please answer in Java

Computers and Technology
1 answer:
ra1l [238]3 years ago
8 0

Answer:

Scanner keyboard = new Scanner(System.in);

   

       

       

        double discount = 0;

        double productPrice;

        double subTotal;

        double salesTax;

        double saleTotal;

       

       

       System.out.printf("Enter the purchase amount:");

       productPrice = keyboard.nextDouble();

       

       if (productPrice > 10) {

          discount = 10;

}

       System.out.println( + discount + "% discount applied.");

       

       subTotal = (productPrice);

       salesTax = (subTotal * 0.14);

       saleTotal = (subTotal + salesTax - discount );

       System.out.printf("Subtotal: $%5.2f\n", subTotal);

       System.out.printf("Discount; -$%5.2f\n", productPrice - discount);

       System.out.printf("HST: $%5.2f\n", salesTax);

       System.out.printf("Total: $%5.2f\n", saleTotal + salesTax);

}

}

Explanation:

You might be interested in
What is the line tool used for in photoshop
ale4655 [162]
Creates line<span> shapes and paths.</span>
5 0
3 years ago
The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and inclu
nekit [7.7K]

Answer:

allocated baseline

Explanation:

The allocated baseline documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.

Hope this helps!

5 0
3 years ago
Read 2 more answers
When an isolated object becomes charged by induction, which best describes the net charge on the object?
cupoosta [38]
<span>C. The net charge does not change. 

The charge remains neutral and thus, polarization takes effect. Polarization simply means electrons and protons are separated into opposites. To best explain this, we can use a rubber balloon that has been rubbed against animal fur. Assume is has been negatively charged, bring it close to the object and make sure that these two do not touch. Electrons within the object will experience a repulsive force. 
</span>
Since repulsion will be greatest for those electrons nearest the balloon, many of them will be induced into moving away from the rubber balloon. By default, electrons are free to move from atom to atom and thus there will be a mass migration of balloons side of the object to the opposite side of the object. <span>This will leave more atoms on the rubber balloon’s side of the object with a shortage of electrons and will be positively charged and vice versa. </span>Overall, the object will become electrically neutral. 

 
5 0
3 years ago
Problem 8 - Recursive Divisible by 3 and 5 Complete the divBy3And5 function which accepts a list of integers. The function shoul
slavikrds [6]

The recursive function divBy3And5 is defined in Python and is found in the attached image.

In the base case, the function divBy3And5 tests if the input list is empty. If so, the tuple returned is (0, 0). This means no numbers are divisible by three and no numbers are divisible by five.

The recursive step gets the first element of the list and

  • If divisible by 3, it sets <em>count_of_3</em> to 1, else it leaves it as 0
  • If divisible by 5, it sets <em>count_of_5</em> to 1, else it leaves it as 0

It then makes a recursive call on the remaining elements, and stores it in a variable as follows

   <em>divBy3And5_for_remaining_elem</em> = divBy3And5(remaining_elements)

Then, it returns the tuple

       (<em>divBy3And5_for_remaining_elem</em>[0] + <em>count_of_3</em>,

                <em>divBy3And5_for_remaining_elem</em>[1] + <em>count_of_5)</em>

Learn more about recursion in Python: brainly.com/question/19295093

5 0
2 years ago
An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
maxonik [38]

The type of attack which has occurred in this scenario is known as credential harvesting.

<h3>What is credential harvesting?</h3>

Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):

  • MITM attacks
  • DNS poisoning
  • Phishing

In conclusion, the type of attack which was used in this scenario is known as credential harvesting.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

3 0
2 years ago
Other questions:
  • If you only use part of a quotation, it is not necessary to include a citation
    6·1 answer
  • 10 points!!!! Giving brainly to correct answers ! how do you make your questions wroth 5 points? mine only goes down to 10 &gt;:
    15·1 answer
  • Which of the following is a good choice to help you stay organized when you are away from the office? A. Personal Information ma
    7·1 answer
  • True or false: its okay to sometimes compromise our values in order to resolve a conflict
    15·1 answer
  • You are going to write a program for Computer test which will read 10 multiple choice questions from a file, order them randomly
    11·1 answer
  • Which line of code will print Python is cool! on the screen?
    9·2 answers
  • Char[][] array1 = new char[15][10];
    5·1 answer
  • Explain what is meant by information technology (IT). Explain what is meant by information systems (IS). Why is it important to
    7·1 answer
  • Win10如何删除自己添加的环境变量?...............
    8·1 answer
  • THE DIFFERENCE BETWEEN COPY AND PASTE AND CUT AND PASTE IS: *
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!