import java.util.Scanner;

public class MoneyConversion
{
// This program reads a monetary amount and computes the equivalent in bills and coins
public static void main (String[] args)
{
double total;
int tens, fives, ones, quarters, dimes, nickels;
int remainingCents;

Scanner scnr = new Scanner(System.in);

// Read in the monetary amount
total = scnr.nextDouble();

// Add the remaining code to finish out the program

}
}

Answers

Answer 1

Using the knowledge in computational language in JAVA it is possible to write a code that write a function cascade that takes a positive integer and prints a cascade of this integer

Writting the code:

import java.util.*;

public class ChangeTendered {

   public static void main(String[] args){

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter the purchase price: ");

       double price = scan.nextDouble();

       System.out.println("Enter the amount payed: ");

       double ammountPayed = scan.nextDouble();

       double changeDue = ammountPayed - price;

       int dollars = (int)changeDue;

       System.out.println("Return"+ dollars+ "Dollars");

       scan.close();

   }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

Import Java.util.Scanner;public Class MoneyConversion{ // This Program Reads A Monetary Amount And Computes

Related Questions

Warzone Players Drop Activison ID!!!

Answers

Answer:

I don't know what that is!!!

Explanation:

bc i only play rblx with two o's!!!

Answer: xXPanda_SenseiXx is my ID

Explanation:

does anyone play r0bIox

Answers

Answer:

Ah, okay okay, I know that game seems like a MEME, but it's actually good. I know a lot of kids play it and this community is filled with people...

Designers are comparing performance between a multi-core processor equipped with 16 in-order cores and a dual-core superscalar processor. The dual-core superscalar processor has two identical Out- of-Order cores. Each core is a 4-issue superscalar. The multi-core processor has 16 in-order processor cores. Each in-order core of the multi-core processor can achieve about one third the performance of the OoO superscalar core. A benchmark program K includes both sequential codes that can only be executed on one CPU core and parallel codes that can be distributed to multiple CPU cores. For program K, execution of the sequential codes takes 30% of the total execution time.

Required:
Which processor would deliver faster performance for benchmark program K and show your calculations?

Answers

Explanation:

it will be k because it process faster an it comsume less elecricity

What is the class of the object defined by the expression x <- c(4, "a", TRUE)

Answers

it’s false, just did it unless it’s probably different

You are a systems analyst. Many a time have you heard friends and colleagues complaining that their jobs and businesses are being negatively impacted by e-commerce. As a systems analyst, you decide to research whether this is true or not. Examine the impact of e-commerce on trade and employment/unemployment, and present your findings as a research essay.

Answers

E-commerce, the online buying and selling of goods and services, has significantly impacted trade, employment, and unemployment. This research essay provides a comprehensive analysis of its effects.

What happens with  e-commerce

Contrary to popular belief, e-commerce has led to the growth and expansion of trade by breaking down geographical barriers and providing access to global markets for businesses, particularly SMEs. It has also created job opportunities in areas such as operations, logistics, customer service, web development, and digital marketing.

While certain sectors have experienced disruption, traditional businesses can adapt and benefit from e-commerce by adopting omni-channel strategies. The retail industry, in particular, has undergone significant transformation. E-commerce has empowered small businesses, allowing them to compete with larger enterprises and fostered entrepreneurial growth and innovation. However, there have been job displacements in some areas, necessitating individuals to transition and acquire new skills.

Read mroe on  e-commerce here  https://brainly.com/question/29115983

#SPJ1

n the context of automation, what is a robot?

Answers

Answer:

Explanation:

A non human

During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender to re-transmit the frame and hence it will increase the re-transmission overhead. By considering the scenarios given below, you have to choose whether the packets should be encapsulated in a single frame or multiple frames in order to minimize the re-transmission overhead.

Justify your answer with one valid reason for both the scenarios given below.

Scenario A: Suppose you are using a network which is very prone to errors.

Scenario B: Suppose you are using a network with high reliability and accuracy.

Answers

The packets would be encapsulated in single frame in scenario A. In scenario B, it should be in multi frames.

In scenario A, given that this network has been said to be prone to error, the packets should be encapsulated in single frames.

The reason for this is because, using a single frame helps to decrease error. We have been told already that it is prone to error. If you use the multi frame, there would be very high likelihood of errors occurring.

In scenario B, given that the network is accurate and very reliable, the best packet is the multi frame.

It would give a quicker transmission and the likelihood of errors occurring is also low.

Read more on https://brainly.com/question/24373056?referrer=searchResults

In today’s fast-paced, often "agile" software development, how can the secure design be implemented?

Answers

Answer:

Answered below

Explanation:

The agile approach to software development involves development through the collaborative efforts of integrated and organised teams and users. Nowadays, people follow this approach because it allows for faster deployment, continuous updates as well as flexibility in development.

In the face of this rapid development and deployment, security design can be a challenge to keep up with.

Some steps to implement security in an agile environment include;

- Approaching security implementation in the same agile way as software development.

- Making software developers responsible for secure development and implementation.

- Utilising continuous integration of security practices by integrating security solutions with the development tools.

For the equation y = 5 + 6x, what does y equal when x is 4?
A.
29

B.
15

C.
19

D.
23

Answers

Answer:

y = 29

Explanation:

y = 5+6x

What is y when x = 4

Substitute x with 4 :

5 + 6(4)

5 + (6×4)

5 + 24

29

y = 29

Hope this helped and have a good day

Answer:

y=29

Explanation:

y=5+6x

y=5+6(4)

y=5+24

y=29

The trackpad/touchpad on my laptop is acting unusual. When I click on something or move to an area, it jumps or moves to another area.

Answers

Mine sometimes does this too. First thing to do is attach a mouse. Then try restarting the computer. If that doesn't work, find your touchpad settings and reset them. Finally, if none of that helps, you might just have a broken touchpad. You can buy spares though, and there are videos online to show you how to do the installation.

How to use this program

Answers

Answer:

there is no problem

Explanation:

but i hope i can help one day

In cell F15 insert a function that will automatically display the word discontinue if the value in cell D15 is less than 1500, or the text No Change if the value in the cell D 15 is greater than or equal to 1500

Answers

The question demonstrates the illustration of the IF function in Microsoft Office Excel. The required IF function may be as follows:

IF(D15<1500, "Discontinue", "No Change").

What is the IF function in Excel?

IF function in excel may be characterized as one of the most important functions that allow a user to make logical comparisons between a value and what you expect. So an IF statement can have two results that are as follows:

The first result is if your comparison is True, The second is if your comparison is False.

Assuming that this is excel, you can locate the cell F15 and input the IF function. The formula for the IF function is IF(<condition>, <action if true>, <action if false>).

So before the 1st comma, we place the condition which is D15 < 1500. In the middle, before the 2nd comma, we place the text to display if D15 is less than 1500, which is "Discontinue". In the last place, we place the text to display if D15 is greater than or equal to 1500, which is "No Change"

To learn more about the IF function, refer to the link:

https://brainly.com/question/20497277

#SPJ1

PART 1: What's with ABCD's?
Directions: Read and analyze the statement carefully. Choose the BEST answer
and write the letter only in your answer sheet.
1. Which finger lies on the Space Bar when using the Home Row Position?
a. Thumb b. Index Finger c. Middle Finger d. Ring Finger
2. What do we call the position that we need to touch in typing?
a. Upper Keys/ Lower Keys
c. Function Keys
b. Command Keys
d. Home Row Position
3. What are the letters that your fingers in your LEFT hand touching?
a. ASDF b. ASDFG
c. H J K L ;
d. J K L ;
4. What are the letters that your fingers in your RIGHT hand touching?
a. ASDF b. ASDFG
d. JKL ;
c. H J K L ;
5. What letter lies on in your LITTLE finger in your LEFT hand?
a. A
b. F
c. J
d. ;
6. What letter lies on in your LITTLE finger in your RIGHT hand?
a. A
b. F
C. J
d. ;
7. To double click the mouse, what finger should you use?
a. Thumb b. Index
c. Middle
d. Ring
8. What should you click in order to capitalize a Letter?
a. ALT
b. Control
c. Caps Lock
d. Shift
9. Which statements support the function of the Backspace key in the
keyboard?
a. It saves a file
b. It capitalizes a letter
10. What can you say about a Home
a. Base Position in typing
Both A and B
c. It erases a text
d. None of the Above
Row Position?
c. First Position in Typing b.
d. Any of the Above

Answers

ABCD's refer to the Home Row Position in typing, which is the foundation of touch typing. This position involves placing your fingers on the ASDF and JKL; keys on the keyboard, which are located in the middle row and form a diagonal line. The fingers of the left hand should rest on the ASDF keys, while the fingers of the right hand should rest on the JKL; keys. This position allows for quick and efficient typing, as it centers your fingers and allows you to easily reach all the other keys on the keyboard.

In addition to the Home Row Position, there are other key concepts to keep in mind when typing. For example, the Space Bar is located underneath the thumbs and is used to create spaces between words. The Shift key is used to capitalize letters, while the Backspace key is used to erase mistakes. The mouse is also an important tool in typing, and double clicking is done with the index finger.

Overall, it is important to have a solid understanding of the Home Row Position and other basic concepts in typing in order to become a proficient typist. Practice and repetition are also important in developing good typing skills.

For more such questions on foundation, click on:

https://brainly.com/question/31390928

#SPJ11

what is database? Enlist there types.

Answers

its like the thing that holds your contacts info in your phone or your social media account

databases hold other information too

big companies like banks usually have huge databases

they're usually in a excel spreadsheet sheet like format

in that format things like name, phone number, email, bank account, interest rate are COLUMNS

things like bank account & interest rate amounts are usually ROWS

when you look for a hard to find social media accounts thru various search websites thats like DATA MINING

** JAVA ONLY**
Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go north/south, and evens (like the 10 or 90) go east/west. Auxiliary highways are numbered 100-999, and service the primary highway indicated by the rightmost two digits. Thus, I-405 services I-5, and I-290 services I-90. Note: 200 is not a valid auxiliary highway because 00 is not a valid primary highway number.

Given a highway number, indicate whether it is a primary or auxiliary highway. If auxiliary, indicate what primary highway it serves. Also indicate if the (primary) highway runs north/south or east/west.

** JAVA ONLY**Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go north/south,
** JAVA ONLY**Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go north/south,

Answers

There is a photo attached with the code. Result: print ("0 is not a valid interstate highway number")

What is equal to H?

H is equal to int("Enter the highway number: "); if (h>=1 and h=99) take highway number If (h%2==0) for principal highway:

"I-%d is primary, moving eastward and westward,"%h, print #otherwise, even highway number:

print("I-%d is principal, travelling north/south"%h) #for odd road number elif(h>=100 and h=999): supplementary highway for

aux=str(h) #create a string to retrieve the rightmost number.

l=len(aux) val = aux[l-2] #find the length +aux[l-1] If (h%2==0): print("I-"+aux+" is auxiliary,"+"serving I-%d, going east/west"%h) else: print("I-"+aux+" is auxiliary,"+"serving I-%d, going north/south"%h) elif (h==0): print("I-"+aux+" is auxiliary,"+"serving I-%d, going east/ print #for 0 highway number ("0 is not a valid interstate highway number")

Therefore, There is a photo attached with the code. Result: print ("0 is not a valid interstate highway number")

Learn more about Highway here-

brainly.com/question/17308859

#SPJ1

WHAT DO I KNOW ABOUT THE EVOLUTION OF COMPUTING?

Answers

Answer: i dont now

Explanation:

Assume we need to implement the following sequence of Instructions with
forwarding by using a 5 stages pipeline.
sub x12, x11, x13
and x8 x12, x15
or x9,x16.x12
For clock cycle 5, what are the control values of A and B (the two outputs of
"Forwarding unit") respectively?
(The control values for the forwarding multiplexors

are shown in the following table)
MUX Control Source
A/B - 00
ID/EX
W/B - 10
EX/MEM

Answers

Answer:

0 0 1 0

Explanation:

sub X12, X11, X13 and x8, X12, X15 or X9, x16, x12 For clock cycle 5, what are the control values of A and B.

Select the correct answer.
What type of depth of field did the photographer use for the image shown?
Ο Α.
a large depth of field
OB.
a small depth of field
O C.
a close depth of field
D.
a large as well as a small depth of field
OE.
no depth of field

Select the correct answer.What type of depth of field did the photographer use for the image shown? .a

Answers

Answer:

I think it's C. but not a 100%

Answer: It all ears to be a large depth of field

Explanation:

Elements in both the foreground and the background seem to be in focus, just as much as the bench. A small depth of field would have had the bench in sharp focus with the background and foreground out of focus.

Which of the following best describes an insider attack on a network?
OA. an attack by someone who uses fake emails to gather information related to user credentials
OB. an attack by someone who becomes an intermediary between two communication devices in an organizatio
OC. an attack by a current or former employee who misuses access to an organization's network
O D. an attack by an employee who tricks coworkers into divulging critical information to compromise a network

Answers

An attack by a current or former employee who misuses access to an organization's network ca be an insider attack on a network. The correct option is C.

An insider attack on a network refers to an attack carried out by a person who has authorized access to an organization's network infrastructure, either as a current or former employee.

This individual intentionally misuses their access privileges to compromise the network's security or to cause harm to the organization.

Option C best describes an insider attack as it specifically mentions the misuse of network access by a current or former employee.

The other options mentioned (A, B, and D) describe different types of attacks, but they do not specifically involve an insider with authorized access to the network.

Thus, the correct option is C.

For more details regarding network, visit:

https://brainly.com/question/29350844

#SPJ1

Explanation of how 3D printing gives SpaceX a competitive advantage
and
Discussion of how business intelligence is used or could be used to support SpaceX's 3D printing process

Answers

SpaceX gains a competitive advantage with the implementation of 3D printing technology, which provides an economical solution to producing lightweight and customizable parts that are intricate in design.

How is this so?

The use of this cutting-edge technology facilitates rapid iteration, reducing both developmental costs and time. It enables the company to manufacture these materials in-house, thereby averting external supply chain inefficiencies.

Moreover, by using Business Intelligence tools to analyze data related to some factors as part performance and supply chain logistics, it becomes easier for SpaceX not only to monitor the operational efficiency of its manufactured products but also spot possible optimization opportunities.

Learn more about 3D printing at:

https://brainly.com/question/30348821

#SPJ1

My assurance wireless phone wont power on

Answers

Answer:

Charge it up and then try or take it to the phone repair

what is fruit nursery?​

Answers

A place where young plants are produced through different ways is a nursery. The main work of nursery is to supply young plants and seeds for cultivation purposes for both fruits and vegetables. ... An appropriate environment for germination of seed. The nursery is also very useful for purpose of vegetation propagation.

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

➨ Fruit Nursery

A Place where young plants and trees are grown for sale or for planting elsewhere is known as nursery. From this definition you can generate the definition of fruit nursery as well!

So, fruit nursery is a place where the local wild fruit seed is sown to grow seedlings. Apart from fruit nursery there are various kind of nursery

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

Which nmap switch is used to detect target OS and services?
a -S
b -p
c -F
d -A

Answers

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

At which point should a user select the option to make a delegate aware of permissions?
in the message body after selecting the recipient
after configuring the permissions in the dialog box
before assigning the permissions in the delegate dialog box
in the user’s contact information by clicking Send Permissions

Answers

Answer:

after configuring the permissions in the dialog box

Explanation:

Answer:

B) after configuring the permissions in the dialog box

Explanation:

Just got it right

Consumers affect which goods and services are produced because they _____.

name the goods and services produced
choose which goods and services to buy
select the capital goods used for production

Answers

Answer:

Choice B, "choose which goods and services to buy"

Explanation:

Consumers choose which goods and services to buy. Companies only want to provide goods and services they know will be bought. Therefore, consumers affect which goods and services are produced because they choose which goods and services to buy.

Ken is creating a website with different web pages, each page with its own theme, color, fonts, and so on. His teammate, John, advises him to
maintain the same elements on every page. What is the importance of maintaining consistency between pages?
Consistency helps to make navigation easy. It also helps in structuring each web page. It allows users to understand where they are in a website.
makes it easier for users to locate new navigational elements. It ensures that users only have to learn to use an interface once.

Answers

It also helps build a recognizable brand identity and creates a sense of trust between the website and its visitors. Consistency helps to make a website look professional. It helps the website stand out from competitors and gives it a unique look and feel.

What is website?

A website is a collection of related webpages and other content, such as text, images, videos, and audio files, typically identified with a common domain name, and published on at least one web server. Websites are accessed via a network, such as the Internet or a local area network, and viewed in an Internet browser. Websites are created using HTML coding. Websites can provide a variety of information and services, including online forums, shopping, news, and entertainment. They can also be used to conduct business activities, such as online banking, ordering products, and researching products and services. Websites are often maintained by individuals and organizations to provide information on topics of interest, to advertise products and services, and to offer customer service.


To learn more about website
https://brainly.com/question/28431103
#SPJ1

Java question

If the user wants to enter one character what statement you use?

1- next()?

2-next(0)?

3-CharAt(0).

4-next().charAt(0).

Answers

Answer:

To be honest why would you want to enter one character. Anyways the answer is option 4

You need to export each layer of your document, including hidden layers, to a separate PNG-24 file with the prefix SKATE. Which menu option should you use? To answer, select to highlight the correct option in the answer area.​

Answers

the Layers panel, then. Choose the layer groups, artboards, or layers that you want to save as picture assets. Right-click your chosen item and then choose Quick Export.

Which technique will enable you to export each layer as a PNG?

To save certain layers in your document as a PNG, right-click on the layer and select "Quick Export as PNG" in Photoshop CC 2015 and later. By modifying the export file type that is used by default, you can also export as a JPG, GIF, or SVG.

The best way to export a layer to a PNG?

the Layers panel, then. Choose the artboards, layers, or layer groups you want to save as picture assets. To quickly export your selection as a PNG, right-click it and choose the menu in context. Select a location for the export of the picture.

To know more about hidden layers visit;-

https://brainly.com/question/27725598

#SPJ1

I keep getting an index out of range error on this lab

I keep getting an index out of range error on this lab
I keep getting an index out of range error on this lab
I keep getting an index out of range error on this lab

Answers

The Python code for parsing food data is given. This code first reads the name of the text file from the user. Then, it opens the text file and reads each line.

How to depict the code

Python

import io

import sys

def parse_food_data(file_name):

 """Parses food data from a text file.

 Args:

   file_name: The name of the text file containing the food data.

 Returns:

   A list of dictionaries, where each dictionary contains the following information about a food item:

     * name: The name of the food item.

     * category: The category of the food item.

     * description: A description of the food item.

     * availability: Whether the food item is available.

 """

 with io.open(file_name, 'r', encoding='utf-8') as f:

   food_data = []

   for line in f:

     data = line.strip().split('\t')

     food_data.append({

       'name': data[0],

       'category': data[1],

       'description': data[2],

       'availability': data[3] == '1',

     })

   return food_data

if __name__ == '__main__':

 file_name = sys.argv[1]

 food_data = parse_food_data(file_name)

 for food in food_data:

   print('{name} ({category}) -- {description}'.format(**food))

This code first reads the name of the text file from the user. Then, it opens the text file and reads each line. For each line, it splits the line into a list of strings, using the tab character as the delimiter. It then creates a dictionary for each food item, and adds the following information to the dictionary:

Learn more about code on

https://brainly.com/question/26497128

#SPJ1

What's the latest tech​

Answers

Answer:

1. Artificial Intelligence and Machine Learning

2. Data Science

3. Full Stack Development

4. Robotic Process Automation

5. Edge Computing

6. Virtual Reality and Augmented Reality

7. Blockchain

8. 5G

9. Cyber Security

10. Quantum Computing

11. Internet of Things

12. Big Data Analytics

13. Human Augmentation

14. Everything-as-a-Service(XaaS)

15. DevSecOps

16. Predictive & Personalised Medicine

17. Voice Search Technology

18. Drones and Unmanned Vehicles

19. Mass personalization and Micro-Moments.

20. Genomics and Gene Editing

Answer:

artificial intelligence

Other Questions
P(A)=0.50 P(B)=0.45 P(A and B)=0.14 Find P(A or B). Round youranswer to two decimal places. may enterprises issued $200,000 of six percent, five-year bonds with interest payable semiannually. determine the issue price if the bonds are priced to yield (a) six percent, (b) ten percent, and (c) two percent. use financial calculator or excel to calculate answers. round answers to the nearest whole number. a.) answer b.) answer c.) answer Please help!!! (i'll give brainliest to the best answer) the hawaiian pear is now fully ripe, and this is the golden hour to pluck it. u.s. ambassador to hawaii, john l. stevens, 1893 the sentiments described by the above author reflects what type of foreign policy? responses noninterventionist non interventionist imperialism imperialist isolationist isolationist alliance system alliance system how would you have assisted in the fight for independence? Oceanside bike rental shop charges a seventeen dollar fixed fee plus nine dollar an hour for renting a bike. mike paid sixty-two dollars to rent a bike. how many hours did he pay to have the bike checked out?Please show work and answer. In which sentence from "Black Hole Beginnings" is the effect underlined?As more stuff gathers, its combined gravitation grows stronger.Once again, the star stuff plunges inward under its own weight.As the nuclei meld, a smidgen of their matter vaporizes into energy.Once the nuclear reactions stop, the star's center begins to cool. Part B: Calculation Exercice QUESTION 01-25 MARKS Consider the following balance sheet, for Moziah business. will his company be able to pay cash to buy an asset with a cost of $400,000 knowing they have $1,600,000 in retained earnings? If not, how will they be able to buy those assets? 00 Cash $ 100,000 Accounts payable $ 200,000 Inventory 400,000 Accruals 200,000 Accounts receivable 500,000 Total CL $ 400,000 Total CA $1,000,000 Debt 400,000 Net fixed assets $,1800,000 Common stock 400,000 Retained earnings 1,600,000 Total assets $2,800,000 Total L & E $2,800,000 Polynomial Operations please help for each question Marissa, an actress, is giving a speech on getting started in the entertainment industry. Marissa has high initial credibility, but as she gives her speech, it becomes quickly apparent that her start as an actress depended entirely on her uncle, a producer, and not her talent or hard work. As a result, her credibility drops. This is an example of how the credibility of a speaker is What is 10/14 simplified processed foods means Quien. Habla en espaol porfa no me digan que hablan en ingles si hablan en ingles me dicen como puedo cambiarlo al espaol esta pregunta se que les va a aparecer en ingles pero a mi en espaol cuando alguien escribe en ingles me traducen a si que porfa dganme como ponerlo en espaol para hablan con otra gente hablahispana please The first step in transferring a mobile patient to a stretcher is to:O Locking the wheels of the stretcher and the operating room tableO Reverse trendelenburg positionO Depends on what position he needs to be transferred in.O Identify the patient * When a bus with a seating capacity of 50 passengers is carrying on 40 passengers. The cost of passenger ticket is Rs. 100. What would be the Marginal Cost of carrying one additional passenger Please help with this Which of the following statements must be true about this diagram? Check all that apply. A. m Mulberry Elementary has a playground in the shape of a rectangle.The length is 5.5 metersThe width is 3.2 metersOver the summer, the school will increase both the length and the width of the playground by 40% each.Part A:What will be the perimeter, in meters, of the enlarged playground? Enter your answer as a decimal with a hundredths place value.Part B:By how many square meters will the area of the playground increase? Enter your answer as a decimal with a thousandths place value. Solve the system of linear equations.2x + 3y = 5X+ y = 5 .1. At this location, Figure 5B-2, the temperature was ______ C at 50 m depth, very close to the surface. (NOTE: the numbers on the "sea pressure - decibar" scale correspond to meters. At 250 meters depth, the pressure is 250 decibars.)a. 14.5b. 16.0c. 19.2