Question regarding the automated checkout program

Assignment Help Basic Computer Science
Reference no: EM131113147

1: Automated Checkout Program

A local department store hires you to write an automated checkout program to expedite customers in a hurry. The checkout line can only accept five items for any one purchase. Design a program that asks for the price of each item, and then displays the subtotal of the sale, the amount of the sales tax and the total. The sales tax is 6 percent.

You are to submit the following for the assignment:

  1. RAPTOR file with the flowchart of your working program. Make sure you run it to make sure it is error free and does what it is supposed to do.
  2. Use the generate dropdown to create example C++ code based on your working logical flow chart. Also attached the code in a Microsoft Word file or a text file.
  3. Quickly modify the code to change the variables if needed to the correct data type.
  4. Comment the code and indicate what the line or function performs

Reference no: EM131113147

Questions Cloud

Information security planning : Final Research PaperYou will prepare a research paper that is 4 - 5 pages in length (not including the title and reference pages). Your research should demonstrate thoughtful consideration of the comprehensive ideas and concepts that have been pre..
Determine the ratio of starting torque to full-load torque : determine the ratio of starting torque to full-load torque.
Do you think the criticism of nike is fair : Do you think the criticism of Nike is fair, considering that the host countries are in dire needs of creating jobs? What do you think Nike's executives might have done differently to prevent the sensitive charges of sweatshop labor in overseas factor..
Modularized body mass index : Design a modularized Body Mass Index (BMI) Program which will calculate the BMI of a team player. The formula to calculate the BMI is as follows:
Question regarding the automated checkout program : A local department store hires you to write an automated checkout program to expedite customers in a hurry. The checkout line can only accept five items for any one purchase. Design a program that asks for the price of each item, and then displays..
Question regarding the hacker subculture : Describe what is meant by the "hacker subculture" and identify at least one value that drives the hacker subculture. Do you think this hacker value system can ultimately be used to disrupt and deter hackers in the future?
What changes will you make in future quarters : What was your marketing strategy for each of the decisions entered into the simulation game in Quarter #1? What were the results of your decisions? Analyze the results in terms of success or failure.
Determine the percentage reduction in the applied voltage : The full-load slip is 4%. Determine the percentage reduction in the applied voltage (i.e., the percentage tap on the autotransformer).
Expansion and closed for modification : The most important fact is that your design/code needs to be opened for expansion and closed for modification; i.e. we want to be able to expand the functionality by plugging in additional features, like enabling to add more items (Bluetooth, Inte..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The basics of qualitative research

Create a PowerPoint presentation of 7-8 slides that explains the following: The basics of qualitative research, The basics of quantitative research and The basics of mixed methods research

  Identify how it supports business processes

Identify how IT supports business processes

  Questions how and why of at&t problems

Introduction-Include a brief introduction into the company and it's problem or situation.

  Create a one page outline for computer crimes

How does technology effect ethics - what are the social, economic, political, and global attributes of your topic?

  Developers choose to write applications in java

Why would developers choose to write applications in Java? Why might they skip Java and choose another programming language?

  What could you do to violate individuals privacy rights

Privacy policies are found all over the Web. Pick three web sites with privacy policies and compare and contrast them. What do they include and what is missing?

  How can you use filters to creatively manipulate images

How can you use filters to creatively manipulate images?  What filter effect do you find the most useful?  Why?

  Medium-sized business in information security department

Imagine you work for a medium-sized business in the information security department and suppose you've determined the need to structure and implement an incident response plan and team. Propose how you would make a business case for the management..

  Object-oriented programming project

In this class, we have spent much time emphasizing object oriented code development that encourages code re-use by means of interfaces, abstract classes, design patterns, etc. Now it is your turn to apply these concepts into the development of a f..

  How to combine functions and if statements

Use the skater you created for the Unit 4 assignment. Add 2 cones to the ice that the skater will skate around in a figure 8. See Exercise 6-2 Exercise 7 and 8 as an example. You will first check the skater's position and use that information in maki..

  Research options for improving the current use of tcp/ip

Research options for improving the current use of TCP/IP and recommend new software and equipment that's available.

  Subject to scrutiny from the government

If I follow Anonymous on Facebook, will I be subject to scrutiny from the government? Does the government track followers of Anonymous?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd