In Python,  A sales event at Trader Jane's is reducing some items by 25%. Store that value to a properly named constant. Write a program that functions like a cashier terminal for one item. Some items are subject to 7% sales tax and some are not. Use a constant for the sales tax value, too. Write a program for Trader Jane's that runs as shown next: Enter the ticket price of the item 100 Is this item reduced y/n? y is this item taxable y/n? y Here is your bill Original price $100 Reduction during event $25.00 Final price $75.00 7% Sales tax $5.25 Total amount due $80.25     Plan each program by writing pseudocode. Write all of your pseudocode as comments immediately after your name and SPC ID#.  Add more comments as needed in each program to explain your code. Choose descriptive variable names in all programs. Currency format. There should be no space between the $ sign and the first digit. See sep on page 66 to cancel the space automatically added when print items are separated by commas. Display commas as needed for values over $1,000.

Question

In Python,  A sales event at Trader Jane's is reducing some items by 25%. Store that value to a properly named constant. Write a program that functions like a cashier terminal for one item. Some items are subject to 7% sales tax and some are not. Use a constant for the sales tax value, too. Write a program for Trader Jane's that runs as shown next:

Enter the ticket price of the item 100

Is this item reduced y/n? y

is this item taxable y/n? y

Here is your bill

Original price $100

Reduction during event $25.00

Final price $75.00

7% Sales tax $5.25

Total amount due $80.25

 

 

  • Plan each program by writing pseudocode. Write all of your pseudocode as comments immediately after your name and SPC ID#. 
  • Add more comments as needed in each program to explain your code.
  • Choose descriptive variable names in all programs.
  • Currency format. There should be no space between the $ sign and the first digit. See sep on page 66 to cancel the space automatically added when print items are separated by commas. Display commas as needed for values over $1,000.

 

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Science

Python

Related Computer Science Q&A

Find answers to questions asked by students like you.

Q: Write a c++ program that converts the input dollar to its peso exchange rate equivalent. Assume that...

A: //include the required header file #include <iostream> using namespace std; //definition of th...

Q: Database systems are typically implemented as a set of processes (or threads) accessing shared memor...

A: In shared memory architecture, disk and all processes end up sharing a common memory via a bus.

Q: Given the binary value 11011.01011, what is its normalized value?

A: Normalized floating-point representation: Normalized floating-point numbers will always come in the ...

Q: A movie megaplex needs to collect movie attendance data. The company maintains 16 theaters in a sing...

A: An entity-relationship model implements design of concepts that exist in the mind for a database. It...

Q: Which INT 21h function would you use to check the standard input buffer to see if a character is wai...

A: Function INT 21h used to check the standard input buffer to see if a character is waiting to be proc...

Q: Write a single instruction that converts an unsigned binary integer in AX to unpackeddecimal.

A: The single instruction that converts an unsigned binary integer in AX to unpacked decimal is followi...

Q: (True/False): A track is divided into multiple units called sectors.

A: ANS: - True A track is divided into multiple units called sectors.  

Q: Consider the schema R = (A, B, C, D, E, G, H) and the set F of functional dependencies:AB → CDD → CD...

A: 3NF decomposition: Any relation is said to be in 3NF if it follows following characteristics: The ...

Q: Construct a B+-tree for the following set of key values:(2, 3, 5, 7, 11, 17, 19, 23, 29, 31) Assume ...

A: B+ Tree can be defined as an extension of B Tree. It can perform operations such as insertion, delet...

Q: What do each of the following symbols mean in a flowchart? • Oval • Parallelogram • Rectangle

A: Flowchart: A flowchart is a pictorial representation for solving a problem in a step by step. Each s...

Q: How do you keep track of elements that contain data in a partially filled array?

A: It is not possible to know the exact number of elements to be stored in the partially filled arrays....

Q: COVID – 19 has brought about the closure of many institutions, Bator Senior High School want to disp...

A: PROGRAM STRUCTURE: Include the header files which are required for the code. Use namespace standard...

Q: The __________ is a collection of classes and other code that can be used, along with a programming ...

A: .NET framework:  The .NET framework is the collection of base class libraries and the code used in ...

Q: Help?

A: The below given Java program will obey the following rubrics: In the main method, instantiating Sca...

Q: Give at least 2 applications or uses for a CFH (example: password verification) and a brief descript...

A: A cryptographic hash function (CHF) is an equation that gives us the facility to verify the validity...

Q: If ECX is initialized to zero before beginning a loop, how many times will the LOOPinstruction repea...

A: Repetition of LOOP instruction Initializing ECX is one of the common programming error to zero. It ...

Q: What is the starting location of the BIOS and MS-DOS data area?

A: The entire memory is a memory of multiple partitions. These partitions are basically for distinguish...

Q: 3 Fe ¥) Write a reverse integer function that takes an integer num as a reference parameter and then...

A: Below is the required program in C++ language. Approach: Essential header files are included and us...

Q: Create a program that generates the grade of the three grading systems.  Display the output.  Prelim...

A: Programming approach To take input from the user, import Scanner class from the util package. Creat...

Q: Q#1 (a). Write a program that inputs radius and user choice. It calculates volume of a sphere using ...

A: Program Approach: Including necessary header files and defining the value of pi. Using namespace f...

Q: When entering data in a text box, each key the user presses invokes the text box’s _________________...

A: User presses the key invoking the text box event A control's KeyPress event is executed when the us...

Q: Assuming minors are younger than 13 and adults are older than 19, write a program that prompts the u...

A: Below is the required code in C++ language. Approach: Essential header files are included and using...

Q: In code, what characters do you enclose a string literal in?

A: In code, double quotation marks are used to enclose the string literal.

Q: What is the range of a 32-bit unsigned integer? What is the range of a 32-bit signed integer? What i...

A: i)Range of 32-bit unsigned integer : For n=32, the minimum value : 0 For n=32, the maximum value : 

Q: Consider the following recursive function. What does it calculate in terms of x, y, and z?  01: Priv...

A: Step 1:- In the question there is no programming language is mentioned there for I write the program...

Q: Write a method to add two matrices. The header ofthe method is as follows:public static double[][] a...

A: A required Java program is as follows, File name: “MatrixSum.java” import java.util.Scanner; public ...

Q: Describe the term "worm" with an example (in context of information security) . Take any scenario.

A: WORM A worm refers to a malware type that performs its operations as a self-contained application a...

Q: Data-Com-Comp-Networks Week 1 TCP/IP Configuration The TCP/IP protocol is the universal standard for...

A: TCP/IP is the most widely-used network protocol to connect a large number of communication devices. ...

Q: What are the reasons for choosing a different shell than bash?

A: Solution: A shell is a command interpreter in UNIX and LInux operating systems .It is a program tha...

Q: The __________ refers to the base class. a. friend keyword b. this keyword c. base keyword d. class ...

A: Base class:   In the object-oriented programming concepts, there is a concept named inheritance. In ...

Q: Draw UML Diagram 1.Define the Entertainment class – it must have at least two attributes and one app...

A: Objective: We need to draw the UML Diagram including the following specifications, The abstract clas...

Q: Which of the following variable declarations will cause an error? Why? a. decimal payRate = 24m; b. ...

A: Option A (decimal payRate = 24m;)Here, an integer value is assigned to a decimal variable, which is ...

Q: 5. Consider the bipartite network below. 2 3 4 8 10 a. Construct the adjacency matrix. Why is it a b...

A: The adjacency matrix for a bipartite graph is represented as: A=matrix( 0r,r   B                   B...

Q: Give your reflection on how pipelining can make computer run faster, dependencies between executing ...

A: It is the way toward amassing instruction from the processor through a pipeline. It permits putting ...

Q: List two advantages and two disadvantages of each of the following strategiesfor storing a relationa...

A: The given storage strategy is: Store each relation in one file. The advantages of this strategy of s...

Q: Suppose the advisor relationship set were one-to-one. What extra constraints are required on the rel...

A: Relationships in DBMS can be expressed as a connection between two elements like Employee-Department...

Q: The term __________ is used to describe a file that data is written to.a. input fileb. output filec....

A: Explanation: The process of saving data in a file is known as writing data to a file. When a piece ...

Q: Create an algorithm for making a jelly sandwich.

A: An algorithm to make a jelly sandwich is as follows, Step-1: Start the process. Step-2: Take a piece...