1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
3 years ago
10

The cost of an items is Rs 200. what will be the cost of 50 such items. write a simple program​

Computers and Technology
1 answer:
alexandr402 [8]3 years ago
4 0

Answer:

In Python:

Unit_Cost = 200

Cost50 = 50 * Unit_Cost

print("Cost of 50 items: Rs."+str(Cost50))

Explanation:

This initializes the unit cost to 200

Unit_Cost = 200

This calculates the cost of 50 of such items

Cost50 = 50 * Unit_Cost

This prints the calculated cost

print("Cost of 50 items: Rs."+str(Cost50))

You might be interested in
Security is a major concern with m-commerce. How can m-commerce software ensure the security of transmissions and that the trans
dimaraw [331]

Answer:

Security in communication between applications and sites in m-commerce can use SSL technology.

Explanation:

While developing an app, developers have to perform several checks and ensure that the server has a legitimate certificate.

7 0
2 years ago
Suppose you design a banking application. The class CheckingAccount already exists and implements interface Account. Another cla
Leona [35]

Answer:

Strategy

Explanation:

The strategic design pattern is defined as the behavioral design pattern that enables the selecting of a algorithm for the runtime. Here the code receives a run-time instructions regarding the family of the algorithms to be used.

In the context, the strategic pattern is used for the application for implementing OverdraftCheckingAccount class. And the main aspect of this strategic pattern  is the reusability of the code. It is behavioral pattern.

6 0
3 years ago
When you block a number can they still text??
noname [10]
When a blocked number tries to send you a text message, it won’t go through, and they will likely never see the “delivered” note. On your end, you’ll see nothing at all. As far as phone calls are concerned, a blocked call goes directly to voice mail. On your end, you’ll get a special “blocked messages” folder in your voice mail inbox if they leave a message, but you won’t get a notification they called.
5 0
3 years ago
During class, your professor mentions an interesting article about Obama's networking in Iowa. From the Library homepage's list
jenyasd209 [6]

Answer:

True.

Explanation:

At the time of attending the class, the professor discusses an informative article regarding Iowa's networking with Obama. From those in the collection of Publications Indexes and Databases (References to an external site) of it's Libraries webpage, identify and scan the Sociological Analyses index using such terms: Political networking and Iowa to identify an article in Feb 2010.

Thus, topic words are helpful to identify related articles on the topic for students. Internet is the reference used for this article.

4 0
3 years ago
Could it be there will be nothing like lost forever documents with programs like backupdocs.com?
katen-ka-za [31]

Answer:

Yes

Explanation:

The programs like backupdocs.com help us in storing the lost forever documents like driving license, ration card, social security number, etc., and in case they are lost you need not worry as the backup is there on the backupdocs.com. You can hence, get your lost forever documents from the backupdocs.com in case you have lost them. Hence, the fact put forward by the above question is certainly true. And backupdocs.com is a real advantage for us hence.

4 0
3 years ago
Other questions:
  • In a weighted scoring model, the sum of the weights of all the criteria must total _____ percent.
    15·1 answer
  • In this assignment you will write a function that will calculate parallel resistance for up to 10 parallel resistors. Call the f
    12·1 answer
  • Let’s use that simple branch instruction to do the following: Load the two words declared in the data statement shown to the rig
    14·1 answer
  • A clock is reading 10:27:54.0 (hr:min:sec) when it is discovered to be 4 seconds fast. Explain why it is undesirable to set it b
    9·1 answer
  • What are some of the issues that create conflict in the future and why?
    12·1 answer
  • A___ is a placeholder where you can enter text to manipulate and give new graphical effects.​
    13·1 answer
  • _____ are labels for data, while _____ tie values together into one entity.
    15·1 answer
  • 1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
    10·1 answer
  • What is utility Software​
    14·1 answer
  • A company is looking to share data between two platforms in order to extend their functionality. which feature enables communica
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!