98 POINTS HELP ASAP PLEASE!!!!You have been asked to create a program for an online store that sells their items in bundles of five. Select the appropriate code that would display how many bundles are available for sale.

A.print(5 // totalItems)
B.print(totalItems // 5)
C.print(totalItems(5) )
D.print(5(totalitems) )

Answers

Answer 1
Answer: B. Print(totalitems // 5)
Answer 2
Answer:

Answer:

B. Print Totalltems // 5

Explanation:

Well, if you learn how to create bundles on Amazon, you can eliminate the competition, set your price, and offer customers a product they’ll absolutely love.


Related Questions

It is possible to force the Hardware Simulator to load a built-in version of chip Xxx. This can be done by:
What is probably the most revolutionary innovation since the printing press?
A proper divisor of a positive integer $n$ is a positive integer $d < n$ such that $d$ divides $n$ evenly, or alternatively if $n$ is a multiple of $d$. For example, the proper divisors of 12 are 1, 2, 3, 4, and 6, but not 12. A positive integer $n$ is called double-perfect if the sum of its proper divisors equals $2n$. For example, 120 is double-perfect (and in fact is the smallest double-perfect number) because its proper divisors are 1, 2, 3, 4, 5, 6, 8, 10, 12, 15, 20, 24, 30, 40, and 60, and their sum is 240, which is twice 120. There is only one other 3-digit double-perfect number. Write a Python program to find it, and enter the number as your answer below.
When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the location and size of the control.
When C++ is working with an operator, it strives to convert operands to the same type. This is known as A) type correction B) type conversion C) demotion D) promotion E) None of these

#Imagine you're writing a program to check if a person is #available at a certain time.

#

#To do this, you want to write a function called

#check_availability. check_availability will have two

#parameters: a list of instances of the Meeting class, and

#proposed_time, a particular date and time.

#

#check_availability should return True (meaning the person

#is available) if there are no instances of Meeting that

#conflict with the proposed_time. In other words, it should

#return False if proposed_time is between the start_time and

#end_time for any meeting in the list of meetings.

#

#The Meeting class is defined below. It has two attributes:

#start_time and end_time. start_time is an instance of the

#datetime class showing when the meeting starts, and

#end_time is an instance of the datetime class indicating

#when the meeting ends.

#

#Hint: Instances of the datetime have at least six

#attributes: year, month, day, hour, minute, and second.

#

#Hint 2: Comparison operators work with instances of the

#datetime class. time_1 < time_2 will be True if time_1 is

#earlier than time_2, and False otherwise.

#

#You should not assume that the list is sorted.

#Here is our definition of the Meeting class:

from datetime import datetime

class Meeting:

def __init__(self, start_time, end_time):

self.start_time = start_time

self.end_time = end_time

#Write your function here!



#Below are some lines of code that will test your function.

#You can change the value of the variable(s) to test your

#function with different inputs.

#

#If your function works correctly, this will originally

#print: True, then False

meetings = [Meeting(datetime(2018, 8, 1, 9, 0, 0), datetime(2018, 8, 1, 11, 0, 0)),

Meeting(datetime(2018, 8, 1, 15, 0, 0), datetime(2018, 8, 1, 16, 0, 0)),

Meeting(datetime(2018, 8, 2, 9, 0, 0), datetime(2018, 8, 2, 10, 0, 0))]

print(check_availability(meetings, datetime(2018, 8, 1, 12, 0, 0)))

print(check_availability(meetings, datetime(2018, 8, 1, 10, 0, 0)))

Answers

Answer:

i hope the program below will help you!

Explanation:

A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of:

Answers

The answer is Event.  A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of Event.

You are tasked with writing a program to process sales of a certain commodity. Its price is volatile and changes throughout the day. The input will come from the keyboard and will be in the form of number of items and unit price:36 9.50which means there was a sale of 36 units at 9.50. Your program should read in the transactions (Enter at least 10 of them). Indicate the end of the list by entering -99 0. After the data is read, display number of transactions, total units sold, average units per order, largest transaction amount, smallest transaction amount, total revenue and average revenue per order.

Answers

Answer:

Here the code is  given as,

Explanation:

Code:

#include <math.h>

#include <cmath>  

#include <iostream>

using namespace std;

int main() {

int v_stop = 0,count = 0 ;

int x;

double y;

int t_count [100];

double p_item [100];

double Total_rev = 0.0;

double cost_trx[100];

double Largest_element , Smallest_element;

double unit_sold = 0.0;

for( int a = 1; a < 100 && v_stop != -99 ; a = a + 1 )

  {

     cout << "Transaction # " << a << " : " ;

     cin >> x >> y;

 

  t_count[a] = x;

  p_item [a] = y;

  cost_trx[a] = x*y;

 

  v_stop = x;

  count = count + 1;

 

  }

 

  for( int a = 1; a < count; a = a + 1 )

  {

   Total_rev = Total_rev + cost_trx[a];

   unit_sold = unit_sold + t_count[a];

  }

 

  Largest_element = cost_trx[1];

  for(int i = 2;i < count - 1; ++i)

   {

      // Change < to > if you want to find the smallest element

      if(Largest_element < cost_trx[i])

          Largest_element = cost_trx[i];

   }

Smallest_element = cost_trx[1];

  for(int i = 2;i < count - 1; ++i)

   {

      // Change < to > if you want to find the smallest element

      if(Smallest_element > cost_trx[i])

          Smallest_element = cost_trx[i];

   }

  cout << "TRANSACTION PROCESSING REPORT     " << endl;

  cout << "Transaction Processed :           " << count-1 << endl;

  cout << "Uints Sold:                       " << unit_sold << endl;

  cout << "Average Units per order:          " << unit_sold/(count - 1) << endl;

  cout << "Largest Transaction:              " << Largest_element << endl;

  cout << "Smallest Transaction:             " << Smallest_element << endl;

  cout << "Total Revenue:               $    " << Total_rev << endl;

  cout << "Average Revenue :            $    " << Total_rev/(count - 1) << endl;

   

  return 0;

 

}

Output:

1. The system admin staff would like you to create a cron job that runs only on weekdays (Monday - Friday) at 1am, continuously throughout the year. The job should write a list of all processes that are currently running on the host to a file called processes.txt 2. The Helpdesk would like to keep metrics on disk usage for a short period of time. Write a cron job that writes the output of the 'df -h' command to a local file titled metric.txt. The job should run on Wednesday from 10am till 2pm and update every 2 minutes. Make sure that you don't OVERWRITE the data that's already in the file. You'll need to structure your command so that it APPENDS to the file, saving the data that's already been written.

Answers

Answer: idk

Explanation:

You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features of Word 2010. What is the process involved in configuring encryption?

Answers

Answer:Encryption is the process

of translating plain text data into something that appears to be random and meaningless. A symmetric key is used during both the encryption and decryption process. To decrypt a particular piece of ciphertex, the key that was used to encrypt the data must be used.

Types of encryption

1.Symmetric encryption :This is also known as public key encryption. In symmetric encryption, there is only one key, and all communication patties use the same key for encryption and decryption.

2.Asymmetric encryption :This is foundational technology for SSL(TLS)

How encryption is being configured

Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key.

Explanation:

How can we make our programs behave differently each time they are run?

Answers

Answer:

By given the right speech as much as the answers must be

Explanation:

By given the right speech as much as the answers must be