Skip to main content

Codechef ATM Problem Solve in Python

 

Codechef --- ATM Problem Solve in Python


Pooja would like to withdraw X $US from an ATM. The cash machine will only accept the transaction if X is a multiple of 5, and Pooja's account balance has enough cash to perform the withdrawal transaction (including bank charges). For each successful withdrawal, the bank charges 0.50 $US. Calculate Pooja's account balance after an attempted transaction.


Ex. - Positive integer 0 < X <= 2000 - the amount of cash which Pooja wishes to withdraw.

   Nonnegative number 0<= Y <= 2000 with two digits of precision - Pooja's initial account balance.
Example - Successful Transaction
 Input:
 30 120.00

 Output:
 89.50
Code :--
total_amount = 120 #int(input("Enter your total avalable account balence:-- "))
cash_withdr = 30 #int(input("How much money do you want :-- "))
check_amount = cash_withdr * 4
if check_amount <= total_amount:
    now_balence = float(((total_amount - cash_withdr) - 0.50))
    print("Transaction successful")
    print("Your avalable balence is :- ", now_balence)
else:
    print("Insuffisend Balence")

Output :--        

Comments

  1. If you want to get rich within 24hours to 48hours with a programmed
    blank atm card, It all depends on how fast you can be to get the new
    PROGRAMMED blank ATM card that is capable of hacking into any ATM
    machine,anywhere in the world. I got to know about this BLANK ATM CARD
    when I was searching for job online about a month ago..It has really
    changed my life for good and now I can say I’m rich and I can never be
    poor again. The least money I get in a day with it is about
    $50,000.(fifty thousand USD) and i only spent $250 to get the
    card.Only serious individuals should contact him because he is very
    straight forward if you don’t have the money don't even bother to
    contact him and his series is 100% trusted i am a living testimony.
    Every now and then I keeping pumping money into my account. Though is
    illegal,there is no risk of being caught ,because it has been
    programmed in such a way that it is not traceable,it also has a
    technique that makes it impossible for the CCTVs to detect you..For
    details on how to get yours today, email: oscarwhitehackersworld@gmail.com
    tell your loved once too, and start to live large
    whatsapp..+1(510)-777-9243

    ReplyDelete

Post a Comment

If you have any doubts, Please let me know

Popular posts from this blog

Best digital marketing in Perth

Best digital marketing in Perth Introduction Your introduction into the brave new world of the digital space will be custom-tailored to your business needs requirements. You will be introduced to the crew who will be handling your project, from inception to the launch into the market. Assess It will be our job to not only know your customers but how they engage with the core products and  brand relationships . From here we break down what we research, to identify the core elements needed to engage the customer. Create It’s imperative that the design of your vessel is done right from the start. Its shape, level of focus, and attention to detail are crucial for a prosperous, lucrative, and extended journey. We will always present concepts and suggestions as per the requirement, but we truly believe this process should be a collaborative one between the creative crew of the PWD and the client. The final form will dictate its progression into the  development  and manufacturi...

WHAT ARE NEURAL NETWORKS? | Comingfly

WHAT ARE NEURAL NETWORKS ? Neural Networks the process of machine learning are neural networks. These are brain-inspired networks of interconnected layers of algorithms, called neurons, that feed data into each other, and which can be trained to carry out specific tasks by modifying the importance attributed to input data as it passes between the layers. During training of these neural networks, the weights attached to different inputs will continue to be varied until the output from the neural network is very close to what is desired, at which point the network will have 'learned' how to carry out a particular task. A subset of machine learning is deep learning, where neural networks are expanded into sprawling networks with a huge number of layers that are trained using massive amounts of data. It is these deep neural networks that have fueled the current leap forward in the ability of computers to carry out task like speech recognition and computer vision. T he...

What is Cyber Security | Comingfly

What is Cyber Security The Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Description:  Major areas covered in cyber security are: 1)  Application Security 2)  Information Security 3)  Disaster recovery 4)  Network Security Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are:  a)  Input parameter validation,  b) User/Role Authentication & Authorization,  c)  Session management, parameter manipulation & exception management, and  d)  Auditing and logging. Information security protects information from unauthori...

body-fitness Important of life | Comingfly

body-fitness Important of life In general, a strong candidate for the "best" title will be any easy-to-learn exercise that targets multiple muscle groups and gives you the practical strength and muscle tone to meet your fitness goals. Exercises that don't require fancy, expensive equipment earn extra credit. Here are seven of the best exercises for athletes and fitness junkies looking for a simple and effective full-body workout.