What is the advantage of breaking your application’s code into several small procedures?

Answers

Answer 1

Answer: For better code management and modularity

Explanation:

An application consist several lines of code so when we break an entire code into several small procedures it becomes easy to maintain and look for errors while debugging. This process also is part of good code writing and hence easy to manage our code during testing and debugging phases of application development.


Related Questions

T F Overuse of global variables can lead to problems.

Answers

Answer:

True

Explanation:

Global Variables

Variables which are declared outside any function. Any function can use these variables,they are automatically initialized to zero(0).They are generally declared before main() function.

Problems

We can modify the global variable in any function as any function can access it. So it is hard to figure out which functions read and write these variables. Various problems are-

No Access Control Concurrency issuesMemory allocation issues

IRQ 0 interrupt have _______________ priority
? low
? medium
? highest
? lowest

Answers

Answer:

Highest

Explanation:

A interrupt request / IRQ is in which instructions are sent to Cpu and uses an interrupt handler to run distinct program . Hardware interrupts are used to manage occurrences such as obtaining modem or network card information, important presses, or mouse motions.

Interrupt request 0. – it is a system timer (can not be altered) Interrupt request 1 – keyboard controller (can not be changed) Interrupt request 2 – cascaded IRQ 8–15 signals (any device configured to use IRQ 2 will genuinely use IRQ 9) Interrupt request 3 – serial port 2 controller Interrupt request 4 –  serial port 1 controller Interrupt request 5 –parallel port 2 and 3  Interrupt request 6 - floppy disk controller  Interrupt request 7 –parallel port 1. If a printer is not present, it is used for printers or for any parallel port. It can also possibly be shared with a secondary sound card with cautious port management.

As interrupt number increases priority level decreases, Priority level 0 is the highest priority level .

Indicate which of the following substances contain an atom that does or does not follow the octet rule.

A. AlCl3

B. PCl3

C. PCl5

D. SiCl4

Answers

AlCl3 does not follow the octet rule because it has only six electrons in its valence shell after bonding. PCl5 also doesn't follow the octet rule as phosphorus extends beyond the octet by forming five covalent bonds using the d-orbitals.

To determine which substances contain an atom that does not follow the octet rule, we can evaluate the compounds listed: AlCl3, PCl3, PCl5, and SiCl4.

AlCl3 (Aluminum chloride): Aluminum has three valence electrons and forms three covalent bonds with chlorine atoms. However, it does not follow the octet rule because it only has six electrons in its valence shell after bonding.PCl3 (Phosphorus trichloride): Phosphorus has five valence electrons and forms three covalent bonds with chlorine atoms, leaving it with a full octet.PCl5 (Phosphorus pentachloride): Phosphorus can expand its valence shell beyond the octet rule, using the d-orbitals, to form five covalent bonds with chlorine atoms.SiCl4 (Silicon tetrachloride): Silicon has four valence electrons and forms four bonds with chlorine atoms, achieving a full octet.

Based on this information, AlCl3 and PCl5 are examples where the central atom does not follow the octet rule. In the case of AlCl3, aluminum is electron-deficient with three bonds, whereas in PCl5, phosphorus exceeds the octet rule by forming five bonds.

Describe encryption at gateways in thePresentation layer of the OSI Reference Model

Answers

Answer:  

In the presentation layer of the OSI reference model provides a variety of coding and functions that can be applied in application layer data. Information send by the application layer are ensured by these functions. As, presentation layer is the important layer in the OSI reference model because it is responsible for important services like  data compression, data conversion, decryption and encryption.

Encryption at gateway is defined as, when the important data is first encrypted using protocol and then it is transferred in the network. And gateway re-director operates in the presentation layer.

A void function can return any value. TRUE FALSE

Answers

Answer:

False

Explanation:

False

A void function does not return anything

Final answer:

A void function cannot return any value, and the claim that it can is false. It performs operations without returning a value. In some languages like Python, a void function implicitly returns 'None', indicating the absence of a value.

Explanation:

The statement that a void function can return any value is FALSE. A void function is a type of function that does not return any value. The keyword void indicates that the function is expected to perform an action without the need to return a value. When a void function is executed, it might perform operations such as displaying content on the screen or modifying a global state, but it cannot return a value to the caller.

Although a void function does not return a value itself, in languages like Python, it may implicitly return a special value called None, which is treated as the absence of a value. This should not be confused with functions that return other types of values, such as Booleans, Integers, Floating point numbers, Strings, Arrays, Objects, or Resources.

With few exceptions, ________ are warm-blooded, havelive births, and are suckled with milk from their mother’sbody.
which mammals
mammals
mammals that
mammals, they

Answers

Answer:

mammals

Explanation:

With few exceptions, mammals are warm-blooded, have live births, and are suckled with milk from their mother’s body.

Answer:

Just mammals. Hope that helps.

Explanation:

What is the value of x after the following statements execute? int x, y, z; y 12; z 3; X= (y*(z+y-10); A. 36 B. 144 C.60 D. None of these

Answers

Answer:

60

Explanation:

According to the operator precedence, the bracket comes in the top. So, the program solve expression in the bracket first.

In the code, the value of Y is 12  and z is 3

substitute the value in the formula.

X = (12*(3 + 12 - 10)).

So, the program calculate the value (3 + 12 - 10) first which gives 5.

After that program evaluate (12 * 5) which gives 60.

Therefore, the answer is 60.

Which one of the following media is most resistant to EMI?

a. coaxial cable

b. UTP cable

c. STP cable

d. fiber-optic cable

e. microwaves

Answers

Answer:

D - Fiber-optic Cables

Explanation:

Electromagnetic interference affects cables made from different metals and can corrupt the data running through them. However, Fiber-optic cables are constructed from glass (non-metallic) and transmit pulses of light as signals to transfer data, this means that the cables are most resistant and not susceptible to EMI.

The ___ of a signal is the range of frequencies that it contains.

a) spectrum b) effective bandwidth c) wavelenghth d) absolute bandwidth

Answers

the answer is A. Spectrum

What is Belady in computer language ?

Answers

Answer: Belady’s anomaly is a process in which by increase in the number of page frames there is a increase in the number of page faults for memory access pattern.

Explanation: Belady's anomaly was if there is a increment in the number of page frames then it will result in the increment of page faults as well in computer terms. The process was seen usually on the following replacement algorithm:-

FIFO(first-in first-out) Random page replacement

What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?

Answers

Answer and Explanation:

E-commerce and e-business is a major business of the present time using the internet. It is basically defined as the online selling of goods or making any business online. Internet is the basic requirement for the e-commerce or e-business as

it helps in providing the internet connectivity so that the e-business can be displayed online and users can buy goods or interact with seller regarding the business. Due to internet service users get to know about the online business and thus the business attains economic growth and benefit.

what is Software Process Improvement?

Answers

Answer:

Software Process Improvement (SPI) methodology is defined as a sequence of tasks, tools, and techniques to plan and implement improvement activities to achieve specific goals such as increasing development speed, achieving higher product quality or reducing costs.

Software Process Improvement (SPI) is the practice of enhancing software development processes to improve quality and efficiency. It often utilizes methods like Six Sigma's DMAIC framework. The goal is to create consistent, high-quality software products.

What is Software Process Improvement?

Software Process Improvement (SPI) is the practice of analyzing and enhancing the software development processes within an organization to improve the quality, efficiency, and overall performance of software delivery.

By identifying inefficiencies and variations in current processes, companies can implement more effective methodologies that lead to higher quality products. One common method used in SPI is Six Sigma, which employs the DMAIC (Define, Measure, Analyze, Improve, Control) framework.

To implement Software Process Improvement, follow these steps:

Define: Identify the processes that need improvement and establish goals.Measure: Collect data on current processes to understand existing performance levels.Analyze: Examine the data to identify sources of inefficiencies or defects.Improve: Develop and implement strategies to rectify identified issues.Control: Monitor the improved processes to ensure sustainability and continuous improvement.

Quality improvement techniques, such as process mapping and the PDCA (Plan, Do, Check, Act) cycle, can also support SPI efforts. Through these methods, organizations aim to achieve more consistent, reliable, and high-quality software products

Imagine that 10 int values are labeled byposition: 1, 2, 3, etc. Write a program that reads 10integers and tracks how many of them have the same value as theirposition. That is, ifthe first number read is 1, or the third number is 3, that countsas a match, and the output would be the number of matches (from 0to 10). Use a singleif statement and a loop.

Answers

Answer:

#include<iostream>

using namespace std;

//main function

int main(){

   //initialization

   int count_Number=1,a1,match_Numbers=0;

   //loop run 10 times

   do{

       //print

       cout<<"Enter the number: ";

       //read the value enter by user

       cin>>a1;

       //check for match

       if(a1==count_Number){

           match_Numbers++;

       }

       count_Number++;

   }while(count_Number <= 10);

   //display the output

   cout<<"The number of matches is: "<<match_Numbers<<endl;

   return 0;

}

Explanation:

Include the library iostream for using the input/output instruction.

create the main function and declare the variables.

take the do-while loop which has a special property, the statement in the do-while execute first and then check the condition.

In the do-while, print the message by using the cout instruction and then store the value enter by the user into the variable.

then, check the value enter by the user is match the position or not. If the condition true, then count the matches and also update the position count.

this process continues until the position count is less than or equal 10. if condition false the loop terminates and then, display the output on the screen.

Explain the security mechanisms available for a database and how the data will be protected.

Answers

Answer: Views, unauthorized access, encryption are some of the security mechanisms.

Explanation:

The database of any application or software contains all the important data, therefore it is utmost necessary to protect the data from falling into dangerous hands. Most databases use authentication measures in form of passwords or bio metrics to avail access. Besides these users can use views to see the data but cannot change anything into the database. Some databases also use encryption systems to encrypt the passwords for better safety. There are some databases which grants user with two types of privileges such as system and  object privileges, whereby with system privileges one can change the system environment variables.

What is the most consistent item regardless of the software used in BI?

Answers

Answer Explanation:

Business intelligence is defined as the strategies and technologies used by companies for the data analysis of business information it tell us also about predictive views of business operation.

THE MOST CONSISTENT ITEMS REGARDLESS OF SOFTWARE USED IN BI ARE :

data analyst has the most responsibility of BI he is the most important part of BIIt is the interconnected process of inspection changing and modelingdata analysis is hugely aided by data mining

An array can store integers and doubles together.true or false

Answers

Answer:

False

Explanation:

An array stores a sequence of values that are all of the same type

The signal(s)that control the direction that data is transferred on its buslines is the _________ signal(s).

Answers

Answer:

They are called control signals

A computer on a company network was infected with a zero-day exploit after an employee accidently opened an email that contained malicious content. The employee recognized the email as malicious and was attempting to delete it, but accidently opened it. Which of the following should be done to prevent this scenario from occurring again in the future? A. Install host-based firewalls on all computers that have an email client installed B. Set the email program default to open messages in plain text C. Install end-point protection on all computers that access web email D. Create new email spam filters to delete all messages from that sender

Answers

Answer:

A. Install host-based firewalls on all computers that have an email client installed

Explanation:

Since the employee accidentally opened the email that contained malicious content and the computer on the company network got infected, it needs to install host-based firewalls on all computers that have an email client installed on the system. A host-based firewall is a type of firewall installed on individual client or server which controls the incoming and outgoing networking data and identifies whether to allow it or not. The host-based firewall can easily identify and block suspected exploits like viruses, worms or trojan horses.

By installing host-based firewalls on all computers that have an email client installed secures the entire network of computers.

Answer:

The answer is C.

Explanation:

To prevent such thing from happening in the future, the employee/company should Install end-point protection on all computers that access web email

. To allow access to network resources is the function of______________________

a. Application layer

b. Physical layer

c. Network layer

d. logical link layer

Answers

I think Network layer is the answer.

What are the most common MIS (management information systems) used in a business place.

Answers

Answer:

  MIS (management information systems) is a computer system consist of hardware and a software that together serves as the backbone of operations for an organisation. It is an important tool for any business irrespective of its scale of operation and its size and frequency and usage may be vary with business. As, MIS tools help in move data and manage the information.

The technologies and tools are used in MIS have evolved over the time such as minicomputers, mainframe and server networks.

Describeat least three applications where re-writeable optical laser diskwould be preferred over hard disks for storage

Answers

Answer:

 Applications where re-writeable optical laser disk would be preferred over hard disks for storage are:

While storing the data in large amount, the optical disk are more preferred as, for storing the videos, photographs and various types of the images.This optical laser disk are used for transferring the information or data from one computer to another so we can easily modify or re-write the data at any time as, this disk are more convenient than hard disk.The optical laser disk are also helpful for distributing the software to the customers or users by using its large storing capacity features, as compared to hard disks.

 

Answer:

The following are listed applications or requirements where the re-writable (optical) laser drive is preferred over storage hard drives.

Explanation:

A laser disk is often used to transmit data between one device to the next such that at any moment we could conveniently edit or re-write the details even though this drive is much more versatile than that of the disk.When processing the details in vast numbers, the optical disk is used to store certain photos, snapshots, and different file formats.As compared to hard disks, the optic disk has always been useful in delivering the applications to consumers or clients with its broad storage space functionality.

When you instantiate an object from a class, ____ is reserved for each instance field in the class.

a.
a field name

b.
a constructor

c.
a signature

d.
memory

Answers

Answer:

The correct answer is d.Memory

Explanation:

The meaning of instantiating an object is to be able to create an instance of the object by using an object-oriented programming (OOP) language. In Java to instantiate an object from a class is to create a specific class and Memory is reserved for each instance field in the class.

What is a regular expression that would match any digit 1-999?

Answers

Answer:

[1-9][0-9]{0,2}

Explanation:

The numbers to be matched consist of three digits with the following requirements:

- Digit 1 can take the values 1-9

- Digit 2 can take the values 0-9

- Digit 3 can take the values 0-9

- Digits 2 and 3 are optional, that is the number may consist of 1,2 or 3 digits in all.

Taking these into account, the overall regular expression can be represented as follows:

[1-9][0-9]{0,2}

Which of the following is not anadvantage of simulation?
Ability to treatcomplex situations
Ability to deriveoptimal solutions
Ability to askwhat-if questions
Ability toexperiment with different scenarios
Ability tocompress time

Answers

Answer: Ability to derive optimal solutions

Explanation:

One of the main disadvantages of simulation is ability to derive optimal solutions. As, the solution does not required to have a closed form and  procedure does not require any weighting and the hard constraint.  Stimulation outcome are not optimal to induced specific response because of the lack of quantitative models.

You use ____ operators to perform calculations with values in your programs.

a.
arithmetic

b.
calculation

c.
integer

d.
precedence

Answers

Answer:

arithmetic

Explanation:

Arithmetic operator like + , - , * , / are used to perform calculations with values in programs. For example:

1 + 2 will add 1 and 2 and return the value 3.

1 * 2 will multiply 1 and 2 and return the value 2.

3 - 2 will subtract 2 from 3 and return the value 1.

The values which undergo the operation can be integral or floating point.

Answer:

Option a is the correct answer for the above question.

Explanation:

For any programming language, An arithmetic operator is used to perform the calculation for any set of values. It takes two or more value to perform the calculation. This operation performed by the help of the Arithmetic logic unit which is also called ALU. It lies on the CPU and works for the instruction of the control unit.

The above question scenario states that if there are two or more value then which operator is used to perform calculation then the answer is an arithmetic operator as described above. Hence option a is the right answer. while the other is not because--

Option b states about calculation operator but it is not the defined operator for any programming language. Option c states about integer operator but it is not the defined operator for any programming language. Option d states about precedence operator but it is not the defined operator for any programming language. It tells that which operator is executed first if two or more operators are used for any statement.

Every call to a recursive function has its own code and its own set of ____ and local variables

A.
headers

B.
parameters

C.
stack

Answers

Answer: Parameters

Explanation:

Whenever a call to a recursive function is made, then the function has its own code and its own set of parameters with local variables. These parameters are within the scope of the recursive function. For example while finding the factorial of a number we are given the function with parameter such as int recursive(int n) where int n is a parameter passed into the function.

Which of the following expression is equivalent to (x >1)?

x >= 1

!(x <= 1)

!(x = 1)

!(x < 1)

None of the above
Please explain so that I can learn from you.

Answers

Answer:

!(x <= 1)

Explanation:

The operator '!' comes in the logical operator category and it names is not Operator.

It used with the Boolean value if the Boolean value is TRUE then NOT operator gives output FALSE.

if the Boolean value is FALSE then NOT operator gives output TRUE.

so, consider the expression (x >1).

It means x is greater than 1.

Now, think about when the condition will be false.  

So, the condition will be If x is less than or equal to 1.

the option 1 is x >= 1. So, it greater than equal to 1.  This is not the correct option

!(x <= 1) it means x is less than equal to 1 and include the NOT operator then it becomes X is greater than 1 (x > 1). So, This is the one possible answer.

!(x = 1): it means x can be greater than or less than 1. so, this is not correct.

!(x < 1): it means x can be greater than or equal to 1. This is also not correct because it includes the equal part as well.

Queue is the LIFO structure.

o True

o False

Answers

Answer:

The answer is False.

Explanation:

By definition LIFO structure is defined by: Last In, First Out.

By definition FIFO structure is defined by: First In, First Out.

A queue has the basics operations push() and pop() where:

push(element) stores the element at the end of the queue.element = pop() retrieves the element at the beginning of the queue.

For example:

If you insert the elements doing the push(e) and q.pop(e) operation:

Queue q;

Element e;

q.push(2); // q ={2};

q.push(5); // q ={2 , 5};

q.push(6); // q = {2, 5, 6};

q.pop(e); //  q ={5, 6}; e = 2;

q.push(12); q ={5, 6, 12};

q.pop(e); //  q ={6, 12}; e = 5;

Note: A stack is a LIFO structure.

The n modifier after the tilde forces the index variable to expand only to the ______

Answers

Answer: filename and extension.

Explanation:

Suppose we have %~nxa, where we have two modifiers n and x, and a single variable a.

So, the n modifier after the tilde forces the index variable to expand only to the  filename(by the n modifier) and the extension(by the x modifier).

It produces the filename and extension instead of the full path.

For a set of integers stored in an array,calculate the sum of the positive numbers and the sum of the negative numbers. The program should store these numbers in memory variables: positiveSum and negativeSum. Numbers should be read from the array one at a time with a zero value (0) being used to signal the end of data (the zero value is acting as a "sentinel" value).

Answers

Answer: The c++ program to implement the given conditions is shown below.

#include <iostream>

using namespace std;

int main()

{

// used as index of array in the loop for calculating the sum

   int i=0;

// array contains both negative and positive integers

// 0 is used as the sentinel value

   int arr[12]={-9,-8,-3,-12,-78,-10,23,45,67,1,0};

   int positiveSum=0, negativeSum=0;

   do

   {

       if(arr[i]<0)

           negativeSum = negativeSum + arr[i];

       if(arr[i]>0)

           positiveSum = positiveSum  + arr[i];

// after every element is added, index of array represented by i is incremented

       i++;

   }while(arr[i]!=0);

// loop continues till end of array is reached

   cout<<"Sum of positive integers "<<positiveSum<<" and sum of negative integers "<<negativeSum<<endl;

   return 0;

}

OUTPUT

Sum of positive integers 136 and sum of negative integers -120

Explanation: This program declares and initializes an integer array without user input. As mentioned in the question, 0 is taken as the sentinel value which shows the end of data in the array.

   int arr[12]={-9,-8,-3,-12,-78,-10,23,45,67,1,0};

All the variables are declared with data type int, not float. Since, integers can yield integer result only.

The do-while loop is used to calculate the sum of both positive and negative integers using int variable i. The variable i is initialized to 0.

This loop will run till it encounters the sentinel value 0 as shown.

while(arr[i]!=0);

Hence, all the integers in the array are read one at a time and sum is calculated irrespective of the element is positive or negative.

       if(arr[i]<0)

           negativeSum = negativeSum + arr[i];

       if(arr[i]>0)

           positiveSum = positiveSum  + arr[i];

After the element is added, variable i is incremented and loop is continued.

The do-while loop tests positive and negative integers based on the fact whether their value is greater than or less than 0.

The program can be tested using different size and different values of positive and negative integers in the array.

Other Questions
How does the image support the text?Read the passage and study the image and caption fromSugar Changed the World.The image shows the process for manufacturing cottonin early factories.The image shows English factory workers enjoyingsugar during their break.The image shows that factory work in the 1800s waslabor intensive.The image shows how sugar was produced in cottonfactories. The table below shows the cube roots of different numbers:Number(x)82764125Cube root(y)2345Part A: Does the table represent y as a function of x? Justify your answer. (5 points)Part B: The total cost f(x), in dollars, for renting a bike for x hours is shown below:f(x) = 10 + 20xWhat is the value of f(100), and what does f(100) represent? (5 points) Expression must have integral or unscoped enum type. TRUE OR FALSE Which of the following concepts from the Noel hypothesis describes why Africans were enslaved rather than other groups? A) competition hypothesis B) differential in power C)desirability of indentured servants D) religious servitude What are excess reserves? Where is the greatest amount of the worlds carbon found?atmosphereseafloor sedimentsoceanplants and animals NEED HELP ASAP PLEASE Explain how stage directions add to the readers understanding of the characters in this excerpt. Be sure to use details from the text to support ! Stan's Market recorded the following events involving a recent purchase of merchandise: Received goods for $20,000, terms 2/10, n/30. Returned $400 of the shipment for credit. Paid $100 freight on the shipment. Paid the invoice within the discount period. As a result of these events, the company's merchandise inventory Question 33 options: 1) increased by $19,306. 2) increased by $19,700. 3) increased by $19,308. 4) increased by $19,208. When a 33.8-g sample of an unknown compound is dissolved in 500. g of benzene, the freezing point of the resulting solution is 3.77C. The freezing point of pure benzene is 5.48C, and Kf for benzene is 5.12C/m. Calculate the molar mass of the unknown compound. How would these two problems be solved? I'm very rusty. Read the following speech excerpt and then select the correct answer to the question below: President George W. Bushs speech to the troops on the USS Abraham Lincoln Our mission continues. Al-Qaida is wounded, not destroyed. The scattered cells of the terrorist network still operate in many nations, and we know from daily intelligence that they continue to plot against free people. The proliferation of deadly weapons remains a serious danger. The enemies of freedom are not idle, and neither are we. Our government has taken unprecedented measures to defend the homeland and we will continue to hunt down the enemy before he can strike. The war on terror is not over, yet it is not endless. We do not know the day of final victory, but we have seen the turning of the tide. No act of the terrorists will change our purpose, or weaken our resolve, or alter their fate. Their cause is lost. Free nations will press on to victory. Other nations in history have fought in foreign lands and remained to occupy and exploit. Americans, following a battle, want nothing more than to return home. And that is your direction tonight. After service in the Afghan and Iraqi theaters of war after 100,000 miles, on the longest carrier deployment in recent history you are homeward bound. Some of you will see new family members for the first time 150 babies were born while their fathers were on the Lincoln. Your families are proud of you, and your nation will welcome you.How is the third paragraph different from the first two?A.) It no longer sounds authoritative or informed about the situation.B.) It broadens its view to consider the service people around the world.C.) It gets more specific by talking about the service people on the USS Lincoln.D.) It comes across as unfeeling and insensitive to the people who have suffered. Drag the correct steps into order to evaluate 27 t 3 for t = 6. A turntable rotates counterclockwise at 76 rpm . A speck of dust on the turntable is at 0.45 rad at t=0. What is the angle of the speck at t = 8.0 s ? Your answer should be between 0 and 2 rad. Consider the reaction N2O4(g)2NO2(g) where N2O4 is colorless and NO2 is brown. At a temperature of 5C, the reaction is colorless at equilibrium. This indicates that the equilibrium constant for this reaction at this temperature is View Available Hint(s) Consider the reaction where is colorless and is brown. At a temperature of 5, the reaction is colorless at equilibrium. This indicates that the equilibrium constant for this reaction at this temperature is zero, because equilibrium can only be obtained at A.room temperature. B.large. C.negative. D.small (< 1). Where/what is the arrector pili muscle? Is it under voluntary control? Dinosaur fossils are too old to be reliably dated using carbon-14, which has a half-life of about 5730 years. Suppose we had a 68 million year old dinosaur fossil. How much of the living dinosaur's 14C would be remaining today? (Round your answer to five decimal places.) Factor completely 5x2 50x + 120. Select one:a. 5(x 3)(x 8)b. (5x 15)(x 8)c. (x 4)(5x 30)d. 5(x 4)(x 6)Question 2Factor completely 64x2 1Select one:a. (8x 1)(8x 1)b. (8x 1)(8x + 1)c. (1 8x)(1 8x)d. (1 8x)(1 + 8x) Select the five grammatical structures in which nominative case pronouns should be used At Harry's discount hardware everything is sold for 20 percent less than the price marked. If Harry buys tool kits for $80,what price should he mark them if he wants to make a 20percent profit on his cost?