Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours. Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total. For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Answers

Answer 1

Answer:

something like that

Explanation:

static bunch of krap main (args) {

    double hours;

    double salary;

    double overSalary;

   print("Enter hours worked: ");

   scan(hours);

    if (hours <= 40) {

       salary = 20 * hours;

    }

    if (hours > 40) {

       overSalary = 30 * (hours - 40);

       salary = 20 * 40 + overSalary;

     }

   

    print(salary);

}

Answer 2

In this exercise we have to use the knowledge of python to write a salary function, as follows:

the code is in the attached image.

In a more easy way we have that the code will be:

static bunch of krap main (args) {

   double hours;

   double salary;

   double overSalary;

  print("Enter hours worked: ");

  scan(hours);

   if (hours <= 40) {

      salary = 20 * hours;

   }

   if (hours > 40) {

      overSalary = 30 * (hours - 40);

      salary = 20 * 40 + overSalary;

    }

   print(salary);

}

See more about python at brainly.com/question/26104476

Problem: A Company Wants A Program That Will Calculate The Weekly Paycheck For An Employee Based On How

Related Questions

write down the color code for straight-through cabling. write your answer on the space provided​
1.
2.
3.
4.
5.
6.
7.
8.

Answers



White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown

Mark Brainliest please

Answer:

1White/Green

2Green

3White/Orange

4Blue

5White/Blue

6Orang

7White/Brown

8Brown

Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's managerial role of enforcing these functions

Answers

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

Backup software creates backups and prevents you from losing all your data, so would backup software be considered an application software or utility software?

A). application software

B). utility software

Answers

Answer:I also think it's b because it litterlottery says or a utility software so obviously a utility software WOULD be considered a utility software.

Explanation:

Option(B). Utility software is the correct answer.

Antivirus, backup software, file managers, and disk compression tools are examples of utility software. These programs evaluate and keep up computers. These programs are designed with an emphasis on how the OS functions, and they carry out tasks to make the machine run efficiently.

What is a Utility software?A computer's databases, directories, and files are all backed up using backup utility software. It frequently works by creating an exact clone of the entire disk. If data loss happens, the user might be able to recover the lost data using the computer's backup utility tool.All systems and applications on a computer system that keep it functional are referred to as utility software.The utility software on a computer consists of parts that help the operating system to organize, maintain, and manage its performance under all conditions.In addition to supporting the computer's architecture, this kind of software is distinct from application software, which carries out tasks for the user.Utility software may need the consent of a user with administrative rights on the computer before executing its functions or being replaced.An operating system and a collection of utility apps are often installed when manufacturers create a computer.Although the user has the option to replace or install other utility apps, this utility software is generally seen as a part of the operating system. A computer's databases, directories, and files are all backed up using backup utility software.Often, it functions by making an exact copy of the entire disk. Using the computer's backup utility program, the user may be able to retrieve lost data if it happens to them.



To know more click here-
https://brainly.com/question/2909686

#SPJ2

Write a statement that inserts the value 'wash dog' into the list activities so that it becomes the element at index 2.

Answers

I don't have much context on it or what programming language you want so...

activities[2] = 'wash dog'

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered

Answers

Asymmetric cryptography is often regarded as Public-key cryptography. It often uses pairs of keys. The process that Alex should use along with asymmetric cryptography so that John can be sure that the received document is real is Digital signature algorithm.

In asymmetric cryptography, the both pair has a public key and a private key.

The Digital Signature Algorithm is simply known to be a Federal Information Processing Standard for digital signatures.

DSA as it is often called is gotten from the Schnorr and ElGamal signature schemes.

It often used for digital signature and its verification and thus shows authenticity.

Learn more from

https://brainly.com/question/13567401

The date of creation can be added to a slide using the:

a.

"Insert" tab, "Add note" group


b.

"Edit" group of the ribbon


c.

"Insert" tab, "Text" group

Answers

Answer:

The answer to your question is Insert tab Tex group.

The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.

What is a slide?

A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.

Read more on slides here: https://brainly.com/question/11741377

#SPJ2

by what order of magnitude is something that runs in nanoseconds faster than what runs in milliseconds

Answers

A nanosecond is a billionth of a second, whereas a millisecond is a thousandth of a second. The nanosecond process is 1,000,000 times faster. Briefly explain two breakthroughs in the history of computing.

1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?

Answers

A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.

It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.

An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.

A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.

The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.

Read related link on:

https://brainly.com/question/25747300

Other Questions
1. Which of the following is NOT a positive effect of stress?AIncreased productivity (to a certain point)BFaster reaction time in dangerous situationsPrevention of diseasesDMotivation in meeting deadlines and personal goals Charlie is flying a kite one afternoon and steps on the end of the string to have hishands free to take a picture. The string is 135 feet long and forms a 68-degree anglewith the ground. How high is his kite at this time? Round to the nearest foot andenter the number only.I need the answer quick please! PLZZZ I need help on this. I have to answer it in less than 10 minutes. I have short term memory loss and forgot everything I learned on this subject Is there a difference between History and Social Studies? What is the rhyme scheme of this poem?Roses are red,violets are blue,yet every huereminds me of you.A. aaabB. abbbC. abcdD. aabb Which features do most stratovolcanoes and cinder cone volcanoes have in common?. explain how to use a graph of the function f(x) to find f(3) I'll mark u as brainliest pls help with these 2 questions Solve. 1.3=x(13.2) What is the solution to the equation? Enter your answer in the box. In which sentence does the verb agree with the subject?A. Several of my friends lives in the neighborhood.B. One of the children laugh at all my jokes.C. Neither of the boys was thinking about the possibility of rain.D.Neither of the boys were planning on doing their homework. Write each number as a logarithm with base 3.The answers has to be in this form: log ..... 3A) 0B) -2C) 4Please answer. Correct answer gets BRAINLIEST ! Please don't ignore this. what type of ions carry the impulse across the synapse from one neuron to the next ? This question has two parts. First, answer Part A. Then, answer Part B.Part AFill in the blank question.Nick wants to purchase a pair of binoculars that is on sale for $155.75. The sales tax rate in his county is 6.5%.Calculate the amount of sales tax Nick will pay on the purchase. Round to the nearest cent if necessary.sales tax: $Part BFill in the blank question.How much will Nick pay in all for the pair of binoculars after sales tax is included? Round to the nearest cent if necessary.total cost: $ Gabby read 98 pages of a book then stopped. She later decided to continue the book and read 37 more pages every day.Let d represent the number of days since Gabby decided to continue the book and p represent the total number of pages of the book she had read. 3 out of 20 apples are bad what percentage are bad A motorboat moves across a lake at a constant speed. When it begins, it is 55 km from the shore. After 12 minutes, it is 19 km from the shore. Which function describes the motorboat's distance from the shore? A. y = 12x + 19 B. y = 3x + 55 C. y = 3x + 55 D. y = 12x + 55 why might congress prefer to exercise ""fire alarm"" oversight rather than ""police patrol"" oversight? The perimeter of rectangle is 100m. If the length is decreased by 2m and the breadth is increased by 3m, The area increases by 44m. Find the length and breadth of rectangle? Phillis wheatley is celebrated in american history as: When babies are born, manyof their bones are stillcartilage. As they grow, theseharden into bone.What do we call the processof forming and hardeningbone?A. digestionB. circulationC. ossification