ERICUS Company sells Ghacem cement at 30.0 Ghana Cedis per bag. The company however gives discount of 15% for customers that buy 100 or more bags, and 0% for customers that buy less than 100 bags. Write a pseudocode and present a flowchart that will display the discount percentage when the quantity of bags purchased is entered

Answers

Answer 1

Answer:

The pseudocode is as follows:

Input Qty

Discount = 0%

If Qty>= 100:

       Discount = 15%

 Print Discount

Explanation:

This gets the quantity of bags

Input Qty  

This initializes the discount percentage to 0%

Discount = 0%  

This checks if the quantity is greater than or equal to 100.

If Qty>= 100:

If true, the discount percentage is set to 15%

       Discount = 15%

This prints the calculated discount percentage

Print Discount

See attachment for flowchart

ERICUS Company Sells Ghacem Cement At 30.0 Ghana Cedis Per Bag. The Company However Gives Discount Of

Related Questions

Can a 64-bit client communicate with a 32-bit database server?

Answers

In Power Center, a 64-bit Oracle database client and a 32-bit client can both connect to a 64-bit database server.

Explain about the Power Center?

Power centers are sizable outdoor shopping malls that typically house three or more big-box retailers. Smaller shops and eateries that are free-standing or positioned in strip malls and encircled by a shared parking lot can be found among the more establishments in a power center.

Informatica Excellent GUIs are available for Power Center's administration, ETL design, and other functionality. It also has access to a variety of data sources, including relational data, mainframe data, data from third parties, and so forth.

Power Center is an enterprise data integration platform for the cloud that supports enterprises across the data integration life cycle. Users of the platform may control data integration projects, enterprise scalability, operational confidence, and data integration agility.

To learn more about Power Center refer to:

https://brainly.com/question/24858512

#SPJ4

Develop a program working as a soda vending machine. The program should show the product menu with price and take user input for product number, quantity and pay amount. The output should show the total sale price including tax and the change. Organize the program with 4 functions and call them in main() based on the requirements.

Answers

Answer:

Explanation:

The following vending machine program is written in Python. It creates various functions to checkItems, check cash, check stock, calculate refund etc. It calls all the necessary functions inside the main() function. The output can be seen in the attached picture below.

class Item:

   def __init__(self, name, price, stock):

       self.name = name

       self.price = price

       self.stock = stock

   def updateStock(self, stock):

       self.stock = stock

   def buyFromStock(self):

       if self.stock == 0:

           # raise not item exception

           pass

       self.stock -= 1

class VendingMachine:

   def __init__(self):

       self.amount = 0

       self.items = []

   def addItem(self, item):

       self.items.append(item)

   def showItems(self):

       print('Items in Vending Machine \n----------------')

       for item in self.items:

           if item.stock == 0:

               self.items.remove(item)

       for item in self.items:

           print(item.name, item.price)

       print('----------------\n')

   def addCash(self, money):

       self.amount = self.amount + money

   def buyItem(self, item):

       if self.amount < item.price:

           print('You can\'t but this item. Insert more coins.')

       else:

           self.amount -= item.price

           item.buyFromStock()

           print('You chose ' +item.name)

           print('Cash remaining: ' + str(self.amount))

   def containsItem(self, wanted):

       ret = False

       for item in self.items:

           if item.name == wanted:

               ret = True

               break

       return ret

   def getItem(self, wanted):

       ret = None

       for item in self.items:

           if item.name == wanted:

               ret = item

               break

       return ret

   def insertAmountForItem(self, item):

       price = item.price

       while self.amount < price:

               self.amount = self.amount + float(input('insert ' + str(price - self.amount) + ': '))

   def calcRefund(self):

       if self.amount > 0:

           print(self.amount + " refunded.")

           self.amount = 0

       print('Thank you!\n')

def main():

   machine = VendingMachine()

   item1 = Item('Kit Kat',  1.5,  2)

   item2 = Item('Potato Chips', 1.75,  1)

   item3 = Item('Snickers',  2.0,  3)

   item4 = Item('Gum',  0.50, 1)

   item5 = Item('Doritos',0.75,  3)

   machine.addItem(item1)

   machine.addItem(item2)

   machine.addItem(item3)

   machine.addItem(item4)

   machine.addItem(item5)

   print('Welcome!\n----------------')

   continueBuying = True

   while continueBuying == True:

       machine.showItems()

       selected = input('select item: ')

       if machine.containsItem(selected):

           item = machine.getItem(selected)

           machine.insertAmountForItem(item)

           machine.buyItem(item)

           a = input('buy something else? (y/n): ')

           if a == 'n':

               continueBuying = False

               machine.calcRefund()

           else:

               continue

       else:

           print('Item not available. Select another item.')

           continue

if __name__ == "__main__":

   main()

Develop a program working as a soda vending machine. The program should show the product menu with price

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

Help is very much appreciated. Thank you for your time!

Answers

Answer: 266299         669922         292629        969622        Also just saying did you backup your files to the cloud?  If not you can buy a usb-c flash drive or a lighting cable flashdrive. Best Luck.

Explanation:

The information technology (IT) department of a real-estate group cosponsored a data warehouse with a County governement. In the formal proposal written by the IT team, costs were estimated at 8,000,000/- the project’s duration was estimated to be eight months, and the responsibility for funding was defined as the business unit’s. The IT department proceeded with the project before it even knew if the project had been accepted. The project actually lasted two years because requirements gathering took nine months instead of one and a half, the planned user base grew from 200 to 2,500, and the approval process to buy technology for the project took a year. Three weeks before technical delivery, the IT director canceled the project. This failed endeavor cost the organization and taxpayers 25,000,000/-.

Why did this system fail?

Why would a company spend money and time on a project and then cancel it?

What could have been done to prevent this?​

Answers

The system fail because the company had to pay and spend more money in order to pay the workers.

What do we call a statement that displays the result of computations on the screen?
O A. result statement
OB.
O C.
O D.
OE.
screen statement
output statement
answer statement
input statement

Answers

Result statement call a statement that displays the result of computations on the screen.

Thus, Results statements a statement listing the syllabuses taken and the grades given for each candidate. Results statements are printed on stationary with a watermark in full color.

The qualifications and syllabi grades displayed in each statement are explained in the explanatory notes. Results broken down by choice, component, and curriculum for teaching staff.

A summary of all the results for your applicants is provided in the results broadsheet for teaching staff. A summary of the moderation adjustments for each internally assessed component is included in the moderation adjustment summary reports for teaching staff.  

Report on the moderation for each internally assessed component for instructional personnel, where appropriate.

Thus, Result statement call a statement that displays the result of computations on the screen.

Learn more about Result statement, refer to the link:

https://brainly.com/question/26141085

#SPJ1

describe usage about hand geometry biometric?

Answers

Biometrics for hand geometry recognition are less obvious than those for fingerprint or face recognition. Despite this, it is nevertheless applicable in numerous time/attendance and physical access applications.

What is Hand geometry biometric?

The concept that each person's hand geometry is distinct is the foundation of hand geometry recognition biometrics.

There is no documented proof that a person's hand geometry is unique, but given the likelihood of anatomical structure variance across a group of people, hand geometry can be regarded as a physiological trait of humans that can be used to distinguish one person from another.

David Sidlauskas first proposed the idea of hand geometry recognition in 1985, the year after the world's first hand geometry recognition device was commercially released.

Therefore, Biometrics for hand geometry recognition are less obvious than those for fingerprint or face recognition. Despite this, it is nevertheless applicable in numerous time/attendance and physical access applications.

To learn more about Hand geometry biometric, refer to the link:

https://brainly.com/question/12906978

#SPJ9

Drag each tile to the correct box.
Match the job title to its primary function.
computer system engineer
online help desk technician
document management specialist
design and implement systems for data storage
data scientist
analyze unstructured, complex information to find patterns
implement solutions for high-level technology issues
provide remote support to users

Answers

The correct match for each job title to its primary function:

Computer System Engineer: Design and implement systems for data storage.

Online Help Desk Technician: Provide remote support to users.

Document Management Specialist: Implement solutions for high-level technology issues.

Data Scientist: Analyze unstructured, complex information to find patterns.

Who is a System Engineer?

The key responsibility of a computer system engineer is to develop and execute data storage systems. Their main concentration is on developing dependable and effective storage options that fulfill the company's requirements.

The primary duty of an online help desk specialist is to offer remote assistance to users, addressing their technical concerns and resolving troubleshooting queries.

The main responsibility of a specialist in document management is to introduce effective measures to address intricate technological matters pertaining to document security, organization, and retrieval.

Read more about data scientists here:

https://brainly.com/question/13104055

#SPJ1

PLEASE FILL IN THE BLANK

With a bit depth of __ I can support 8 grayscale variations of black and white images.

Answers

Answer:   Thre correct answer is 3 bit

Explanation:

Using binary, a 3-bit value can support 8 variations in grayscale:

1   000

2   001

3   010

4   011

5   100

6   101

7   110

8   111

Which of the following would be used to communicate a high level description of a major change

Answers

A Change Proposal would be used to communicate a high-level description of a major change that involved significant cost and risk to the organization. Thus option D is correct.

What are a cost and risks?

The price of mitigating risk and suffering losses. The sum of all costs associated with a firm's activities that are linked to risk, such as retention costs and associated less any charges

To convey a high-level summary of a patch, utilize a change proposal. Typically, the service portfolio method produces this encouragement and inspiration, which is then forwarded to deal with different situations for approval.

Therefore, option D is the correct option.

Learn more about cost and risks, Here:

https://brainly.com/question/2149007

#SPJ1

The question is incomplete, the complete question will be :

Which of the following would be used to communicate a high-level description of a major change that involved significant cost and risk to the organization?

1) Service Request

2) Change Policy

3) Risk Register

4) Change Proposal

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.

Answers

Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.

Writting the code:

Assume the variable s is a String

and index is an int

an if-else statement that assigns 100 to index

if the value of s would come between "mortgage" and "mortuary" in the dictionary

Otherwise, assign 0 to index

is

if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)

{

   index = 100;

}

else

{

   index = 0;

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to

David Karp is credited with the invention of which microblogging service?

Answers

Answer:

On February 19, 2007, the first version of the Tumblr microblogging service was founded by David Karp and Marco Arment. They launched a more complete version in April 2007.

Explanation:

More than 100 million blogs will be online in 2007. The count continues to double every 5.5 months. About half of the blogs created are ever maintained after being created. And fewer than 15% of blogs are updated at least once a week. (Technorati)

….Yeah, it’s still a blog. But it’s a new philosophy. It’s free of noise, requirements, and commitments. And it’s finally here.

let me know if that is good enough

Advanced airbag systems are being introduced thatgroup of answer choices a. protect both front-seat and back-seat passengers. b. have sensors that respond to crash severity. c. are voice-activated. d. all answer choices are correct.

Answers

Advanced airbag systems are being introduced so that option D all answer choices are correct.

Advanced Airbag Systems:

Advanced front airbags, also known as dual stage airbags, were the next generation system. Depending on the situation, we can decide whether you need to use, reduced power, or not use it at all. According to NHTSA, advanced airbags are designed to minimize the risk of injury for children and small adults.

Airbags are a big part of this trend. According to the National Highway Traffic Safety Administration (NHTSA), frontal airbags reduce driver fatalities by 29% and passenger fatalities by 32% in frontal collisions. If we look at a new car today, we will see that there are different types of airbags, such as front airbags, side torso airbags, and side airbags. Some vehicles are also equipped with rear airbags.

In the near future, there will be further development of 'active safety' such as:  Pre-collision and lane departure warning systems to avoid accidents, rather than "passive safety" such as airbags and crumple zones that minimize injuries in an accident.

Sensors, processing and "by-wire" technology have advanced very rapidly in recent years, says John Hanson, his manager at Toyota's National in charge of Advanced Technology Business Communications. This will enable manufacturers to develop a range of high-level driver assistance features to improve accident avoidance and mitigation, he said.

Looking ahead, automakers will start incorporating predictive sensors that work in airbags, says Zuby. “Airbags could deploy just before a crash and take even less energy than they do today,” he says. This can further reduce injuries from airbag deployment.

Learn more about Advanced Airbag Systems here:

brainly.com/question/29775381

#SPJ4

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least

Answers

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least  65 percent transfer efficiency.

What is the transfer efficiency

EPA lacks transfer efficiency requirement for auto refinishing spray guns. The EPA regulates auto refinishing emissions and impact with rules. NESHAP regulates paint stripping and coating operations for air pollutants.

This rule limits VOCs and HAPs emissions in automotive refinishing. When it comes to reducing overspray and minimizing wasted paint or coating material, transfer efficiency is crucial. "More efficiency, less waste with higher transfer rate."

Learn more about transfer efficiency  from

https://brainly.com/question/29355652

#SPJ1

Which two disciplines should you study if you are considering a career in robotics 

Answers

The use of robotics is a “multi-purpose” (i.e., combining computer engineering with mechanical engineering and electrical engineering).

If one wants to work as a robotics software engineer, he needs to have a bachelor’s degree in Computer Science. If a person is interested in designing robotic parts, he needs a degree in Mechanical Engineering or Electrical Engineering.

Since its beginning, robotics has always been a multidisciplinary discipline, combining engineering, cognitive sciences, computer science, and, in recent years, social science and humanities.

To learn more about engineering, refer to the link:

https://brainly.com/question/31140236

#SPJ1

suppose you have a language with only the three letters a; b; c, and they occur with frequencies .9, .09, and .01, respectively. the ciphertext bcccbcbcbc was encrypted by the vigen`ere method (shifts are mod 3, not mod 26). find the plaintext (note: the plaintext is not a meaningful english message.)

Answers

The correct answer is One letter in the ciphertext corresponds to several letters in the plaintext; a character appears in a language. makes frequency analysis more effective...

Cipher, by definition, is an algorithm that transforms plain text into ciphertext. It is the unintelligible result of a cryptographic method. Ciphertext can also sometimes be referred to by the word "cypher." It takes a key to translate ciphertext into plain text before it can be deciphered. The output of encryption techniques, often known as cyphers, is ciphertext. When a person or device lacking the cypher cannot read the data, the data is said to be encrypted. To decode the data, they or it would require the cypher. By the kind of input data, cyphers can be divided into two categories: block cyphers, which encrypt blocks of data with a set size, and stream cyphers, which encrypt streams of data continuously.

To learn more about  ciphertext click on the link below:

brainly.com/question/30143645

#SPJ4

If you were to sort the Title field in tblBooks in a Descending order, in ms access which author would be at the top of the list? A. Linda Rode B. Robert Howard C.Isaac Asimov D. Roger D. Abrahams​

Answers

If the Title field in the tblBooks table is sorted in descending order in MS Access, the author at the top of the list would be Linda Rode. So, the correct option is A.

Sorting the Title field in descending order means arranging the titles in reverse alphabetical order.

Out of the given authors, Linda Rode would be at the top of the list because her last name, "Rode," comes first alphabetically when compared to the other authors' last names. The other authors' last names are Howard, Asimov, and Abrahams.When sorting in descending order, the records are listed from Z to A or highest to lowest, depending on the sorting field. In this case, since we are sorting the Title field, which is a text field, the sorting would be in reverse alphabetical order.

Therefore, Linda Rode, with her last name starting with "R," would appear at the top of the list. So, the correct choice is option A.

For more questions on author

https://brainly.com/question/32116759

#SPJ8

To calculate the difference of any two numbers​

Answers

Answer:

To calculate the difference of any two numbers​ we  use a sign which is minus "  -   "  to find the difference we place the greater number first and the smaller number after the minus sign

like if we want to find difference between 3 and 5

we will put the greater number 5 before the minus and 3 which is the smaller number after the minus

5 - 3

so we will get the result 2

Ans: Percentage difference = Absolute difference / Average x 100

First, you need two distinctly different numbers. Then, you need to calculate an absolute difference calculation between the two. Third, you must find the average of the same two numbers. Finally, you can apply the percentage difference formula.

1. Write a python program that uses the following initializer list to find if a random value entered by a user is part of that list. V = [54, 80, 64, 90, 27, 88, 48, 66, 30, 11, 55, 45] The program should ask the user to enter a value. If the value is in the list, the program should print a message that contains the index. If it is not in the list, the program should print a message containing -1. Hint: The values in the list are integers, so you should also get the value from the user an integer. We can assume the user will only enter integer values. Sample Run Search for: 64 64 was found at index 2​

Answers

The problem is that you can get the values from the 50-45

Suppose we define a WaitlistEntry as follows:

typedef struct{
int iPriority; /* Priority of the student to be enrolled */
int iStudentID; /* ID of the student */
}
WaitlistEntry;

Below are different implements of a function to create a WaitlistEntry from given iPriority and iStudentID data. Some of these implementations are flawed. Identify them and describe what is wrong with them briefly:

WaitlistEntry createWL( int iPriority, int iStudentlD )
WaitlistEntry w,
w.iPriority iPriority;
w.iStudentlD iStudentlD;
return w;

a. correct
b. incorrect, leaks memory
c. incorrect, syntax error
d. incorrect, data will be overwritten by next function call

Answers

Answer:

You have syntax errors, but I don't know if it happened when you posted this question, nevertheless

Explanation:

Correct code:

WaitlistEntry createWL( int iPriority, int iStudentID ) { // Opening Brace

WaitlistEntry w; // Should be ; not ,

w.iPriority = iPriority;   // Assign Missing

w.iStudentID = iStudentID; // Assign Missing

return w;

} // Closing Brace

// Also note: iStudentID this actually has an 'l' which is LD. Not ID, this is why I assume these errors happened when posting the question.

Please help ASAP!
Combined with a set number of steps to determine size, what number of degrees would you use for turn degrees to command a sprite to trace a triangle with three equal sides?

A. 90, 90

B. 45, 45

C. 90, 180

D. 120, 120

Answers

Answer:

GIVE this man Brainliest!

Explanation:

Assignment 10 - 1/0 Streams and Files Create a C++ a program that will compute the average word length (average number of characters per word) for a text file. The text file should be chosen by the user when the program is executed. • a blank space • a comma • a period • the beginning of a line • or the end of a line Your program should define a function that is called with the input-file stream as an argument. This function should also work with the stream cin as the input stream, although the function will not be called with cin as an argument in this program. Use the following text as a test for your program. Create a separate text file and paste the following paragraph into that file. Seeing, now, that there were no curtains to the win dow, and that the street being very narrow, the house opposite comman ded a plain view into the room, and observing more and more the inde corous figure that Queequeg made, staving about with little else but h is hat and boots on; I begged him as well as I could, to accelerate his toilet somewhat, and particularly to get into his pantaloons as soon as possible. He complied, and then proceeded to wash himself. At th at time in the morning any Christian would have washed his face; b ut Queequeq, to my Use the following text as a test for your program. Create a separate text file and paste the following paragraph into that file. Seeing, now, that there were no curtains to the win dow, and that the street being very narrow, the house opposite comman ded a plain view into the room, and observing more and more the inde corous figure that Queequeg made, staving about with little else but h is hat and boots on; I begged him as well as I could, to accelerate his toilet somewhat, and particularly to get into his pantaloons as soon as possible. He complied, and then proceeded to wash himself. At th at time in the morning any Christian would have washed his face; b ut Queequeg, to my amazement, contented himself with restricting his a blutions to his chest, arms, and hands. He then donned his waistcoa t, and taking up a piece of hard soap on the wash-stand centre table, dipped it into water and commenced lathering his face. I was watching to see where he kept his razor, when lo and behold, he takes the harpoon from the bed corner, slips out the long wooden stock, unsheathes the head, whets it a little on his boot, and striding up to the bit of mirror against the wall, begins a vigorous scraping, or rather harpoon ing of his cheeks. Thinks I, Queequeg, this is using Rogers's best cut lery with a vengeance. Afterwards I wondered the less at this o peration when I came to know of what fine steel the head of a harpoon is made, and how exceedingly sharp the long straight edges are alway s kept.

Answers

Answer:

dgvky

Explanation:

Which of the following methods of using PHP to connect to a MySQL database only provides an object-oriented interface?mysql extensionmysqli extensionPDO MySQL driver extensionnone of these

Answers

Answer:

PDO MySQL driver extension

Explanation:

which statements are true? Select 4 options. Responses A function can have no parameters. A function can have no parameters. A function can have a numeric parameter. A function can have a numeric parameter. A function can have only one parameter. A function can have only one parameter. A function can have a string parameter. A function can have a string parameter. A function can have many parameters. A function can have many parameters.

Answers

Answer:

A function can have a numeric parameter.

A function can have many parameters.

A function can have only one parameter.

A function can have a string parameter.

Explanation:

The____ feature in the Camera Raw dialog box can be used to bring out any deep colors in an image.

Answers

Answer: elg

Explanation:

A client has the right to receive ethically conducted research. Discuss this statement with examples.

Answers

A client has the right to receive ethically conducted research. This means that the researcher should adhere to the principles of scientific research, which includes honesty, objectivity, integrity, and respect for human subjects. In addition, the researcher should ensure that the research is conducted in a safe and responsible manner.

What is research?
Research is defined as "creative and methodical activity done to improve the body of knowledge." It entails the objective gathering, organising, and analysis of data in order to improve comprehension of a subject or issue. A research effort could build on prior contributions to the field. Research may duplicate portions of earlier projects or the project as a complete to verify the accuracy of instruments, processes, or experiments.

Documentation, discovery, interpretation, as well as the research and development (R&D) of methods & systems again for advancement of human knowledge are the main goals of basic research (as opposed to applied research). Research methodologies are based on epistemologies, which differ greatly within and between the humanities and sciences.

To learn more about research
https://brainly.com/question/25257437
#SPJ13

Given integer variables seedVal, smallestVal, and greatestVal, output a winning lottery ticket consisting of three random numbers in the range of smallestVal to greatestVal inclusive. End each output with a newline.
Ex: If smallestVal is 30 and greatestVal is 80, then one possible output is:

65
61
41
how do i code this in c++?

Answers

Answer:

Explanation:

Here's an example code in C++ that generates a winning lottery ticket consisting of three random numbers in the range of smallestVal to greatestVal:

#include <iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main() {

   int seedVal, smallestVal, greatestVal;

   cout << "Enter seed value: ";

   cin >> seedVal;

   cout << "Enter smallest value: ";

   cin >> smallestVal;

   cout << "Enter greatest value: ";

   cin >> greatestVal;

   

   // Seed the random number generator with the user-input seed value

   srand(seedVal);

   

   // Generate three random numbers in the range of smallestVal to greatestVal

   int lottery1 = rand() % (greatestVal - smallestVal + 1) + smallestVal;

   int lottery2 = rand() % (greatestVal - smallestVal + 1) + smallestVal;

   int lottery3 = rand() % (greatestVal - smallestVal + 1) + smallestVal;

   

   // Output the winning lottery ticket

   cout << lottery1 << endl;

   cout << lottery2 << endl;

   cout << lottery3 << endl;

   

   return 0;

}

This code prompts the user to enter a seed value, the smallest and greatest values for the range of the lottery numbers. It then seeds the random number generator with the user-input seed value, generates three random numbers using rand() % (greatestVal - smallestVal + 1) + smallestVal to ensure the numbers fall within the range of smallestVal to greatestVal, and outputs the results on separate lines with a newline character.

a really excellent way of getting you started on setting up a workbook to perform a useful function.

Answers

Templates a really excellent way of getting you started on setting up a workbook to perform a useful function.

What is the workbook  about?

One excellent way to get started on setting up a workbook to perform a useful function is to begin by defining the problem you are trying to solve or the goal you want to achieve. This will help you determine the necessary inputs, outputs, and calculations required to accomplish your objective.

Once you have a clear understanding of your goal, you can start designing your workbook by creating a plan and organizing your data into logical categories.

Next, you can start building the necessary formulas and functions to perform the required calculations and operations. This might involve using built-in functions such as SUM, AVERAGE, or IF, or creating custom formulas to perform more complex calculations.

Read more about workbook here:

https://brainly.com/question/27960083

#SPJ1

Help plz

Which of the following statements are true about cyberbullying:

1. Cyberbullying uses electronic communication to bully a person.

11. Cyberbullying is a crime in many states.

III. Instances of cyberbullying do not affect the digital footprint of the victim.

IV. Cyberbullying hurts real people even though we can't always see their reactions
online.

I and IV

O ll and III

O 1, 11, and IV

All of the above

Answers

1 and IV are the are the right answers because cyber bullying is online and it hurts real people but you can’t see there reaction.

The following statements are true about cyberbullying: Cyberbullying uses electronic communication to bully a person. Cyberbullying hurts real people even though we can't always see their reactions.

What is cyberbullying?

The use of mobile phones, instant messaging, e-mail or social networking sites to intimidate or harass someone is known as cyberbullying.

The correct answer is "I and IV." Statement I is true because cyberbullying is defined as using electronic communication to bully a person.

Statement IV is also true because even though we may not be able to see the victim's reactions online, cyberbullying can still have real-life consequences and can hurt the victim emotionally or mentally.

Statement II is false because cyberbullying is a crime in many states, and statement III is also false because instances of cyberbullying can affect the victim's digital footprint.

Hence, the correct statements are "I and IV".

To learn more about cyberbullying click here:

https://brainly.com/question/8142675

#SPJ2


3. Based on the code you created in this Unit, propose a way to re-use most of the code
(with different information in the variables like "city" and "rates) for a part of a similar app
that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you’ve writted (you can defend your proposal if the connection is not immediately obvious).

Answers

One possible way to reuse the code for a similar app is to modify it for a hotel booking system. Instead of parking rates for different cities, the modified app could display room rates for different hotels in various cities.

The basic structure of the code can be kept the same, with adjustments made to the variable names, input fields, and calculations. The "city" variable can be replaced with a "hotel" variable, and the "rates" variable can be replaced with a "room rates" variable.

The user input can be modified to ask for the desired hotel and room type, and the app can display the available room rates for that selection.

To learn more about the booking system, follow the link:

https://brainly.com/question/28315659

#SPJ1

Other Questions
Q1. Mara is building a wind chime. She needs string in the following lengths: 6 piecesof 20 cm, 3 pieces of 30 cm, and 1 piece of 40 cm. How much string does she need? .8. A typical greyhound race at the lowa Greyhound Park in Dubuque has 8 dogs and pays prizes to the owners that finish in 19, 2nd, and 3rd. How many ways can the first 3 places be determined from the 8 dogs racing? (3 points) How does a dog fulfill the three points of the cell theory? The price system is an important component of the market because itA ensures that producers are able to profitB guarantees that consumers get the goods that they wantC coordinates the activities of producers, consumers, and owners of resourcesD prevents spillover effects from occurring Write as a fraction (no improper fractions): 3.7 When talking about her love of nature in the entry dated June 15, 1944, why does Anne compare herself to people in prisons and hospitals?Question 13 options:Inmates of prisons and people too ill in the hospital are unable to leave. Both are capable of of understanding solitude and loving the quietness. Inmates of prisons and people in the hospital are able to enjoy their lives happily. Both are apart of a group to enjoy the bounty of their existence. 4) a child in a tree house uses a rope attached to a basket to lift a 22 n dog into the house with a work done of 103.4 j. how far did the child lift the dog? I will give brainliest answer (x + y) verbal expression Read the excerpt below from Little Women and answer the question.The more she saw of Annie Moffat's pretty things, the more she envied her and sighed to be rich. Home now looked bare and dismal as she thought of it, work grew harder than ever, and she felt that she was a very destitute and much-injured girl, in spite of the new gloves and silk stockings.She had not much time for repining, however, for the three young girls were busily employed in "having a good time."Which of the following sentences is the best use of repine based on the context clues in the excerpt?its no use repining over unfinished test questions.Saturdays are lazy repining days.For hours we stayed up repining over our adventures at camp last summer.Cameron repined for the days of his youth when he could sleep until noon.you have a Chanse at branlist in virginia, progressives pushed for more concrete ___________ laws. "One particular feature of many communist regimes [was] their systematic use of ______ as a weapon."A. famineB. gasC. poisonD. disease help please!!!!!!!!!! Consider the following two-player game. S; = [0, 1], for i = 1, 2. Payoffs are as follows = $2 ui(81, 82) = {" 100 if 81 0 if 81 +82 uz (81, 82) = 150 [82 81 - ]]?. Part a: Describe B1. Explain. Part b: Describe B2. Explain. [Hint: it is not necessary that you use calculus to answer any part of this question]. 3.52X x2.5What the correct answer step by step Ali runs 6 miles in 55 minutes. At the same rate, how many miles would he run in 44 minutes? Every fall, clusters of hundreds of danaus plexippus, or monarch butterflies, migrate into mexico. the traveling group of d. plexippus is one example of a(n) _______. a. population b. ecosystem c. community d. biome please select the best answer from the choices provided a b c d the figure shows a refracted light beam in linseed oil making an angle of = 17.0 with the normal line nn'. the index of refraction of linseed oil is 1.48. 9) How did Lewis and Clark plan to cross the Rocky Mountains? An atom has 14 protons, 17 neutrons, and 18 electrons. What is its mass number, atomic number, and charge?