Wholesale cost and the markup percentage

Assignment Help Basic Computer Science
Reference no: EM131186744

Write the pseudo code for the following:

Write a program that asks the user to enter an item's wholesale cost and its markup percentage. It should then display the item's retail price. For example:

If an item's wholesale cost is $5.00 and its markup percentage is 100%, then the item's retail prices is $10.00.

If an item's wholesale cost is $5.00 and its markup percentage is 50%, then the item's retail price is $7.50.

The program should have a function named calculateRetail that receives the wholesale cost and the markup percentage as arguments and returns the retail price of the item.

PLEASE I JUST WANT THE "pseudo code"

Reference no: EM131186744

Questions Cloud

List three economic justifications for government regulation : List and discuss three economic justifications for government regulation in your local area. Explain what happens if the government does not provide appropriate regulation.
What amount will be accumulated at the end of 10 years : If $200 is placed at the end of each year for 10 years in an account earning 7% interest compounded annually, what amount will be accumulated at the end of 10 years?
Used to assess the significance of parametric interval data : Which of the following is a push strategy that companies use to promote their products? When analyzing a comparison question, what type of statistical test would be used to assess the significance of parametric interval data?
Compare and contrast the two portfolios : Your aim is to beat the market with both portfolios. It is important you can demonstrate that you know the difference between these methods. You need to compare and contrast the two portfolios and you need to make explicit reference to EMH in your..
Wholesale cost and the markup percentage : The program should have a function named calculateRetail that receives the wholesale cost and the markup percentage as arguments and returns the retail price of the item.
True of counterfeit goods : Which of the following steps of the screening process for potential markets involves the evaluation of fiscal and monetary policies of a nation? Which of the following is true of counterfeit goods?
What are some potential ethical issues that must considered : What are some potential ethical issues that must be considered? How might this issue impact different communities from diverse perspectives?
Investment cost sunk in some organization : Is it possible for organization to fully reap on IT investments? Are IT investment cost sunk in some organization? How can organization maximize on their IT investments?
Correct sequence of the marketing communication process : Which of the following circumstances would best require a pull strategy to be implemented for product promotion? Which of the following reflects the correct sequence of the marketing communication process?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which version of windows 7 should be purchased

Two computers have recently failed and require replacement. Which version of Windows 7 should be purchased with the new computers?

  Design logic circuit that will detect whenever level in tank

Four tanks at a chemical plant contain different liquids being heated. Liquid -level sensors are being used to detect whenever the level in tank A or tank B rises above a predetermined level. Temperature sensors in tanks C and D detect when the te..

  Transit in a variety of applications

___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

  Distinguish distances that moved their shopping carts

Performing 200 Nm of work. Both Brian and Dawn are exerting same amount of force (20 N). Distinguish the distances that Brian and Dawn moved their shopping carts.

  Specific types of security breaches

Keeping information systems secure is a major task, both for information security professionals and everyone who uses a network such as the Internet. Discuss 3 specific types of security breaches that could occur as you use the Internet.

  Advantage and disadvantage of using word to work in graphics

Identify the advantages and disadvantages of using Word to work with graphics, tables, and special formatting functionality. Provide specific examples.

  Textbook ordering system deployment diagram

System architects and analysts use unified modeling language (UML) deployment diagrams to model the configuration of the hardware and software components of a system and how they will be deployed in a production environment. In other words, dep..

  Analyze the use of social media in marketing

discuss and analyze the use of social media in marketing your product/service

  Create a new table using the column structure

Create a new table using the column structure - From the l_foods table, list the description and price values of the following foods: hamburger, french fries, and soda.  Sort the rows by description.

  What is it infrastructure

What is IT infrastructure and why it has become an important field of study?

  Performance improvement

Why are accreditation, certification, and licensure important for the health care facility? In your response explain the performance improvement perspectives of accreditation, certification, and licensure of the organizations. Be sure to justify y..

  A team of five laborers working in a garment factory

A team of five laborers working in a garment factory in Indonesia divides the task of making men's dress shirts for export to Unites States. Each laborer works 10hours  day, six days a week, gets paid on Indonesian minimum wage of 2.50 per day. In on..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd