1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snezhnost [94]
3 years ago
12

A local pizza shop is selling a large pizza for $9.99. Given the number of pizzas to order as input, output the subtotal for the

pizzas, and then output the total after applying a sales tax of 6%. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('Subtotal: ${:.2f}'.format(yourValue))
Computers and Technology
1 answer:
storchak [24]3 years ago
8 0

The program requires a sequence control structure

The sequence control structure implies that, the program does not include any conditional statement, and it does not include iterative or repetitive operations.

The complete code in Python, where comments are used to explain each line is as follows:

#This gets input for the number of pizza from the user

count = int(input("Number of Pizza: "))

#This calculates the subtotal (<em>without tax</em>)

Subtotal = count * 9.99

#This calculates the total (<em>with tax</em>)

Total = Subtotal * 1.06

#This prints the subtotal

print('Subtotal: ${:.2f}'.format(Subtotal))

#This prints the total

print('Total: ${:.2f}'.format(Total))

At the end of the program, the total and the subtotal are calculated and printed.

See attachment for sample run

Read more about similar programs at:

brainly.com/question/14839980

You might be interested in
Computers and Technology:
Monica [59]

Answer:

The algorithm:

Input days

sum = 0

for i = 1 to days

   input text

   sum = sum + text

end for

average = sum/days

print average

The program in pascal:

var days, sum, text, i:integer;

var average : real;

Begin

    write ('Days: '); readln(days);

    sum:=0;

    for i := 1 to days do begin

         write ('Text: ');  readln(text);  

         sum:=sum+text;

    end;

    average := (sum/days);

    writeln ('The average text is' , average);

End.

Explanation:

This declares all variables

var days, sum, text, i:integer;

var average : real;

This begins the program

Begin

This gets the number of days from the user

    write ('Days: '); readln(days);

Initialize sum to 0

    sum:=0;

This iterates through the days

    for i := 1 to days do begin

This gets the text for each day

         write ('Text: ');   readln(text);  

This sums up the texts

         sum:=sum+text;

End loop

    end;

Calculate average

    average := (sum/days);

Print average

    writeln ('The average text is' , average);

End program

End.

3 0
3 years ago
Which two standards below represent newer versions of stp??
valina [46]
Standard Tree Protocol (STP) is a networking protocol that was made by Radia Perlman. It makes a single path over a network, averting any loops from happening. Even if there are multiple paths to the same destinations. It has two never versions which is 802.1s and 802.1w.
8 0
3 years ago
Select all that apply. To select more than one worksheet at the same time, which of the following keys on your keyboard can you
Colt1911 [192]
<em>Shift </em>selects multiple worksheets at the same time. <em>Ctrl</em> selects all that you selected with Ctrl pressed.
4 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
In the borders and shading dialog box where would you look to see if your border will have two sides
arlik [135]
On the preview box? I think. 
6 0
3 years ago
Read 2 more answers
Other questions:
  • Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he us
    7·1 answer
  • Backlighting allows for maximum detail to be seen in the front of the object you are photographing.
    7·1 answer
  • ) Suppose algorithm A takes 10 seconds to handle a data set of 1000 records. Suppose the algorithm A is of complexity O(n2). Ans
    12·1 answer
  • A trench is a narrow excavation in which the depth is greater than the width and the width does not exceed 15 feet. A. False B.
    13·2 answers
  • What does my name look like in binary code, btw my mane is Wendy Alexis Morales
    10·2 answers
  • A user contacted the help desk to report that the laser printer in his department is wrinkling the paper when printed. The user
    5·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device br
    13·1 answer
  • Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your o
    5·1 answer
  • Imagine running a 64-bit system on a 32-bit system, where we simulate a single 64- bit memory location (register) using two atom
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!