You have been hired by Casino. They want to break down the amount of money received to coin increments. However, they feel that only those that can use the machine must have winnings greater than $100.00. If they do not enter that amount, let them know that they need to enter more than $100 or go to another machine. With the conversion, that means the paper bills will have to be converted to dollar coins. In fact, you are going to convert everything to change. Once again, it is important to state that you will need the user to enter at least 100 dollars. In addition to dollar coins, we will need to break it down into half dollars, dimes, nickels, and pennies. There is a quarter shortage, and the substitution is that half dollars are being used. We are going to start with dollars and decrement the change amount as we progress through the application. Pennies will be used last. Remember, the amount needs to be the same as entered.
Requirements:
1. Create pseudocode. What steps are needed to make this a working program?
2. Create the Java coding. Create in your own style and words the code that is needed to generate this result. Make sure that you post your name and this assignment at the top of your comments. Make sure you leave comments when needed.
3. Display the result. Provide screenshots or paste results of the working application.
4. Summarize. The client of the casino is inquiring what is the program going to do. Let them know in just a few sentences.
5. Will there be a need for maintenance or any updates in the future?
6. Is there a need to train anyone to run this program? Answer in a few sentences.

Answers

Answer 1

The steps include accepting user input, validating the amount, converting bills to Casino's coins, breaking down the change, handling the quarter shortage, displaying the result, and providing proper documentation.

What steps are needed to create a working program for the Casino's coin breakdown requirement?

To meet the requirements of the Casino's request, the following steps can be taken to create a working program:

Accept user input for the amount of money received. Check if the entered amount is greater than $100. If not, display a message requesting the user to enter more than $100 or go to another machine.Convert the paper bills into dollar coins. Break down the remaining change into half dollars, dimes, nickels, and pennies.Handle the quarter shortage by using half dollars as a substitution. Decrement the change amount as each coin is allocated. Display the result, showing the breakdown of coins.Provide appropriate comments and documentation in the code for clarity and maintainability.

The Java code can be written to implement the above steps, ensuring proper validation and coin conversion calculations. Screenshots or the results of the working application can be provided to showcase the program's functionality.

In summary, this program will take the amount of money received at the Casino and convert it into dollar coins and smaller coin denominations. It will handle the quarter shortage by using half dollars instead. The result will be a breakdown of the coins received.

In the future, maintenance or updates may be required to address any changes in coin availability or regulations. However, the core functionality of the program should remain intact.

Since the program requires handling money and making calculations, it is essential to train individuals running the program on proper usage, input validation, and security considerations to ensure accurate and reliable results.

Learn more about Casino's coins

brainly.com/question/31151094

#SPJ11


Related Questions

What functionality does a person with L4 SCI have?

Answers

A person with L4 SCI (spinal cord injury at the fourth lumbar vertebrae) may experience varying levels of functionality, depending on the severity of their injury.


The L4 spinal nerve controls movement and sensation in the quadriceps muscle (front of the thigh), the inner lower leg, and the big toe. As a result of the injury, the person may have difficulty controlling or moving these areas, leading to challenges with walking, standing, or maintaining balance.

An L4 SCI affects the lumbar region of the spinal cord, which controls lower body movement. After such an injury, a person usually retains the ability to flex and extend their hips and knees.

To know more about SCI visit:-

https://brainly.com/question/14331199

#SPJ11

WILL GIVE BRAINLIEST
Which online note-taking tool allows students to place an image on one side and a description on the other?

web clipping tools

electronic notebooks

electronic flash cards

online data storage sites

Answers

Answer:

electronic flashcards I think

This sort of malicious activity is where a legitimate file is replaced by a different and potentially malicious file.

- Cross Site Scripting (XSS)
- Man-in-the-Browser (MitB)
- Program download substitution
- Drive-by-download

Answers

Program download substitution is the type of malicious activity where a legitimate file is replaced by a different and potentially malicious file.

A program download substitution attack, also known as a software supply chain attack, takes place when a legitimate file is replaced with a different and malicious file by attackers.A program download substitution is a kind of malware assault in which a software package's legitimate code is replaced with another piece of code. The attacker may plant a virus, spyware, or other harmful software by presenting a malicious replacement copy. A program download substitution may occur in a variety of ways. One of the most frequent ways is to plant a Trojan that infects the software development toolchain, thereby allowing the attacker to modify the source code of the application being built. Another way is to infiltrate a download server and replace a genuine software package with a corrupted one. It is possible to detect program download substitution with various techniques. Security software such as anti-virus, anti-malware, and intrusion detection systems are examples of such tools.

Learn more about Program :

https://brainly.com/question/14368396

#SPJ11

What is data discrimination?

Answers

Answer:

Data discrimination, also called discrimination by algorithm, is bias that occurs when predefined data types or data sources are intentionally or unintentionally treated differently than others.

In discussions about Net Neutrality, data discrimination includes the censorship of lawful information by an internet service provider (ISP). Throughout the last decade, ISPs have been criticized for allegedly quashing competition, promoting or discouraging particular political ideologies or religious beliefs and blocking union websites during employee labor disputes.

Although an ISP may state reasons for filterning or blocking lawful traffic that seem altruistic, critics maintain that the practice is more likely to be inspired by self-interest. For example, when an ISP blocks peer-to-peer (P2P) file sharing at a university, the ISP may claim that its actions are helping to prevent music and software piracy.  BitTorrent is an example of a service that has many legitimate uses but is often blocked by universities for the stated reasons of piracy prevention.

Explanation:

Mark brainliest ty! :3

It’s is usually called net basis, Net bias is the counter-principle to net neutrality, which indicates differentiation or discrimination of price and the quality of content or applications on the Internet by ISPs. Similar terms include data discrimination, digital redlining, and network management. If this is a writing assignment you should use a paraphraser.

When you type in text in an image in a photo-editing software, where is it created?

When you type in text in an image in a photo-editing software, where is it created?

Answers

Answer:

The answer is "Option C".

Explanation:

In photo-editing software, the new layer is a type of layer, which would allow you to add any object or composition element like an image, text, or shape. It will have one layer if you view a frame, but you can add several quickly. Layers stack each other and compensate for digital images and motion graphics of all kinds, and the incorrect choice can be defined as follows:

In choice a, the bottom layer also known as the solder layer is used for wiring and soldering, that's why it is wrong.In choice b, the merged layer is used to add two layers, that's why it is wrong.In choice d, the image layer is used as the basic layer for add text, image, or graph, that's why it is wrong.

n cell b10, use a sumif formula to calculate the sum of annualsales where the value in the regions named range is equal to the region listed in cell b9.

Answers

SUMIF formula is used to calculate the sum of sales revenue for the year by checking the value in the regions named range equal to the region listed in cell B9.

The SUMIF formula is used when a specific criterion is to be applied to a range, and the sum of the cells meeting that criterion is required. For instance, to calculate the sum of annual sales where the value in the regions named range is equal to the region listed in cell B9. The formula is written in cell B10 as follows:=SUMIF(Regions, B9, AnnualSales)The formula means:

• Regions: is the named range in the worksheet• B9: the region for which the sum of sales is to be calculated• AnnualSales: the range where the annual sales data is locatedTo get a better understanding, the steps for calculating the SUMIF formula in cell B10 are:1. Select cell B10, where the sum is to be displayed.2. Type the formula “=SUMIF(Regions, B9, AnnualSales)” into the cell.

3. Press Enter, and the sum of sales revenue for the year will be displayed in cell B10.4. The SUMIF formula calculates the sum of annual sales for a particular region.

To know more about sales visit:

https://brainly.com/question/29436143

#SPJ11

Xavier wants to use a solver to find optimal solutions for a decision problem. What should he select as X in the series of clicks for this purpose: Data tab > X > Solver > Enter Solver parameters (read on) > Check "Make Unconstrained Variables Non-Negative" > Select "Simplex LP" > Solve?

Answers

Answer:

The answer is "Analyze"

Explanation:

The term Analyze is the use of a machine or critical thinking to enable more effective management by companies and their information systems, in which the Xavier wishes to use a method for solving to find ideal decision-making strategies. Its object of the series analyses X selects, that's why the "Analyze " is correct.

can someone helpp what is this?

can someone helpp what is this?

Answers

Answer:

How about:

if a person is cute and not in a relation, and if it is friday or saturday, ask the person out on a date.

I highlighted the gates in the text.

can someone helpp what is this?

First time using this site so be mindful if I make any mistakes
For Micro Econ AP I am having a problem with this one question
It goes:
In what ways do households dispose of their income? How is it possible for a family's persoal consumption expenditures to exceed its after-tax income?

Answers

Answer:

Okay... Well

I will. help you out dear

What is the 4-bit number for the decimal number ten (10)?A. 0010B. 1010C. 0110D. 0101

Answers

The 4-bit number for the decimal number ten is 1010, hence option B is the correct answer.

What is meant by the term 4-bit number?

4-bit computing refers to computer architectures in which integers and other data units are four bits wide. 4-bit central processing unit (CPU) and arithmetic logic unit (ALU) architectures are those based on 4-bit registers or data buses.

In summary, The term "4-bits" refers to the ability to represent 16 different values. Depending on the architecture of the circuit, these values could be anything.

Learn more about 4-bit numbers here:

https://brainly.com/question/30034402

#SPJ1

Which statement about computer troubleshooting is accurate?


Only experts can fix a computer problem.


Computer problems are too complex to fix.


Anyone can fix a computer problem.


There are resources to help fix computer problems.

Answers

Note that the statement about computer troubleshooting which is accurate is : "There are resources to help fix computer problems."

What is computer trouble shooting?

Identifying, diagnosing, and repairing hardware or software faults that prevent a computer from performing correctly is what computer troubleshooting entails.

While certain computer difficulties may necessitate the assistance of a professional, many common issues may be fixed by users with basic technical knowledge through the use of internet resources, manuals, or by calling customer service for the applicable software or hardware. As a result, there are tools accessible to assist users in troubleshooting and resolving common computer issues.

Learn more about troubleshooting  at:

https://brainly.com/question/30048504

#SPJ1

The value 5 is stored in a signed (2's complement) integer. The bits are shifted 4 places to the right. What is the resultant value (in decimal)? 0.3125

Answers

Answer:

The resultant value is 0

Explanation:

Solution

Given that:

Now

The +5 representation in signed 2's complement integer: 00000101

Thus

When we right shift then, 4 rightmost bit (0101) will be dropped.

The number after 4-bit right shift: 00000000

Therefore the resultant value after 4-bit right shift is "0" in decimal.

Tabs you see at the bottom of your workbook file, labeled Sheet 1, Sheet 2, and so on. You can rename the tabs.
They represent worksheets within the workbook.
File
Function
Heading
Sheet Tab

Answers

I believe the answer is Sheet Tab

I hope that helped!

In what sense does the global nature of Internet limit legal solutions to Internet Problems?​

Answers

Answer:

Explanation:

What may be allowed in one country could be banned in another. The Internet has servers all over the world, so one person surfing the Internet is under the jurisdiction of so many other places— and simultaneously, none at all. So this global nature makes it hard to implement totally rock-solid solutions because there is no central, world, all-encompassing group that decides what goes and what doesnt go on the internet

Into how many types is qbasic statement classified?

Answers

Answer:

two types

Explanation:

1)numeric variable

2)string variable

I Need help with this ASAP

I Need help with this ASAP

Answers

Answer:It´s B. The code reults in an error

Explanation:

.You have an existing computer running Windows 7 Enterprise. You want to configure a RAID 1 array in the computer. You install two new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID 1 array using them. When you boot the computer, Windows does not show the logical RAID drive. What should you do?

Answers

To resolve the issue of Windows 7 Enterprise not showing a logical RAID 1 array, enable RAID mode in the BIOS, install the appropriate RAID controller drivers, and restart the computer.

If you have installed two new SATA drives and configured them with the integrated RAID controller but Windows 7 Enterprise is not showing the logical RAID 1 array, there are a few steps you can take to resolve the issue. First, check your BIOS settings to ensure that RAID mode is enabled. If it is already enabled, you may need to install the appropriate RAID controller drivers for your motherboard within Windows 7 Enterprise. Once you have installed the drivers, restart your computer to allow the changes to take effect. After following these steps, Windows should now recognize and display the logical RAID 1 drive, resolving the issue.

Learn more about Windows 7 here;

https://brainly.com/question/31524055

#SPJ11

g write the code that would support overload for the * operator that will allow scalar multiplication, i.e. a double times a point.

Answers

Answer:

Here is one possible way to implement overload for the * operator that will allow scalar multiplication:

struct Vec3 {

 float x, y, z;

 Vec3 operator*(float scalar) const {

   return Vec3{x * scalar, y * scalar, z * scalar};

 }

};

This code defines a Vec3 struct that represents a three-dimensional vector, and it overloads the * operator to perform scalar multiplication. The * operator takes a float value as its right-hand operand and returns a new Vec3 object that is the result of scaling the original vector by the given scalar value.

Flat Chrysler recalled over a million trucks due to a software defect related to at least one fatality. This software defect was found in a a high quality software system b. safety critical software system cybersecurity sessment d. pre motoare evaluation

Answers

Flat Chrysler recalled over a million trucks due to a software defect related to at least one fatality. This software defect was found in a a. high-quality software system

The recall of over a million trucks by Chrysler was due to a software defect that caused at least one fatality. This defect was found in a high-quality software system, which means that the system was carefully constructed and reliable.

The defect was considered a safety-critical issue, meaning that it could potentially cause injury or death if not addressed in a timely manner. As such, the software underwent rigorous cybersecurity assessment and pre-motor evaluation to ensure that the problem was addressed before the trucks were released to the public.

Unfortunately, the software defect was not identified during the assessment process, leading to the tragic consequences of the recall. This incident highlights the importance of thorough software testing, as well as the potential risks of releasing a product before it has been fully tested and evaluated.

Ultimately, the recall of these trucks demonstrates the importance of maintaining a high level of quality control, both in software development and in the products that are released to the public. By ensuring that software meets rigorous standards and that products are thoroughly evaluated before they are released, companies can help to prevent tragedies such as this from occurring in the future. Therefore, option A is correct.

Know more about Software here :

https://brainly.com/question/28938866

#SPJ11

your network has been assigned the class b network address of 179.113.0.0. which three of the following addresses can be assigned to hosts on your network?

Answers

Assuming that we are using subnet mask 255.255.0.0, three addresses that can be assigned to hosts on the network are:



1. 179.113.1.1
2. 179.113.50.100
3. 179.113.255.254



Note that the first two octets of the IP addresses are fixed as per the class B network address, and the last two octets can be assigned to hosts. Also, the first and last addresses of the network (i.e. 179.113.0.0 and 179.113.255.255) cannot be assigned to hosts as they are reserved for network and broadcast addresses respectively.

To know more about class b network, click here:

https://brainly.com/question/30640903

#SPJ11

in symmetric encryption, what key does the receiver need in order to decrypt data from a sender? choose 1 answer: choose 1 answer: (choice a) they need their personal encryption key, which is different from the key that encrypted the data. a they need their personal encryption key, which is different from the key that encrypted the data. (choice b) they need their own private key equivalent of the public key that was used for encrypting the data. b they need their own private key equivalent of the public key that was used for encrypting the data. (choice c) they need the key that was used for encrypting the data. c they need the key that was used for encrypting the data. (choice d) they need their own public key equivalent of the private key that was used for encrypting the data. d they need their own public key equivalent of the private key that was used for encrypting the data.

Answers

Encrypting data is the process of converting plain text or any other data into an encoded format that cannot be read or understood by unauthorized parties. The primary purpose of encryption is to ensure that data remains confidential and secure.

In symmetric encryption, the receiver needs the key that was used for encrypting the data in order to decrypt data from a sender. What is symmetric encryption Symmetric encryption is a type of encryption where the same key is used for both encryption and decryption of data. In symmetric-key encryption, the data is encrypted with a single key that must be shared between the sender and recipient to encrypt and decrypt the data. The key is used for both encrypting the data and decrypting the data. What is the personal encryption key  A personal encryption key is a specific form of symmetric key that is assigned to a single user or device. The user or device may use this key to encrypt or decrypt sensitive data, ensuring that it can only be accessed by those who possess the appropriate key.

learn more about Encrypting data here :

https://brainly.com/question/13785138

#SPJ11

15 points and brainliest if correct! :D

Complete the following sentence.
______ is an essential skill in order to decipher the massive amount of new information for any job dealing with data.

Answers

Technology I think (this is so I can answer this)
Technology I think it is

which of the following is a limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10?

Answers

The option that is limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10 is known to be option a. Windows PE/.

What is Windows PE used for?

Windows PE (WinPE) is known to be a term that connote  a little form of an operating system.

It is known to be one that is often used to install, deploy, as well as been used to repair Windows desktop editions, Windows Server, and other kinds of Windows operating systems.

Note that with the use of the Windows PE, a person can be able to Set up their hard drive before they can install the  Windows.

Therefore, based on the above, The option that is limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10 is known to be option a. Windows PE/.

Learn more about Windows PE from

https://brainly.com/question/14297547

#SPJ1

Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10?

a. Windows PE

b. WAIK

c. USMT

d. DISM

is wireless or wired network faster??

Answers

Answer:

Wired

Explanation:

Answer:

Wired!

Explanation:

According to askleo.com, wired connections are almost always faster than wireless! This is of course not talking about wired connections that are old, outdated, in a bad environment, and/or ruined.

Hope this helps! :]

2 (01.01 LC)
How do today's programmers tell a computer how to perform certain tasks? (5 points)
They design manuals for users to read and follow.
They manually turn gears, flip switches, and attach wires.
They send text (SMS) messages from smart devices.
ОО
They write code that translates commands to binary code.

Answers

Answer:

They write code that translates commands to binary code.

Explanation:

Coding or programming is the process of creating instructions for computers using programming languages. Computer code is used to program the websites, apps, and other technologies we interact with every day.

What factors might influence how effective a vaccine is when it’s widely released?​

Answers

Answer:

alot of people might get sick off it and some people might die bec they don't know how to use and everybody acts differnt and has differnt opinions

Explanation:


Which statement best describes how cybercriminals work?

Answers

In order to gain illegal access to computer systems, networks, and sensitive data, cybercriminals employ a variety of techniques and tools. They take advantage of software and hardware flaws.

is a sort of cybercrime that entails breaking into bank computer networks and transferring money illegally?

Electronic funds transfer: This entails breaking into bank computer networks without authorization and transferring money illegally. Electronic money laundering is the practise of laundering funds using computers.

What cybercrime is the acquisition of unauthorised access to data in a system or computer?

Hacking is a phrase used to denote unlawful access to systems, networks, and data (hereinafter target) (hereafter target). Hacking may be done just to access a target or to access the target and/or maintain that access.

To know more about cybercriminals visit:-

https://brainly.com/question/30515855

#SPJ1

Question:

Which statement best describes how cybercriminals work?

The different between a compiler and a translaror

Answers

Answer:

Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. A translator usually has a fixed body of code that is required to translate the program.

Answer:

Answer: Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. ... A translator usually has a fixed body of code that is required to translate the program.

Explanation:

Assuming each operating system installed requires 2GB of RAM, what is the minimum amount of physical RAM that will need to be installed in the host system to meet the requirements of this scenario

Answers

Answer:

3gb i believe

dion training has just hired three new staff members. the it department at dion training has created new accounts for the new staff members on the domain controller and allocated 10 gb of storage on the company's internal file server per staff member. what term best describes these activities performed by the it department?

Answers

A terminology which best describes the creation of new accounts for the new staff members on the domain controller and an allocation of 10 GB of storage on the company's internal file server per staff member by the IT department is service provision.

What is a server?

A server is a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

Types of server.

In Computer technology, there are different types of server and these include the following:

Email serverFile serverDatabase serverProxy serverDistributed communication serverCentralized serverDistributed application serverBlockchain server

In Database management system, service provision is a terminology that involves an IT department performing specific services for clients.

Read more on a server here: brainly.com/question/27960093

#SPJ1

Other Questions
when economists sort firms according to the number and relative size of firms in an industry, they are sorting according to ______ writing an essay on the role of the youth in building the nation explain how both are in fact measurable for non-reactive systems. consider the first law in conjunction with slow heating at different constant conditions, where q can be quantified by coupling to a reference body. why does the constant-volume heat capacity naturally involve e, whereas the constant pres- sure one h? If you were graduating college and wanted to be able to find a job in Georgia in the fastest growing industry with the best pay, which industry should you chooseAagricultureBentertainmentserviceDtechnology ssments A R Question 19 of 22 In the transcription of eukaryotes, what sequence in DNA does transcription is initiated? select the correct response. a.TATA box b.sequence capc. start codond. poly-A tail X Question 17 of 22 Which of the following about RNA polymerase is incorrect? Select the correct response: a.Initiation of transcription proceeds when RNA polymerase binds to the promoter. b.The DNA double helix opens as the RNA polymerase goes. c.RNA polymerase moves forward along the DNA template strand in the 5' to 3 direction.d. RNA polymerase produces an RNA transcript in the 5 to 3' direction. Question 14 of 22 All of the following describes the produced RNA strand except: Select the correct response: a.product of transcription OLOFb. complementary c.antiparalleld. semi-conservative Question 4 of 22 This process resulting in genetically modified crops involves exposing seeds to chemicals or radiation to make random changes in the genome Select the correct response:a. mutagenesis b. gene editing c.traditional breeding Difference between polynomial and multinational 9. A family ordered 2 large pizzas for lunch. They ate7-8of one pizza and of the other pizza. Whatfraction of a pizza was left for dinner?118b. 1/2d. 12/12b.e.318334C.7180010 What might have been strong enough that these boulders are in the middle of a flat field? Please explain please help i have 37 in this class and i need to bring it up by 5 pm its claim 3 i have a lot to finish Please helpp! its due 2 hours!!! the fitness contest includes a walking challenge. on the first day, each walker starts by walking 2,000 steps. the goal is to add 500 steps per day to reach at least 10,000 steps. angel begins the challenge. the answer for part a is 17 days she will need to walk to meet the challenge...and help with part b: part b: angel decides to exceed the walking-challenge goal faster. describe two ways you might adjust the inequality in part a to help angel exceed the goal. give an example and explain. What does Jonathan notice as the old soldier tethers him once again with rope?The old soldier left one end of the rope untied.The knot is one he is able to undo.The rope is old and frayed.The rope keeps him from having any space to move. As part of a study on militry readiness and capacity for mobilization, the government has surveyed 96 defense contractors involved in producing a key system for the military in order to assess how quickly we can surge production if necessary. The responses indicate within a year of getting a green light to surge, industry can achieve a sample mean increase in monthly production is 450 units, with a standard deviation of 58 units.a. For planning purposes, the government requires an interval no wider than 10 units in either direction of the sample mean. What is the confidence level of this interval?b. Based on your answer to (a) above, what is the probability that the true population mean increase will be within the interval you computed in (a)? The length of a rectangle is equal 3x - 2. The width of the rectangle is equal tox2 - 4x + 8. Which expression is equal to the perimeter of the rectangle?pls answer someone Introducing Ratios: Question 7Liz earns $7 per hour to baby-sit for the Cochran family.How many hours does she have to baby-sit to earn $28?Enter answer belowEnter your response question 1 provide the correct iupac name for the following compounds: albr blank 1 cas blank 2 cbr blank 3 fecl2 blank 4 PLEASE HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ASAP=) Simply the answer Find y' and y''. y = ln(7x)/ x^4 The first two terms of an arithmetic progression are 27 and 24 respectively. How many terms of the progression are to be added to get - 30? Percentage homeworkkk (Middle School)