Description
3PP3 HOMEWORK POWER POINT P_CH03_GOV1_H3_Instructions.docx
3PP3 HOMEWORK PART 1 go_p03_grader_h3.pptx
3PP3 HOMEWORK PART 2 go_p03_grader_Background (2).jpg
3PP3 HOMEWORK PART 3 go_p03_grader_Video.wmv
PLEASE PLEASE PLEASE FOLLOW THE DIRECTIONS EXACTLY AS READ. *VIP
I need an 80% or higher to PASS and this is all I can accept.
Please submit this assignment on 1 page/file. I can't open ZIP FILES.
Please do not add your name to my assignment anywhere. This work must be submitted annonomously.
You will have 2 full days to complete this assignment.
Good Luck and don't forget to follow the directions.
pat
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Awesome! Made my life easier.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
I need a paper with 2 pages excluding front page and reference page in APA format, please review the instructions
PKI and Encryption at Work
Learning Objectives and Outcomes
Develop a plan to deploy public key infrastructure (PKI) an ...
I need a paper with 2 pages excluding front page and reference page in APA format, please review the instructions
PKI and Encryption at Work
Learning Objectives and Outcomes
Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.
Assignment Requirements
In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.
QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.
QMC will be required to conform to the following compliance issues:
Public-company regulations, such as the Sarbanes-Oxley (SOX) Act
Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)
Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)
Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry
Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users
Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics
Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.
You need to present your PKI solution in the form of a professional report to the senior management.
java u. Phase 1
OVERVIEW:In this project you will bring together everything you have learned in this class, including both programming tec ...
java u. Phase 1
OVERVIEW:In this project you will bring together everything you have learned in this class, including both programming techniques and non-technical skills.Java University has been doing their student registration process manually since its inception. You have been approached by the Registrar’s Office and asked to submit a proposal to automate this process. When completed, this application should accomplish the following: Allow courses and course sections to be added, modified, and deletedAllow students to be added, modified, and deletedAllow students to register for coursesAllow grades to be entered for each studentCreate a course catalogCreate a student directoryCreate a grade report for each studentPHASE 1 REQUIREMENTS: 1.)List the departments you will need to contact In order to complete your initial analysis. For each department, discuss the reasons why you have selected this department and some questions you would ask to help complete your analysis. 2.)List the data needed to provide the functionality required. Assume the data will be stored in separate files. For each file, list the name of the file and data elements needed. Include a description of the data, the variable name you would use, and the data type. For example, if we were designing an Inventory system, one file might look like this:INVENTORYDESCRIPTIONVARIABLETYPEItem NumberstrItemNoStringItem DescriptionstrItemDescStringQuantity On HandintQtyOnHandIntegerLast Order DatedtLastOrderDateYou must have the number of files with sufficient elements needed to provide the minimum functionality required.WRITING REQUIREMENTS:Your assignment must follow these formatting requirements:All of the requirements for this phase of the project must be in a single Word document. It must be of sufficient length to fully develop your plan. It should be clear, concise, and written in professional business language. The intended audience would be the business leaders of the organization, not necessarily tech people.The document must be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow Strayer Writing Standards (SWS). For more information, consult the SWS link in your Blackboard course shell.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.This assignment must consist of 100% original work. Cite sources for any outside resources you consult.Course objectives evaluated by this assessment:Demonstrate the proper use and application of syntax in the Java programming language.Design, compile, implement, test, and debug simple programs in Java applications.Apply data storage and data manipulation in Java applications.Program simple and complex decisions and loops in Java applications.Use array functions and lists in Java applications
The Role of Community Agencies in Managing Disasters
Disasters come in many forms. There are
natural disasters such as hurricanes, tornados or disease outbreaks such as
Ebol ...
The Role of Community Agencies in Managing Disasters
Disasters come in many forms. There are
natural disasters such as hurricanes, tornados or disease outbreaks such as
Ebola. There are man-made disasters such as bombings, bioterrorism, or airplane
crashes. We expect that someone will provide us with assistance to keep us safe
and recover from these disasters. Have you ever thought about who is
responsible for this assistance and how it is coordinated? Agencies at all
levels: local, state, and federal have a role to play. Choose a
government level and investigate what agencies have a role in disaster
prevention and assistance.Create
a PowerPoint presentation no longer than 10 slides
(including title and reference slide in APA format) to discuss these agencies
and what their role is in a disaster.You
should include a minimum of 3 references. Include a reference slide in APA
format
Linear Optimization
The purpose of this assignment is to solve business problems using
linear optimization techniques and interpret the res ...
Linear Optimization
The purpose of this assignment is to solve business problems using
linear optimization techniques and interpret the results to determine
optimal solutions for business problems.Using specified data files, chapter example files, and templates
from the “Topic 5 Student Data, Template, and Example
Files” topic material, complete Chapter 14, Problems 79 (part
a), 80 (part a), 81, 86 (part a), and 89 from the textbook. Use
Microsoft Excel’s Solver Add-In to complete these problems. For
all problems except 89, run the Solver’s Answer and Sensitivity
Reports. Interpret and summarize the key results.To receive full credit on the assignment, complete the following.Ensure that all Solver settings are defined through the use of
the Solver dialog box.Ensure that Excel files include the
associated cell functions and/or formulas if functions and/or
formulas are used.Include a written response to all
narrative questions presented in the problem by placing it in the
associated Excel file.Include Answer and Sensitivity
Reports interpretation and summary of key results.Place
each problem in its own Excel file. Ensure that your first and last
name are in your Excel file names.APA style is not required, but solid academic writing is expected.This assignment uses a rubric. Please review the rubric prior to
beginning the assignment to become familiar with the expectations for
successful completion. Also I need two questions answered . Question 1- Many linear optimization problems can be solved by finding a graphical
solution, but there are some problems that require more advanced
spreadsheets and software to find an optimal solution. Describe an
optimization problem in which finding a solution would be impossible
using the feasible-region approach. Discuss the attributes the problem
would have to make it impossible to solve using the feasible-region
approach. Question 2-Optimization techniques are
used in many applications. For example, when customers order products
from an online store, the shipper has to determine the optimal way to
get the product delivered to the customer. The delivery path that is
chosen is the path that minimizes shipping costs while simultaneously
satisfying these constraints:The product must arrive by a promised date.The shipper must deliver a finite set of items.The product must originate from one of several warehouse hubs across the country.Discuss whether there can be multiple solutions (i.e., more than one
path to get the product to your house). Explain why. Is there a
guarantee that a solution always exists? Explain.
Singly Linked Lists Programming Project
Instructor note:Submit this assignment here for grading, submit your report in Canvas (total 100 Points).Reviewsingly-link ...
Singly Linked Lists Programming Project
Instructor note:Submit this assignment here for grading, submit your report in Canvas (total 100 Points).Reviewsingly-linked listsbuilding a multiple source/header files projectoperator overloadingAs an entry-level programmer you have to be able to read, understand existing code and update it (add new features). One of this assignment’s goals is to read about 400 lines of code in five files, compile and run the program, understand it, and change it as required.Download and review the following files (read code and all comments carefully):College.hCollege.cppLinkedList.hLinkedList.cppmain.cppThis program:Reads data about colleges from a text file and inserts them into a sorted linked list. The list is to be sorted in ascending order by the college code (assume it is unique).Displays the list as a table, including the number of colleges in the list.Searches the list: prompts the user to enter a college code, searches for that code: if found, displays related data, otherwise displays an error message, then searches again for another code, until the user enter “Q” to stop searching.Deletes nodes from the list: prompts the user to enter a college code, searches for that code: if found, it removes it from the list, otherwise displays error message, then searches again for another code, until the user enter “Q” to stop deleting.Read and understand this program (draw UML diagrams, the linked list, and hierarchy charts). Then do the following:In main.cpp: provide calling statements for the basic linked list functionsBuild and run the program: search will not work, but display and delete should workIn LinkedList.cpp: finish writing the searchList() functionBuild and run the program: now search should work tooIn College.h and College.cpp overload the stream insertion operator. The overloaded operator is going to replace the hDisplay() function in the College class, and it is going to be used in LinkedList.cpp, in displayList() as shown belowBuild and run the program// Display the value in this node.
pCur->college.hDdisplay();
// new code
cout << pCur->college
Write a program
An algorithm – a regular text file Java Source code – a Java source file Write a program that creates customers� ...
Write a program
An algorithm – a regular text file Java Source code – a Java source file Write a program that creates customers’ bills for a carpet company when the information below is given: The customer’s last name, first name Length and width of the carpet in feet Carpet price per square foot First name and last name can be entered in any case. Length and width must be entered as integers. Carpet price per square foot can be a floating-point number or an integer. The Customer ID must contain the following three parts in order. First initial of a capitalized first name First five characters of a capitalized last name (Assuming the user-entered last name is at least five-character long) A random two-digit number in the range 10 to 99(inclusive). The tax rate is 8.5%, and it must be stored as a constant. The tax rate must be formatted into percentage format without leading zeros. Leading zeros must be used to make sure there are at least three digits in each formatted measurement data. All charge data must be formatted into required formats with leading zeros and trailing zeroes as shown. Sample Run 1: Enter your first name: John John Enter your last name: Smith Enter length of room (feet): 23 Enter width of room (feet): 13 Enter cost per square foot: 14.20 CUSTOMER Last Name Smith First Name John ID JSmith45 MEASUREMENT Length 023 feet Width 013 feet Area 299 square feet CHARGES Description Cost/Sq.ft Charges --- Carpet 14.20 $4245.80 Tax 8.50% 0360.89 - Total $4606.69 Sample Run 2: Enter your first name : joHn Notice the name is not entered in title case. Enter your last name: smith Enter length of room (feet): 23 Enter width of room (feet): 13 Enter cost per square foot: 14.20 CUSTOMER Last Name Smith Notice the name is displayed in title case. First Name John ID JSmith45 MEASUREMENT Length 023 feet Width 013 feet Area 299 square feet CHARGES Description Cost/Sq.Ft. Charges Carpet 14.20 $4245.80 Tax 8.50% 0360.89 Total $4606.69 Sample Run 3: Enter your first name: Joe Enter your last name: Whitney Enter length of room (feet): 14 Enter width of room (feet): 2 Enter cost per square foot: 5.00 CUSTOMER Last Name Whitney First Name Joe ID JWhitn23 MEASUREMENT Length 014 feet Width 002 feet Area 028 square feet CHARGES Description Cost/Sq.Ft. Charges -- Carpet 05.00 $0140.00 Tax 8.50% 0011.90 Total-----------------------------------------------------------------------------------------------
Similar Content
C sharp programming, computer science homework help
Hello, I got this assignment due 2nd of March at 8:00 amhttp://csserver.evansville.edu/~blandfor/Engr123/Asn05.pdf...
BUSS 2012 MEC Research Methods Data Analytics and Project Planning Essay
Assignment must be computer typed. Font - Times New Roman
Research Methods, Font – Style - Regular Font -...
ALY 6050 NU Forecasting Financial Time Series of Coca Cola Stock Price Project
PA
Northeastern
University
ALY-6050
ALY-6050 Module Three Project
Project: Forecasting Financial Time Series
The project...
University of South Florida Sorting Lists Javascript Code Project
Hi, I am looking for JavaScript code and corresponding HTML code. See the following instructions:You should automatically ...
ISSC 481 American Military University Information Security Risk Management Essay
Assignment Instructions
You will be required to write one term paper this semester. The specifications are as follows:
...
European Flight Schedule Problem Project
i nee help with a python program :by the greedy algorithm . Write a python program to implement the greedy algorithm. Use ...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
I need a paper with 2 pages excluding front page and reference page in APA format, please review the instructions
PKI and Encryption at Work
Learning Objectives and Outcomes
Develop a plan to deploy public key infrastructure (PKI) an ...
I need a paper with 2 pages excluding front page and reference page in APA format, please review the instructions
PKI and Encryption at Work
Learning Objectives and Outcomes
Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.
Assignment Requirements
In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.
QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.
QMC will be required to conform to the following compliance issues:
Public-company regulations, such as the Sarbanes-Oxley (SOX) Act
Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)
Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)
Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry
Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users
Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics
Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.
You need to present your PKI solution in the form of a professional report to the senior management.
java u. Phase 1
OVERVIEW:In this project you will bring together everything you have learned in this class, including both programming tec ...
java u. Phase 1
OVERVIEW:In this project you will bring together everything you have learned in this class, including both programming techniques and non-technical skills.Java University has been doing their student registration process manually since its inception. You have been approached by the Registrar’s Office and asked to submit a proposal to automate this process. When completed, this application should accomplish the following: Allow courses and course sections to be added, modified, and deletedAllow students to be added, modified, and deletedAllow students to register for coursesAllow grades to be entered for each studentCreate a course catalogCreate a student directoryCreate a grade report for each studentPHASE 1 REQUIREMENTS: 1.)List the departments you will need to contact In order to complete your initial analysis. For each department, discuss the reasons why you have selected this department and some questions you would ask to help complete your analysis. 2.)List the data needed to provide the functionality required. Assume the data will be stored in separate files. For each file, list the name of the file and data elements needed. Include a description of the data, the variable name you would use, and the data type. For example, if we were designing an Inventory system, one file might look like this:INVENTORYDESCRIPTIONVARIABLETYPEItem NumberstrItemNoStringItem DescriptionstrItemDescStringQuantity On HandintQtyOnHandIntegerLast Order DatedtLastOrderDateYou must have the number of files with sufficient elements needed to provide the minimum functionality required.WRITING REQUIREMENTS:Your assignment must follow these formatting requirements:All of the requirements for this phase of the project must be in a single Word document. It must be of sufficient length to fully develop your plan. It should be clear, concise, and written in professional business language. The intended audience would be the business leaders of the organization, not necessarily tech people.The document must be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow Strayer Writing Standards (SWS). For more information, consult the SWS link in your Blackboard course shell.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.This assignment must consist of 100% original work. Cite sources for any outside resources you consult.Course objectives evaluated by this assessment:Demonstrate the proper use and application of syntax in the Java programming language.Design, compile, implement, test, and debug simple programs in Java applications.Apply data storage and data manipulation in Java applications.Program simple and complex decisions and loops in Java applications.Use array functions and lists in Java applications
The Role of Community Agencies in Managing Disasters
Disasters come in many forms. There are
natural disasters such as hurricanes, tornados or disease outbreaks such as
Ebol ...
The Role of Community Agencies in Managing Disasters
Disasters come in many forms. There are
natural disasters such as hurricanes, tornados or disease outbreaks such as
Ebola. There are man-made disasters such as bombings, bioterrorism, or airplane
crashes. We expect that someone will provide us with assistance to keep us safe
and recover from these disasters. Have you ever thought about who is
responsible for this assistance and how it is coordinated? Agencies at all
levels: local, state, and federal have a role to play. Choose a
government level and investigate what agencies have a role in disaster
prevention and assistance.Create
a PowerPoint presentation no longer than 10 slides
(including title and reference slide in APA format) to discuss these agencies
and what their role is in a disaster.You
should include a minimum of 3 references. Include a reference slide in APA
format
Linear Optimization
The purpose of this assignment is to solve business problems using
linear optimization techniques and interpret the res ...
Linear Optimization
The purpose of this assignment is to solve business problems using
linear optimization techniques and interpret the results to determine
optimal solutions for business problems.Using specified data files, chapter example files, and templates
from the “Topic 5 Student Data, Template, and Example
Files” topic material, complete Chapter 14, Problems 79 (part
a), 80 (part a), 81, 86 (part a), and 89 from the textbook. Use
Microsoft Excel’s Solver Add-In to complete these problems. For
all problems except 89, run the Solver’s Answer and Sensitivity
Reports. Interpret and summarize the key results.To receive full credit on the assignment, complete the following.Ensure that all Solver settings are defined through the use of
the Solver dialog box.Ensure that Excel files include the
associated cell functions and/or formulas if functions and/or
formulas are used.Include a written response to all
narrative questions presented in the problem by placing it in the
associated Excel file.Include Answer and Sensitivity
Reports interpretation and summary of key results.Place
each problem in its own Excel file. Ensure that your first and last
name are in your Excel file names.APA style is not required, but solid academic writing is expected.This assignment uses a rubric. Please review the rubric prior to
beginning the assignment to become familiar with the expectations for
successful completion. Also I need two questions answered . Question 1- Many linear optimization problems can be solved by finding a graphical
solution, but there are some problems that require more advanced
spreadsheets and software to find an optimal solution. Describe an
optimization problem in which finding a solution would be impossible
using the feasible-region approach. Discuss the attributes the problem
would have to make it impossible to solve using the feasible-region
approach. Question 2-Optimization techniques are
used in many applications. For example, when customers order products
from an online store, the shipper has to determine the optimal way to
get the product delivered to the customer. The delivery path that is
chosen is the path that minimizes shipping costs while simultaneously
satisfying these constraints:The product must arrive by a promised date.The shipper must deliver a finite set of items.The product must originate from one of several warehouse hubs across the country.Discuss whether there can be multiple solutions (i.e., more than one
path to get the product to your house). Explain why. Is there a
guarantee that a solution always exists? Explain.
Singly Linked Lists Programming Project
Instructor note:Submit this assignment here for grading, submit your report in Canvas (total 100 Points).Reviewsingly-link ...
Singly Linked Lists Programming Project
Instructor note:Submit this assignment here for grading, submit your report in Canvas (total 100 Points).Reviewsingly-linked listsbuilding a multiple source/header files projectoperator overloadingAs an entry-level programmer you have to be able to read, understand existing code and update it (add new features). One of this assignment’s goals is to read about 400 lines of code in five files, compile and run the program, understand it, and change it as required.Download and review the following files (read code and all comments carefully):College.hCollege.cppLinkedList.hLinkedList.cppmain.cppThis program:Reads data about colleges from a text file and inserts them into a sorted linked list. The list is to be sorted in ascending order by the college code (assume it is unique).Displays the list as a table, including the number of colleges in the list.Searches the list: prompts the user to enter a college code, searches for that code: if found, displays related data, otherwise displays an error message, then searches again for another code, until the user enter “Q” to stop searching.Deletes nodes from the list: prompts the user to enter a college code, searches for that code: if found, it removes it from the list, otherwise displays error message, then searches again for another code, until the user enter “Q” to stop deleting.Read and understand this program (draw UML diagrams, the linked list, and hierarchy charts). Then do the following:In main.cpp: provide calling statements for the basic linked list functionsBuild and run the program: search will not work, but display and delete should workIn LinkedList.cpp: finish writing the searchList() functionBuild and run the program: now search should work tooIn College.h and College.cpp overload the stream insertion operator. The overloaded operator is going to replace the hDisplay() function in the College class, and it is going to be used in LinkedList.cpp, in displayList() as shown belowBuild and run the program// Display the value in this node.
pCur->college.hDdisplay();
// new code
cout << pCur->college
Write a program
An algorithm – a regular text file Java Source code – a Java source file Write a program that creates customers� ...
Write a program
An algorithm – a regular text file Java Source code – a Java source file Write a program that creates customers’ bills for a carpet company when the information below is given: The customer’s last name, first name Length and width of the carpet in feet Carpet price per square foot First name and last name can be entered in any case. Length and width must be entered as integers. Carpet price per square foot can be a floating-point number or an integer. The Customer ID must contain the following three parts in order. First initial of a capitalized first name First five characters of a capitalized last name (Assuming the user-entered last name is at least five-character long) A random two-digit number in the range 10 to 99(inclusive). The tax rate is 8.5%, and it must be stored as a constant. The tax rate must be formatted into percentage format without leading zeros. Leading zeros must be used to make sure there are at least three digits in each formatted measurement data. All charge data must be formatted into required formats with leading zeros and trailing zeroes as shown. Sample Run 1: Enter your first name: John John Enter your last name: Smith Enter length of room (feet): 23 Enter width of room (feet): 13 Enter cost per square foot: 14.20 CUSTOMER Last Name Smith First Name John ID JSmith45 MEASUREMENT Length 023 feet Width 013 feet Area 299 square feet CHARGES Description Cost/Sq.ft Charges --- Carpet 14.20 $4245.80 Tax 8.50% 0360.89 - Total $4606.69 Sample Run 2: Enter your first name : joHn Notice the name is not entered in title case. Enter your last name: smith Enter length of room (feet): 23 Enter width of room (feet): 13 Enter cost per square foot: 14.20 CUSTOMER Last Name Smith Notice the name is displayed in title case. First Name John ID JSmith45 MEASUREMENT Length 023 feet Width 013 feet Area 299 square feet CHARGES Description Cost/Sq.Ft. Charges Carpet 14.20 $4245.80 Tax 8.50% 0360.89 Total $4606.69 Sample Run 3: Enter your first name: Joe Enter your last name: Whitney Enter length of room (feet): 14 Enter width of room (feet): 2 Enter cost per square foot: 5.00 CUSTOMER Last Name Whitney First Name Joe ID JWhitn23 MEASUREMENT Length 014 feet Width 002 feet Area 028 square feet CHARGES Description Cost/Sq.Ft. Charges -- Carpet 05.00 $0140.00 Tax 8.50% 0011.90 Total-----------------------------------------------------------------------------------------------
Earn money selling
your Study Documents