You’ve been hired to help a bank automate their deposit/withdrawal system! Your task is to write a Python program that interacts with a customer in order to process a deposit or withdrawal.

Assume the customer has an initial balance of $1000 (you should store the number 1000 in a variable). Then, ask the user two things:

Whether they want to make a deposit or withdrawal

For this step, they should type a deposit or withdrawal, depending on what they want to do. It needs to be the exact spelling, including capitalization!
How much money they want to deposit or withdraw

For this step, they should enter an integer.
Then, your program should use an if/elif/else statement to do the following:

If the customer is making a deposit, add the amount to their balance.
If the customer is making a withdrawal, subtract the amount from their balance.
If the customer typed something other than "deposit" or "withdrawal", print "Invalid transaction.".
In this case, the customer’s final balance is just the same as their initial balance.
Finally, your program should use an if/else statement to do the following:

If the customer’s final balance would be negative (less than zero), tell them "You cannot have a negative balance!".
Otherwise, report their final balance.
Here are some examples of what running your program should look like:

Example 1:

Deposit or withdrawal: withdrawal
Enter amount: 500
Final balance: 500

Example 2:

Deposit or withdrawal: withdrawal
Enter amount: 1500
You cannot have a negative balance!

Example 3:

Deposit or withdrawal: deposit
Enter amount: 500
Final balance: 1500

Youve Been Hired To Help A Bank Automate Their Deposit/withdrawal System! Your Task Is To Write A Python
Youve Been Hired To Help A Bank Automate Their Deposit/withdrawal System! Your Task Is To Write A Python

Answers

Answer 1

Answer: See below

Explanation:

Description: In this program, read-option from the user and based on that, perform the operation. And display the balance if the balance is negative.

transactions.py

balance = 1000

#read options from the user

option = input("Deposit or withdrawal: ")

amount = 0

#check if option is a withdrawal

if option == 'withdrawal':

amount = int(input("Enter an amount: "))

balance = balance - amount

#check option is deposit

elif option == 'deposit':

amount = int(input("Enter an amount: "))

balance = balance + amount

else:

print("Invalid transaction.")

#check balance is less than 0 (negative)

if balance < 0:

print("You cannot have a negative balance!")

else:

print("Final balance:",balance)


Related Questions

Typically, hybrid drives use SSD to store the operating system and applications and hard disks to store videos, music, and documents.

A. True

B. False

Answers

Answer:

False

Explanation:

SSD's aren't as reliable as traditional hard disks, therefore, if the operating system is installed on the SSD and is stops working, the whole computer is broken.

In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powered off. They then extracted drive encryption keys from RAM and used them to decrypt an encrypted drive. This is called a(n):

Answers


It’s called a “Cold Boot” attack

The questions of economics address which of the following? Choose three answers.
who
what
where
when
why
how

Answers

Answer:

Economists address these three questions: (1) What goods and services should be produced to meet consumer needs? (2) How should they be produced, and who should produce them? (3) Who should receive goods and services? The answers to these questions depend on a country's economic system.

So the answer would be WHAT, WHY & WHO. Hope this helps

Explanation:

Being technologically literate requires being able to ______. a. use advanced graphics manipulation tools (adobe photoshop) b. use the most common operating systems (windows and apple os) c. adjust network settings for a company lan d. none of the above please select the best answer from the choices provided a b c d

Answers

Being technologically literate requires being able to use the most common operating systems (windows and apple). That is option B.

What are operating systems?

The operating systems are important software of a computer system which manages the computer's memory and other application software.

Examples of common operating systems include:

Apple operating system and

windows operating system

These operating systems are regularly updated by the technological companies that produced them. Therefore, being technologically literate requires being able to use the most common operating systems.

Learn more about  Operating System here:

https://brainly.com/question/22811693

William would like to use full-disk encryption on his laptop. He is worried about slow performance, though, so he has requested that the laptop have an onboard hardware-based cryptographic processor. Based on this requirement, what should William ensure the laptop contains

Answers

There are different kinds of applications. William should ensure that the laptop contains TPM.

What is the TPM as seen in a computer?

This is known to be Trusted Platform Module and called TPM for short. It is a  technology that has been set up to aid or give a kind of hardware-based and also security linked services.

Note that A TPM chip is said to be often be a kind of secure crypto-processor and as such it will be the best for William's laptop.

See full question below

Question 33:William would like to use full-disk encryption on his laptop. He is worried about slow performance, though, so he has requested that the laptop have an onboard hardware-based cryptographic processor. Based on this requirement, what should William ensure the laptop contains? a) AESb) FDEc) PAMd) TPM

Learn more about laptop from

https://brainly.com/question/26021194

What is output by the following code?

for x in range (4):
for y in range (3):
print("*", end=" ")
print("")
Group of answer choices

* * * *
* * * *
* * * *
* * * *
* * * *

* * *
* * *
* * *
* * *

* * * * *
* * * * *
* * * * *
* * * * *

* * * *
* * * *
* * * *

Answers

Answer:

* * *

* * *

* * *

* * *

Explanation:

The inner loop will print 3 times *

For every outer loop, that 3 times * will be printed again => 4 times in this case

The end=" " is to add new line in each inner loop

The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.

Answers

answer.

I don't know what it is

At the center of a star network is the _____, which manages the network and acts as a communications conduit for all network traffic.

Answers

Answer:

switch

Explanation:

At the center of a star network is the _____, which manages the network and acts as a communications conduit for all network traffic.

a. scale b. log c. portal d. switch

A:

d. switch

If non-series-rated overcurrent devices (standard molded-case circuit breakers) are to be installed in the main switchboard, breakers with adequate ____ must be installed in the panelboards.

Answers

Breakers with adequate short-circuit must be installed in the panelboards.

What are these equipment about?

Common Overcurrent Protection Devices (OCPDs) are known to be Breakers or fuses that are often used  to protect the full unit from too much current.

Note that Equipment such as switchboards and panelboards are often installed in an electrical system and they have to be of adequate measure of short-circuit current condition.

Learn more about overcurrent devices  from

https://brainly.com/question/14284905

A(n) _____ is an organization's management support system that combines many databases to improve management decision making. data mine information center data station data warehouse information network

Answers

A data warehouse is an organization's management support system that combines many databases to improve management decision making.

What is a management support system?

A decision support system, executive information system, as well as the knowledge-based or expert system functional capabilities are known to be factors that are all integrated into an  management support system.

Therefore saying that A data warehouse is an organization's management support system that combines many databases to improve management decision making is a true statement.

Learn more about management support system from

https://brainly.com/question/25491895
#SPJ1

In the following citation for a website, which detail is optional, according to
MLA style?
Manufacturers Association for Plastics Processors. Home page. Web. 6 Mar.
2014 .
A. Web.
B. 6 Mar. 2014.
C.
D. Home page

Answers

According to MLA style, the detail which is optional in the given citation for a website is: C. mapping link.

What is an information source?

An information source can be defined as a system or medium through which information, knowledge and ideas may be gotten (generated) and used by an individual.

What are citations?

Citations can be defined as references or links to all of the sources from which an author, writer, or researcher got his or her information from.

The characteristics of a MLA citation.

Generally, MLA citation often comprises the following information:

Author's last name and first name.Title of source.Title of container.Other contributors.VersionThe name of the publisher.Publication date.Location.

According to MLA style, the detail which is optional in the given citation for a website is mapping link.

Read more on citations here: https://brainly.com/question/8789070

#SPJ1

Complete Question:

In the following citation for a website, which detail is optional, according to

MLA style?

Manufacturers Association for Plastics Processors. Home page. Web. 6 Mar.

2014 .

A. Web.

B. 6 Mar. 2014.

C. Mapping link

D. Home page

which of the following is a benifit of googling yourself ?

Answers

Answer:

you are protecting yourself from identity theft

You have double-clicked a device in Device Manager to open its Properties window. Where can you find information about IRQs the device might use

Answers

To find information about IRQs the device might use, make alteration to the View menu option and then change it to Resources by type.

How do one find information about IRQs?

The best way to see IRQ information in Windows is through the use of Device Manager.

Note that for one to be able to find information about IRQs the device might use, one has to makes some changes to the View menu option and then one can change it to Resources by type to be able to see the Interrupt request (IRQ) part.

Learn more about Device Manager from

https://brainly.com/question/869693

#SJ1

Which software is used to play, create, and modify audio and video files?
software is used to play, create, and modify audio and video files.

Answers

Answer:

Adobe premiere pro, Maya.

Explanation:

There are many programs that do the following. I have listed two of the most well known softwares that can do this.

A machine learning cloud application provides meaningful data with the company's local customer information and purchase history. The company considers this data sensitive. How should the company manage this data when interfacing with the cloud service

Answers

Cloud storage is a service prototype that stores the data on remote storage sources generally on the net. The company can manage the data by keeping data on the local storage.

What is local storage and cloud storage?

Local storage is the storage place present in the system either in the hard drives or in the form of a solid-state drive (SSD). Cloud storage is the web storage platform that stores the data on the internet.

The cloud storage maintains, backs ups, and manages the files and folders stored on the cloud platform. Cloud storage is the virtual platform that is available to users based on the space needed.

Therefore, the data on local storage is managed when interfacing with the cloud system.

Learn more about cloud storage here:

https://brainly.com/question/17328624

#SPJ1

Which button on a desktop computer begins a reboot of the computer without power being removed from the computer's components?

Answers

Answer:

1. Click the Start button in the lower-left corner of your screen. You can also press the Windows key on your keyboard to open the Start menu.

2. Choose the Power icon.

3. When you click the power button, you will have the option to put your computer to sleep, restart it, or power it down.

Explanation:

Have a good day

Please help with this question in java.
Computers .​

Answers

Here is the program~

/*Pattern.Java.*/

import java.util.*;

public class Pattern_Prog

{

public static void main (String args[ ])

{

Scanner input = new Scanner(System.in);

int length;

System.out.print("Enter a word : ");

String word = input.next( );

length = word. length( );

for(int i = 0; i<= length; i++)

{

for(int j = 0; j<i; j++)

{

System.out.print(" ");

}

System.out.println(word.substring(0,length-i));

}

input.close( );

}

}

Hope it helps you!!

Program _______ graphically present the detailed sequence of steps needed to solve a programming problem.

Answers

Program Pseudocode graphically present the detailed sequence of steps needed to solve a programming problem.

What are Pseudocode?

These are known to be a set of codes that a program has graphically depicted all of its sequence of steps that can be sued to handle a programming problem.

Note that Pseudocode is a form of artificial and man made informal language that is often used by programmers to create  algorithms.

Learn more about Program from

https://brainly.com/question/153827

#SPJ1

Which statement would cause polarization?
a.
"I miss you."
b. "I agree with you."
C.
"You never listen to me."
d. "Can I talk to you?"

Answers

C. “you never listen to me” would cause polarization

Lab 8-1: Working with Boot Loader and Runlevels what is the root password

Answers

The root account on a Linux or Unix Operating System is the account with the most advanced privileges. The password to this account is called the "Root Password"

What is a bootloader?

The first thing that happens when the computer is powered on is that very important software is triggered. It is this software that helps the operating system (OS) to boot or load. This piece of software is called the bootloader.

By default, Unix OS does not have a root password. This must be set by the user. However, if this has been set and was lost, it may be reset using the following steps:

Boot to Recovery ModeDrop out to Root SheetRemount the File System with Write Permissionshere, type exactly the following command: mount -o rw,remount /Press "Enter" At this point, you should be able to make changes to the data on the hard drive. Next, enter passwd usernameretype the password and user name to confirm, thentype shutdown -r to restart the system.

Learn more about root passwords at:

https://brainly.com/question/26617114

it's 'p' at sign 'ssw0rd

___ is a type of social engineering where a hacker lures individuals into entering personal information into a website controlled by the hacker.

Answers

A type of social engineering where a hacker lures unsuspecting individuals to enter personal information into a website controlled by the hacker is phishing.

What is phishing?

Phishing can be defined as a type of social engineering (cyber attack) which involves making an attempt to obtain sensitive user informations, especially by disguising one's self as a trustworthy entity in an electronic communication, which is usually over the Internet.

This ultimately implies that, a type of social engineering where a hacker lures unsuspecting individuals to enter personal information such as usernames, passwords and credit card details or bank account details into a website controlled by the hacker is called phishing.

Read more on phishing here: https://brainly.com/question/23850673

#SPJ1

Which term refers to pretending to be a computer to work through lines of programming code?code blockingimportingdesk checkingsyntaxing

Answers

The computer programming that enables it to work with the line of programming code has been checking syntaxing.

What is computer programming?

The computer programming is given as the codes in the computer language for the operation of the task or the software program.

The line of programming for the code that enables the computer programming is checking syntaxing Thus, option C is correct.

Learn more about computer programming, here:

https://brainly.com/question/3397678

#SPJ1

Customer records containing names, addresses, phone numbers, and purchase histories would be most likely stored in: customer relational networks database management systems spreadsheets information processing networks transactional networks

Answers

Customer records are the personal information of the customer that is registered in a store. Customers' records in stores are stored in the database management systems.

What is a database management system?

A database management system (DBMS) is a computer-based system that stores and manages the data stored by the users. It uses software to save, retrieve and run data-related queries.

DBMS is used to store and manage a large amount of information and allows users to manipulate them. This allows the users to interact and access the data of the customers.

Therefore, the customer's records are stored in database management systems.

Learn more about database management systems here:

https://brainly.com/question/4325836

#SPJ1

What is the purpose of the website for David and his friends, and why did they choose that type of website?

Dave and his friends create short films and a web series. They want to distribute their work online. Dave and his friends should set up

a(n)

website in order to generate

by providing users access to their content.

Answers

A website is a great way for Dave and his friends to distribute their short films and web series. It allows them to reach a wider audience and share their work with people all over the world. They can also use the website to promote their brand and generate income through advertising or merchandise sales.

What is the website about?

There are several different types of websites that Dave and his friends could choose from, depending on their goals and the features they want to include. One popular option is a video hosting platform, such as You Tube or Vimeo, which provides an easy way to upload and share video content.

Another option is a blog or portfolio website, which would allow them to showcase their work and write articles or blog posts about the creative process. They could even use a combination of both depending on the series and content.

Therefore, the type of website that Dave and his friends choose will depend on their goals and the features they want to include. They could consult a web developer to help them make the best choice for their needs.

Learn more about website  from

https://brainly.com/question/28431103

#SPJ1

An information system’s _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks.

Answers

Answer:

vulnerability      hack/unauthorized access    liklihood/predisposition

Explanation:

A program has a class Potato , which is derived from the class Vegetable , which is derived from the class Food . This is an example of _______

Answers

Inheritance

If you have a potato, it has the features/characteristics of a vegetable
A potato is healthy, and it gets this from being a vegetable
A vegetable gets its features/characteristics from food
A vegetable can be eaten, just like food
We can then say that a vegetable inherits the ability to be eaten from food
And that the potato inherits this from being a vegetable
The potato class inherits from the vegetable class the healthiness, but the vegetable class doesn’t inherit healthiness from the food class

Which term best describes the set that makes up an algorithm?
A. Steps
B. Documents
C. Statements
D. Patterns

Answers

Answer:

A

Explanation:

An algorithm is a series of steps to get to a final result.

The term that best describes the set that makes up an algorithm is steps. The correct option is A.

What is algorithm?

An algorithm is a set of step-by-step instructions that are followed in order to complete a specific task or solve a particular problem.

Each step in the algorithm is typically a distinct command or operation designed to accomplish a specific goal or modify a specific aspect of the data being processed.

Documents, statements, and patterns are not the best terms to describe the collection of elements that comprise an algorithm.

While an algorithm can be documented or described in written or visual form, the term "documents" does not adequately describe the nature of the instructions themselves.

Similarly, while an algorithm may be made up of individual commands or operations, the term "statements" does not convey the concept of a step-by-step process.

Finally, while an algorithm may contain repeating patterns or structures, the term "patterns" does not imply a linear sequence of steps that must be performed in a specific order.

Thus, the correct option is A.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ7

As a student you would most likely use the ________ collaboration tool set because it is free and takes not time to learn. Group of answer choices maximum

Answers

Collaboration toolsets are the programs and apps that make the work more effective and creative. Students should use a minimal collaboration toolset.

What is a minimal collaboration toolset?

A minimal collaboration toolset is a platform, application, or program that is free of cost and requires no time to learn. It is used in emails and other text platforms.

It shares content through email and shares document files. This minimal collaboration toolset uses all text but lacks voices and videos.

Therefore, the minimal collaboration toolset is the correct blank.

Learn more about the collaboration toolset here:

https://brainly.com/question/15176746

#SPJ1

You are writing an algorithm and want to tell the computer what to do if the
user does not perform an action. Which type of statement should you include
in your algorithm?
A. Return
B. When-if
C. If-else
D. And-or

Answers

Answer:

you are writing an algorithm and went to tell computer what to do If the return

The type of statement, i.e., if-else should be include in your algorithm. The correct option is C.

What is if-else statement?

An "if-else" statement is a conditional statement that determines whether a particular condition is true or false and then executes different code based on the outcome of that evaluation.

An "if-else" statement could be used in the context of a user action to check whether the user has performed a specific action and then execute different code depending on whether the user has performed that action or not.

To exit a function and return a value to the calling code, use a "return" statement. A "when-if" statement and a "and-or" statement are not standard programming constructs and are rarely used in code.

Thus, the correct option is C.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ7

What is your most valued item you have in your house or apartment?

Answers

Answer:

my book collection and nintendo

Explanation:

Other Questions
Dale wants to order business cards for his new job. Company A charges a flat fee of $0.15 per card. Company B charges $0.10 per card plus an additional $10.00 for deliveryWrite an inequality for the amount of business cards, c, that Dale would need to buy for Company to be cheaper Match each description to the appropriate part of the Constitution.describes the process throughwhich the US president is electedgives details relating to how toamend the US Constitutionspecifies the length of the terms thatmembers of Congress servedescribes the types of cases heard by theSupreme CourtArticle IArticle IIArticle IIIArticle V The Magna Carta was the basis for A) the Holy Roman Empire. B) constitutional monarchy in England. C) economic improvements in France. D) rivalry between the Pope and the Emperor. E) the revival of the Byzantine Empire. What would the term be for something in finance that is below the average income? Kate packs snow into 5 identical jars. each jar represents a different depth of snow. kate then lets the snow in each jar completely melt. the table shows the height of the liquid in each jar as it relates to the original depth of snow in the jar. a 2-column table with 5 rows. the first column is labeled snow depth (inches), x with entries 2, 4, 6, 8, 10. the second column is labeled water depth (inches), f(x) with entries 0.4, 0.8, 1.2, 1.6, 2.0. which statements are true about the relationship between the depth of the snow and the height of water in the jar after the snow is melted? select two options. the points on a graph representing the relationship lie on a line. there is 0.4 inch of water to every 1 inch of snow. a line through the points will pass through (0, 0). the function relating snow depth to water depth is quadratic. the data can be represented by f(x) = 0.2x. recessive link traits suc as ccolr What is the volume of the prism if its 2 centimeters long tall 12 centimeters wide and 25 centimeters long A sphere has a radius of 5 inches. What is its volume? In context, the question in line 5 (Why write ever the same) conveys the speakers The map shows a complete surface weather map. Study the various symbols and abbreviations. These symbols show a variety of weather-related information.Look at the circles at each location and the lines extending from them. The circles represent the cloud cover in the sky, and the lines represent the wind direction and speed. The symbol-----stands for a clear sky, and the symbol------stands for a cloudy sky. Together with the lines, the symbol----would mean the wind speed is approximately 35 knots coming from the southeast and traveling toward the northwest.Look at the locations of the warm and cold fronts you drew in part D. In the answer space, describe the cloud cover, wind speed, and wind direction expected at these locations. Which US states will be affected? Evaluate the following; ( rounding off to three decimal places) 1.2.1 cos 243,2 how does the battle of Berlin teaches us something about Canada's past A train travels from Washington D.C. to New York (225 miles). The train departs at 4:55 PM and arrives in New York at 7:55 PM. What is the average speed of the train? Who would be called upon to fix the following problem? The network at the U.S. embassy in Brazil has suddenly crashed. Diplomatic Security Special Agent information Management Specialist Foreign Service Officer economic Officer Draw an energy chain diagram to show energy transformations for this event:A car's engine burns fuel to move the car down the road. The car's engine heats the car and theoutside air. A(n) is a claim that supports an opposing argument. what are the mean,median,mode, and range of the data set given the altitude of lakes in feet:-11,-28,-17,-25,-28,-39,-6,and -46? i dont know the answer if the zeros of a quadratic formula function F are -2 and 4 what is the equation of the axis of symmetry F? If methods used in molecular systematics were not developed what would be the effect on the study of systematics? The sum of a number x and 2,496 is 17,344. What is the value of x?