Reference no: EM132400871
MTS 3013 STRUCTURED PROGRAMMING, Sultan Idris Education University, Malaysia
ASSIGNMENT
A system of price calculation has been designed in the ABC loundry. The calculation are shown below:
Type/Jenis Price/Harga
1. Shirt RM 15 per kg
2. Blanket/Towel RM 6 per kg
3. Comforter RM 10 per kg
At any time, only one type of costume is allowed to be accepted. The discounts are given to the customers based on the following price:
Total of price/ Jumlah harga Discount/Diskaun
≥RM 30 10 % of price/dari Jumlah harga
≥ RM 20 dan < RM 30 5 % of price/ dari Jumlah harga
≥ RM 15 dan < RM 20 3 % of price/ dari Jumlah harga
< RM 15 0%
Calculate the price that has to be paid by the customer. The output of the program is shown below:
The ABC LOUNDRY
Total of price : ____
Discount : ____
Price after discount : ____
Write a complete program to solve the above problem.
Students should submit the following items:
- Complete program (C++ coding) -
- Output of program (print screen) -
What is the purpose of patch management
: Non-IT professionals, however, may question the resources dedicated to ensuring proper patch management.
|
Was there a problem that you wanted to fix in your community
: Why were you inspired to act? What did you learn from your effort? How did your actions benefit others, the wider community or both?
|
Lookup of information in constant time
: Aisha knows the game really well, so she knows when and where pancakes will fall, i.e. pairs (t,p), which means at t seconds, a pancake will be at position p.
|
Main steps in system installation using the cloud
: Describe the main steps in system installation using the Cloud. Also describe the challenges and benefits of using the Cloud.
|
MTS 3013 STRUCTURED PROGRAMMING- Assignment Problem
: MTS 3013 STRUCTURED PROGRAMMING Assignment Help and Solutions, Sultan Idris Education University, Malaysia-Calculate the price that has to be paid by customer.
|
Bell-lapadula confidentiality model
: The Bell-LaPadula confidentiality model includes the *-property, also described as "no write down." What kind of security breach is the *-property intended
|
How does blocking outgoing packets not having a source
: How does blocking outgoing packets not having a source address in one's own address space improve security?
|
Briefly explain how a syn flood attack works
: Briefly explain how a SYN flood attack works. In your answer, tell what a SYN packet is, resource is attacked and what the effect of that attack is.
|
Draw an entity relationship diagram
: Draw an entity relationship diagram (ERD) for the following situations:
|