Processes a number of purchases for a user

Assignment Help Basic Computer Science
Reference no: EM131000578

Write a C# Console program that processes a number of purchases for a user. You can use a counter controlled loop (asking the user how many items they have to purchase) or a sentinel controlled loop. It is up to you. The program should ask for the quantity, price, and discount for each item inside the loop. 

The program should find and display a subtotal for the order

(sum of the quantity * price - discount for each item added together) as well as the tax (7% of subtotal), and the final total. These summary values should be printed at the end of the program for the user.

 

 

Reference no: EM131000578

Questions Cloud

Explain the cafe fuel efficiency program : What is geothermal energy and how is it converted to electricity?
Single core (cpu) architecture is able to multi : Single core (CPU) architecture is able to multi____? What two registers are always required in moving data to and from memory?
What is your total cost per month : One common type of calculation that is made frequently out there in the real world is a "fixed and variable cost problem" - what I call a Garfield problem because it's a "lump and per" scenario. What is your total cost per month? Approximately how ..
What is the distance between two streetlights : Optimum sharpness of one image occurs when the diameter ofthe central maximum equals the diameter of the pinhole. What is theoptimum hole size for a pinhole camera in which the filmis 20 cm behind the hole? Assume λ = 550 nm, an average value forv..
Processes a number of purchases for a user : Write a C# Console program that processes a number of purchases for a user. You can use a counter controlled loop (asking the user how many items they have to purchase) or a sentinel controlled loop. It is up to you. The program should ask for the qu..
Explain briefly what caused the income generated : Explain briefly what caused the income generated by the liquidation of LIFO layers. Assuming an income tax rate of 35%, what was the effect of the liquidation of LIFO layers on cost of goods sold in 2011?
What are the various types of wireless security : What are the various types of wireless security. which method is the best and why?
What is the index of refraction of the glass : A light ray incident on a block of glass makes an incident angle of 50.0° with the normal to the surface. The refracted ray in the block makes an 36.1° with the normal. What is the index of refraction of the glass?
Handles people entering an amusement park : GUI program that handles people entering an Amusement Park through the main gate.  Use Radio buttons and/or check boxes. A customer is Over 65, Under 12, or has a Season Pass (age doesn't matter). A ticket for the day for each of these types of custo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Ict technology for task2b according to the requirements

Use new ICT technology for task2B according to the requirements mentioned above. Already I have uploaded Assignment 1 for your reference because the current assignment deals with continuation of assignment 1 So please read the requirement carefull..

  The decision to outsource it functions

What are the critical success factors in taking the decision to outsource IT functions? Which functions, if any, can/should be outsourced? What are the risks associated with outsourcing or offshoring?•

  Define business strategies for implementation

Create an implementation plan for your organization, a project from the websites such as or a state RFP site.

  Packet-switched and circuit-switched

Packet-switched and circuit-switched are two standards utilized by wide area networks. In your Discussion Board posting of 4-6 paragraphs, address the following:

  Computing downtime in telephone per year

Telephone system has an availability of 99.999 percent. How much downtime is that per year? Express your answer in a way that is easy for someone to understand.

  Fundamental text retrieval tasks using hash-based indexing

In this paper three fundamental text retrieval tasks where hash-based indexing. Which task is more appropriate for a text based search retrieval? Provide reasons to support your answer.

  Various techniques for exploring emerging design ideas

Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.

  What is the output of the following unknown method

What is the output of the following unknown method

  Availability of the organization information assets

Organizational end users are generally in the background when it comes to protecting the IT infrastructure. As the chief security officer (CSO), develop a security awareness training communication plan for these users. Your plan must be in nontechnic..

  Non functional requirements

Analyse the Case Study documents and determine the non-functional requirements (NFRs) or system quality attributes necessary to meet the needs identified in the Case Study. Document your analysis with a System Wide Requirement document. Make sure ..

  Analysis summarizing the wireless design

Provide a 7 to 10 page analysis summarizing the wireless design to the executive management team. The summary should effectively allow the senior management to understand the organization security requirements and make the appropriate decisions..

  Discuss how the use of standards such as variable naming

Discuss how the use of standards such as variable naming, the use of class diagrams, and good programming practices all contribute to both rapid program development and increased ease of maintenance

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd