Answer:
bill = float(input("Enter the bill amount: "))
rating = int(input("Choose a rating: 1 = Totally satisfied, 2 = Satisfied, 3 = Dissatisfied.: "))
if rating is 1:
tip = bill * 0.2
elif rating is 2:
tip = bill * 0.15
elif rating is 3:
tip = bill * 0.1
print("The rating is: " + str(rating))
print("The tip is: $%.2f" % (tip))
Explanation:
*The code is in Python
- Ask the user for the <em>bill</em> and <em>rating</em>
- Depending on the <em>rating</em>, calculate the <em>tip</em> using <u>if else</u> statement i.e. If the rating is chosen as 1, calculate the tip by taking 20 percent of the bill.
- Print the <em>rating</em> and the <em>tip</em>
Answer:
For marketing requirements, various communication mediums like digital communication medium, as well as non digital traditional communication medium can be used. Some like Blogs, Article directories, forums etc. can be used.
However, the AI, ML, DL and the traditional statistical analysis from Data Science can also be used. You need to install on your blog the chat-bots, And through the Chat-bots we can make a data set, that is in fact automatically generated, and contains email, phone numbers, addresses etc, and this data base can be used to run the Amazon Sage-makers. and a lot of meaningful information can be achieved through the prepared data-set through the Sage-maker.
Thus, you can find out quite easily what is good.
Sage maker, Chat bots and Blog technology is quite cost effective as well.
Explanation:
The above details covers all the requirements.
Answer:
computer means an electronic machine which process raw data and gives meaningful information to the user
Answer:
A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.
Explanation:
A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..
Algorithm
STEP 1: START.
STEP 2: DEFINE n, i, j.
STEP 3: SET sum =0.
STEP 4: SET n =100.
STEP 5: REPEAT STEP 6 to STEP 10 UNTIL i<=n.
STEP 6: REPEAT STEP 7 and STEP 8 UNTIL j<=i/2.
STEP 7: if i%j ==0.
STEP 8: sum =sum + j.Algorithm
STEP 1: START.
STEP 2: DEFINE n, i, j.
STEP 3: SET sum =0.
STEP 4: SET n =100.
STEP 5: REPEAT STEP 6 to STEP 10 UNTIL i<=n.
STEP 6: REPEAT STEP 7 and STEP 8 UNTIL j<=i/2.
STEP 7: if i%j ==0.
STEP 8: sum =sum + j.