1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
6

Python;

Computers and Technology
1 answer:
riadik2000 [5.3K]3 years ago
4 0

a = int(input("Class A tickets sold: "))

b = int(input("Class B tickets sold: "))

c = int(input("Class C tickets sold: "))

print("Total income generated: $"+str((a*20)+(b*15)+(c*10)))

I hope this helps!

You might be interested in
It is easy to create good photographs of mountains because you can always tell how big they are. True False
Tanya [424]

False

From afar it may be difficult to be sure how big the mountains actually are

5 0
3 years ago
Read 2 more answers
"A software package developed to handle information requirements for a specific type of business is called a horizontal applicat
goldfiish [28.3K]

Answer:

<h3>False </h3>

Explanation:

Vertical application software it the software which if build as per the specific requirements for achieving specific processes and functions which are unique to a user or business. These softwares are customised as per the needs of an organisation or enterprise. these applications are useful for organisations operating in marketing, sales, inventory etc but cannot be used by other businesses. They are built to target specific users. ERP(Enterprise Resource Planning ) and CRM (Customer Relationship Management ) are examples of vertical applications.

3 0
3 years ago
Read 2 more answers
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
How is the United Kingdom planning to use driverless cars beginning in 2015?
AlekseyPX
You need answers to the question

8 0
3 years ago
Read 2 more answers
Which word did alexander graham bell want adopted as a telephone greeting instead of hello.
Alik [6]

Answer:

I believe it was Ahoy.

Explanation:

I could be wrong though.

7 0
2 years ago
Read 2 more answers
Other questions:
  • Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
    14·1 answer
  • Use the following global structure declaration as an example only. You will need to create your own data structure based on a da
    5·1 answer
  • If you see ________________________ in a cell, it means the column is not wide enough to display the cell content. Select one: a
    15·1 answer
  • This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by
    8·1 answer
  • Give state diagrams of DFAs that recognize the following languages.
    6·1 answer
  • Access time is:________.
    11·1 answer
  • Which of the following is a characteristic of the college savings plan
    9·2 answers
  • List any three importance of computer points​
    8·1 answer
  • Which of the following is true about stateless applications?
    9·1 answer
  • As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!