Write the pseudocode for a program that accepts data

Assignment Help Computer Engineering
Reference no: EM131551860

Assignment

Write the pseudocode for a program that accepts data for an order number, customer name, wood type, number of characters, and color of characters. Display all of the entered data, a breakdown of the charges, and the final price for the sign.

Mark Daniels is a carpenter who creates personalized house signs. He wants an application to compute the price of any sign a customer orders, based on the following factors:

· The minimum charge for all signs is $30.

· If the sign is made of oak, add $15, if made of maple, add $20, no charge is added for pine.

· The first six letters or numbers are included in the minimum charge; there is a $3 charge for each additional character from 7 to 10 and $4 charge for each additional character over 10.

· Black or white characters are included in the minimum charge; there is an additional $12 charge for gold-leaf lettering.

Write the pseudocode for a program that accepts data for an order number, customer name, wood type, number of characters, and color of characters. Display all of the entered data, a breakdown of the charges, and the final price for the sign.

Reference no: EM131551860

Questions Cloud

Discrete variable with a continuous number : Can you think of another example of approximating a discrete variable with a continuous number?
Explain basics of the rfid components that were chosen : Explain Basics of the RFID components that were chosen. Security concerns or practices associated with the RFID system.
Find fitted interaction for all combination of polymer resin : The lack of balance in the data set above resulted from a misunderstanding of how the experiment was to be conducted. How would you respond to a colleague.
Write executive summary about accessing patient information : The data that's collected must be shared amongst other providers for the assurance of patients care and needs.
Write the pseudocode for a program that accepts data : Write the pseudocode for a program that accepts data for an order number, customer name, wood type, number of characters, and color of character.
Discuss how marketers could advertise the new facilities : Besides concierge medicine and retail clinics, identify two other contemporary healthcare facilities identified in the literature.
Find the fitted main effect for each level of each factor : Find the residuals and plot them against the cell means (that serve as fitted values in this context). Does it appear that response variability is consistent.
What are the measures that can be taken to ensure data : What are some of the measures that can be taken to ensure that data in a Cloud environment is secure? Include techniques for data-at-rest vs. data-in-transit en
The largest employers in the united states : It is with no doubt that the health care industry is considered to be one of the largest employers in the United States.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Analyze the functionality of broadband

Analyze the functionality of broadband and related transmission methodologies. To accomplish the outcome, research standards and broadband vendors.

  Give an example demonstrating the explanation

explain the the importance of inheritance in allowing extensible designs, by giving an example demonstrating the explanation

  Is a shift toward dna based identifications a good idea

What are some of the benefits and limitations of using DNA to identify victims of mass causalities. When answering take into account available resources, types of attacks, evidence collection and preservation, etc.

  Did you describe how they would deploy different software

scenario your boss has come to you and expressed that there are several software packages that he would like you to

  As a consultant to a large transaction-oriented web-based

in memory databases imdb are making some significant inroads. as a consultant to a large transaction-oriented web-based

  Describe the two features of the windows firewall

Describe, in your own words, the two features of the Windows Firewall in Windows Server 2012 that you believe are most useful to users.

  What is the average workload needed for finding a collision

Consider a hash function that outputs 50 bit long hash values. What is the average workload needed for finding second-preimage with this hash function? Similarly, what is the average workload needed for finding a collision? Express the attack aver..

  Questionclass computer publicvoid retail pricevoid int p 2

questionclass computer publicvoid retail pricevoid int p 2 manufacturecostprintf d n p print pprivatevirtual int

  Write a report about memory management ram technologies

Write a report about Memory Management: RAM technologies. It has been widely acknowledged that many students will work in jobs that are not known yet.

  Define creating an exam object using java

define Creating an Exam Object using Java

  Cognitive walk and pluralistic walk

Compare and contrast cognitive walk-through evaluations and pluralistic walk-through evaluations in terms of effectiveness and efficiency. Give an example of a use for each type

  Explain the risks and benefits of virtualization

How would you recommend that your IT department prepare for disaster.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd