Choose descriptive variable names in all programs

Assignment Help Computer Network Security
Reference no: EM131264352

- Plan each program by writing pseudocode.

- Write all of your pseudocode as comments immediately after your name and SPC ID# comment.

- Add more comments as needed in each program to explain what your code is doing.

- Choose descriptive variable names in all programs.

1. Write a program named program31.py that prompts the user to enter an integer, then responds by identifying the input as either odd or even as appropriate.

2. Write a creative program named program32.py that delivers a short quiz (two questions only) about our solar system. The program should pose the questions, prompt the user for the answers, and provide positive or negative feedback as appropriate. The questions are up to you except for this requirement: one quiz question should require a string answer and the other should require a numeric answer.

3. Orinoco.com sells T-shirts online for $14.95 each. Discounts are provided for quantity orders as follows:
- 40% off for 12 or more shirts.
- 30% off for 7 or more shirts.
- 20% off for 3 or more shirts.

Shipping and handling is charged at $1.25 per shirt. Write a Python program named program33.py that prompts the user to enter the quantity of an Orinoco order, then displays the charges for the T-shirts, the required shipping charges, and the total cost of the order. Note that three outputs are required. All charges should be displayed in currency format with the $ sign right up against the first digit.

Reference no: EM131264352

Questions Cloud

Evaluate the effectiveness of the strategy : Identify a product that you think you have paid either too little for or too much for. Identify the pricing strategy you think the company is trying to implement (based on the assigned reading) and evaluate the effectiveness of the strategy.
Journalize the transactions-post transactions to T accounts : Review the transactions for Smith Construction for the month of June in the Excel Template. The balances from May have been inserted in the T accounts. Module 1 Assignment: The following are the transactions for Smith Construction for the month of Ju..
Company monthly net operating income of change : Salley Corporation produces and sells a single product. Data concerning that product appear below: Per Unit Percent of Sales Selling price $ 200 100 % Variable expenses 40 20 % Contribution margin 160 80 % Fixed expenses are $1,213,000 per month. Wha..
What is the effect on income before taxes : You have recently been hired as the assistant controller for Stanton Industries, a large, publicly held manufacturing company. Your immediate superior is the controller who, in turn, is responsible to the vice president of finance. What is the effect..
Choose descriptive variable names in all programs : Write a program named program31.py that prompts the user to enter an integer, then responds by identifying the input as either odd or even as appropriate.
Develop a human resource development plan : Develop a human resource development (HRD) plan. Motors and More does not have a formal training program.  Given their current situation and the fact that promotions were due to seniority, your plan should address the needs of: New employees
Determine the maximum safe value of p : Determine the maximum safe value of P according to the maximum shear stress theory. Use σyp = 200 MPa.
Do you think visionary leaders are needed in organization : Do you think visionary leaders are needed in every organization? Why or why not - What business or environmental conditions particularly call for visionary leadership?
Draw the network diagram : Draw the network diagram. Show the early start, early finish, late start, and late finish times. Show the critical path. Suppose you have the option of shorting any or all of C, D, H and J each one day, which would you shorten

Reviews

Write a Review

Computer Network Security Questions & Answers

  Interorganizational cybersecurity relationships

Interorganizational Cybersecurity Relationships

  Knowing the threat

Explain the added challenges of securing wireless devices versus securing LAN-connected devices. Imagine you are starting a new small- to-midsized cybercafe business from the ground up. Explain which areas of your network would be LAN based and wh..

  A friend is interested in installing a wireless lan in her

a friend is interested in installing a wireless lan in her small business. she has about a dozen employees. she is

  A business wants to share its customer account database

a business wants to share its customer account database with its trading partners and customers while at the same time

  Why are background checks important to information security

Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 300 words combined. Why are background checks important to information securi..

  Assignment on internet hacking

The topic is internet Hacking it should be at least 6 to 8 body pargraph, I just waana let you now that im not native english speaker so plese have easy vocabulary

  Evaluate the effectiveness of the environmental security

Evaluate the effectiveness of the physical and environmental security measures that the organization you researched used in regard to protecting its assets.

  Case study-the ethical hacker

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and ..

  What is the difference between war driving and war chalking

What is the difference between War Driving and War chalking? What do you get from a cloud provider when you sing up for an infrastructure as a service (laaS) cloud computing model?

  Explain main targets seem to be larger or smaller companies

Research three recent information security breaches. Do the main targets seem to be larger or smaller companies? Is there a particular industry that seems predominately targeted?

  How many keys are there in this compound cipher

An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?

  Create resolutions/solutions for the threat or vulnerability

In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system.  create resolutions/solutions for the threat or vulnerability

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd