1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
2 years ago
8

Implemente a função ao lado, que recebe um preço e um booleano indicando se já está com desconto ou não. Se o preço for maior qu

e 100 e não estiver com desconto, a função deve retornar Quero pechinchar. Caso contrário, deve retornar Negócio fechado.
isso é javascript, se estiver algum deus da programação me ajude eu travei nesse exercicio <3
Computers and Technology
1 answer:
Andrew [12]2 years ago
7 0

Answer:

function pecoDesconto(preco, estaComDesconto) {

 

 let p = preco;

 let desconto = estaComDesconto;

 if(p > 100 && desconto == false){

   return "Quero pechinchar";

 }else{

   return "Negócio fechado";

 }

}

Explanation:

function pecoDesconto(preco, estaComDesconto) {

 

 // Implemente a função ao lado, que recebe um preço//

 let p = preco;

// variavel que indica desconco//

 let desconto = estaComDesconto;

//Se o preço for maior que 100 e não estiver com desconto, a função deve retornar Quero pechinchar.//

 if(p > 100 && desconto == false){

   return "Quero pechinchar";

   //Caso contrário, deve retornar Negócio fechado

 }else{

   return "Negócio fechado"

 }

}

só te faltou ler com atenção, e um pouco de logica!

You might be interested in
Memory chips are used in ____ storage devices to read and write data
MakcuM [25]
Solid state storage?
There are three different types,
Like RAM, ROM, SSS

5 0
3 years ago
You are the security administrator for your company. You have been informed by human resources that one of the employees in acco
andreyandreev [35.5K]

Answer:

The answer is "option d".

Explanation:

When an employee is fired so, their account should be closed, and the employee records should be maintained over a certain time specified by the rules and procedures of the company. and other options can be defined as:

  • In option a,  It is not important to delete the user account because later on, the company would need info about that account.
  • In option b, There's no need to talk to the superior of the employer.
  • In option c,  change the user password is not enough to update the user's password; the account should also be deleted.
5 0
4 years ago
If the transmitting device would like for the receiving device to push currently buffered data to the application on the receivi
Andreyy89

Answer:

The right approach will be "PSH".

Explanation:

  • The PSH flag seems to be an acceptable solution through TCP which always encourages the submit implementation to immediately transfer data but only whenever the buffer isn't complete.
  • The implementation helps to formulate this same flag towards true for something like the connection, as well as TCP will instantly begin transmitting the relevant information.
3 0
3 years ago
Lindsay owns a candy store that typically makes all if its sales to tourists visiting a nearby zoo. Why might she decide to set
AVprozaik [17]
B and A. Both answers are correct
3 0
3 years ago
Read 2 more answers
Florescent lights tend to emit less of what color?
Olin [163]
I believe it emits more yellow, it can even be blue or green 
4 0
3 years ago
Other questions:
  • In the electric series, which one of the following materials is the most negatively charged? A. Silk B. Sealing wax C. Teflon D.
    7·2 answers
  • OSHA requires training for employees on the hazards to which they will be exposed.
    12·2 answers
  • Suppose you will invest $100 per month at the beginning of the month for 40 years with interest rate
    5·1 answer
  • Why are duplicate tuples not allowed in a relation?
    6·1 answer
  • Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the following commands will co
    12·2 answers
  • A _____ is a number that summarizes an encrypted information. digital certificate hash function message digest hash algorithm
    8·1 answer
  • How should work be allocated to the team in a Scrum project?
    13·1 answer
  • TRUE AND FALSE
    10·1 answer
  • Which of the following are pointers?
    9·1 answer
  • you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!