1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kaheart [24]
4 years ago
9

A size of a jumbo candy bar with rectangular shape is l x w x h. Due to rising costs of cocoa, the volume of the candy bar is to

be reduced by p%.
To accomplish this, the management decided to keep the height of the candy bar the same, and reduce the length and width by the same amount.

For example, if l = 12, w = 7, h = 3, and p = 10, then the new dimension of the candy bar is 11.39 x 6.64 x 3.

Below is an example of how the completed program should work:

Enter the length, width, and height of the candy bar separated by space(s): 12 7 3

Enter the amount of the reduced volume as a percentage: 10

The new dimensions of the candy bar is: 11.38 x 6.64 x 3.00


Format your output with setprecision(2) to ensure the proper number of decimals for testing!
Computers and Technology
1 answer:
hammer [34]4 years ago
7 0
<h2>Please wait until more research is discovered...</h2>

Question

A size of a jumbo candy bar with rectangular shape is l x w x h. Due to rising costs of cocoa, the volume of the candy bar is to be reduced by p%.

To accomplish this, the management decided to keep the height of the candy bar the same, and reduce the length and width by the same amount.

For example, if l = 12, w = 7, h = 3, and p = 10, then the new dimension of the candy bar is 11.39 x 6.64 x 3.

Below is an example of how the completed program should work:

Enter the length, width, and height of the candy bar separated by space(s): 12 7 3

Enter the amount of the reduced volume as a percentage: 10

The new dimensions of the candy bar is: 11.38 x 6.64 x 3.00

Format your output with setprecision(2) to ensure the proper number of decimals for testing!

You might be interested in
How to hard reset a iphone 7 without computer
kondor19780726 [428]
You cant go to a specialist if you cannot figure it out or to someone who knows how to hack because the way iCloud is set up you wont be able to unless you can factory reset it by downloading jail break
4 0
3 years ago
Read 2 more answers
What is a router?
uranmaximum [27]

Answer:

A router receives and sends data on computer networks. Routers are sometimes confused with network hubs, modems, or network switches. However, routers can combine the functions of these components, and connect with these devices, to improve Internet access or help create business networks.

I believe the answer would be B). A device that sends data to the receiving device

Explanation:

3 0
3 years ago
Can anybody give me any suggestions to what my pfp should be
Julli [10]

Answer:

— Your profile picture can be one of the most important elements of ... but your photo should give candidates a clear idea of what you'd ... They might also help to direct you a bit, like telling you to tilt your head slightly or tuck your ...

Explanation:

6 0
2 years ago
Read 2 more answers
Convert the following into binary system<br>and vice versa.<br>106​
notka56 [123]
It would be 1101010 in binary
4 0
3 years ago
Read 2 more answers
A user attempts to send an email to an external domain and quickly receives a bounce-back message. The user then contacts the he
Alchen [17]

Answer:

1. DLP (Data Loss Prevention)

Explanation:

DLP tools are meant to protect sensitive information of an organization, by monitoring data transmissions and enforcing previously set policies

UTM means Unified Threat Management. It is a suite of security programs, usually including antivirus, antispam, firewall and others.

WAF stands for Web Application Firewall. It is a specific firewall used to protect web servers by monitoring HTTP traffic.

DEP or Data execution Prevention is a security feature in some operating systems that blocks applications trying to access restricted memory areas.

6 0
3 years ago
Other questions:
  • How many categories of bitmap images are there?
    8·1 answer
  • Client/server awareness. Visit three local stores in your neighborhood or mall and notice the information technology in the stor
    9·2 answers
  • #include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid &gt; 0 ) { value += 20; } printf(val
    10·1 answer
  • Which of these is the term used to describe the location of an Internet page? A) social network B) Web address C) blog D) net
    6·2 answers
  • What is one reason why a business may want to move entirely online?
    12·1 answer
  • Match the following.
    8·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
  • 69696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969
    8·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
  • ????????????helpppp please
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!