2. Using an iflelse construct, write a program that will calculate a person's pay based on the number of hours worked. Take note of the following: • The pay rate is Php 35.00 per hour. Any hours worked after 40 hours is paid at the rate of 1.5 times the normal hourly rate. Calculate and display the normal pay, the overtime pay, and the total pay. • You may test your program using the following test data for the number of hours worked: 35 40 50 Compile and run the program using a different test data and save the program as WorkPay
Q: What does it signify when people complain about being stuck in traffic? Discuss TCP congestion…
A: TCP Congestion Control procedures forestall clog or assist with alleviating the blockage after it…
Q: Ex. Calculate the PA for the follow assembly code which is assume the DS = 4500h, SS = 2000h, BX =…
A:
Q: public class Appliance { public int getVoltage() { return 10; } Appliance.java public interface…
A:
Q: Explain the following paragraph (the 8086 mic
A: Q4 Explain the following paragraph (the 8086 microprocessor works only with 64KB, in the same time…
Q: what the term "salt" implies in the context of cryptography You should talk about how passwords are…
A: Introduction: Cryptography is the process of converting data into scrambled code that can be decoded…
Q: Computer science Why are mobile systems becoming more important?
A: Introduction: Because it is a phone that can be used while moving and can access a cellular phone…
Q: 04) Show in detail steps how the following numbers will be inserted to a heap, assuming it is…
A: Find the required heap with steps given as below :
Q: You've been hired to create a hospital patient control program, and you've been given all of the…
A: Software : Software Requirements Specification (SRS) A programme system requirements specification…
Q: One may wonder how a distributed denial-of-service assault could be coordinated by a single person.
A: DENIAL OF SERVICE ASSAULT DISTRIBUTED: DDoS attacks are a deliberate attempts to interrupt the…
Q: When it comes to battery use, is an OLED or LCD display better? Give reasons for your conclusions.
A: OLED panels are also well recognized for its ability: To assist devices preserve battery life by…
Q: Are there any applications where a dot-matrix printer is more suited than another form of printer,…
A: A Dot Matrix Printer is the oldest type of printer and one of the good examples of computer printer…
Q: 22,Find the brands of type Audi
A: Answer: Note: As per guideline we are not allowed to answer multiple questions in one answer so I…
Q: Professionalism is defined as: What can you tell us about its significance in the field of…
A: Professionalism:Define professional as a member of a profession or someone who makes a livelihood…
Q: What is the difference between the seekg and seekp functions?
A: Intro Both seekg() and seekp() are File Handling in C++ methods, and they are highly significant and…
Q: Discuss who owns and why they possess electronic mail networks.
A: Intro Discuss who owns and why they possess electronic mail networks.
Q: Write a command to modify the permissions of all the files and directories in the XYZ directory…
A: Let's see the solution in the next steps
Q: Preparing feasibility studies, which include technical, economic, legal, operational, and schedule…
A: Introduction: SDLC is a systematic approach for developing software packages that ensures the…
Q: Given a heap with more than ten nodes, which of the following statements is wrong? O a. None of the…
A:
Q: The UNIX kernel plays a critical function. Explain why this is the case and how it differs from…
A: INTRODUCTION: Here we need to tell The UNIX kernel plays a critical function. Explain why this is…
Q: B3. Convert-103.125 to IEEE floating point format.
A:
Q: oud computing affecting colla
A: Introduction: Cloud Computing Affecting Collaboration
Q: A binary tree is a rooted tree in which each node has at most two children. Show that in any binary…
A: The question is: A binary tree is a rooted tree in which each node has at most two children. Show…
Q: Computer science WHAT ARE THE BENEFITS OF USING CRYPTOCURRENCY PRACTICALLY?
A: Introduction: Cryptography is a means of securing communication in the presence of malicious third…
Q: Peer-to-peer sharing may be blocked by an intrusion detection or intrusion prevention system. Is…
A: Definition: Unwanted access through peer-to-peer sharing may be blocked using an intrusion detection…
Q: Describe the three types of computer programmes listed below, as well as their performance…
A: Introduction: A real-time application (RTA) is a software programme that operates in a time period…
Q: Write a Python program that will ask a user for a number, then determine whether it is odd or even.…
A: Even numbers are those numbers that are completely divisible by 2. Odd numbers are those numbers…
Q: What are the three main differences between TCP and UDP?
A:
Q: Implementation with Results(Using Prolog) (Magic Square Problem)
A: The magic square is a square matrix, whose order is odd and where the sum of the elements for each…
Q: Examine how inheritance encourages software reuse, saves time during programme development, and…
A: Introduction: Inheritance enables developers to build subclasses that reuse code that has previously…
Q: In the next ten years, what key computer hardware breakthroughs do you expect to see, and why do you…
A: Definition: Computer hardware is a collection of physical computer components. Among them are the…
Q: Compare and contrast the technical and business aspects of cloud computing with utilities
A: The question is to Compare and contrast the technical and business aspects of cloud computing with…
Q: Given array A = [145, 251, 283, 960, 350, 231, 520, 152, 412, 280]. Do the following tasks. %3D a.…
A: Answer is given below-
Q: Consider this Preference Voting Table from 50 voters and 4 candidates Rank / Number of 19 14 10 7.…
A: Find the answer with reason given as below : As per company guidelines we are supposed to answer…
Q: What are the distinctions between a type 1 and a type 2 hypervisor?
A: Distinction between type 1 and type 2 Hypervisor
Q: What is congestion management in a computer network, and why is it important? Define end-to-end…
A: Computer Network: Computer networking is the sharing of data and resources between networked…
Q: What role does the kernel mode play in computer operating systems?
A: Answer:
Q: Computer science How does exploratory testing differ from other testing techniques?
A: Introduction: Exploratory testing is a method of dealing with software testing that is commonly…
Q: When do we use the split-by clause and what does it mean?
A: Introduction: The split-by clause is used to specify which section of the list will be used to…
Q: Man-in-the-middle (MITM) attacks: how can they be avoided? Present your answer in stages.
A: Man-in-the-middle (MITM) attacks: Using caution while connecting to WIFI networks that are not…
Q: Computer science Discuss the link between information hiding as a property of successful modularity…
A: Introduction: The concept of functional dependencies arose as a result of modularity and the concept…
Q: So, what's the big deal with data encryption anyway?
A: Data encryption: The process of converting plaintext data into ciphertext is known as data…
Q: First, we need to grasp what RAID 5 is. Is there a case in which RAID 5 is superior than other…
A: What is RAID 5 : RAID 5 is a redundant array of independent disks configuration that uses disk…
Q: Explain briefly the apps that DHL uses for continuous improvement. Please specify which of the SLC…
A: System Life-Cycle(SLC): The methodology oversees all aspects of the framework, including, but not…
Q: 3. Write a C program containing a recursive function that will get the whole number quetient result…
A: Find the required code in C given as below and output :
Q: Write an efficient program that allows a user to input a set of activities, along with the starting…
A:
Q: At this moment, it is not clear how much of an influence cloud computing has had on cooperation.
A: Cloud based infrastructure has gained a lot popularity recently.
Q: ork congestion and improve network performance, write a succinct report highlighting the five most…
A: Introduction: Below the a succinct report highlighting the five most critical issues to evaluate.
Q: Were there any steps that you think are important to keep your data safe? if both data integrity and…
A: The process of preventing unauthorized access to and corruption of data at every stage of its…
Q: When it comes to the term "embedded system," what is it? In what ways does it differ from a standard…
A: We need to discuss embedded system and how does it differ from a standard computer.
Q: Identify four types of security threats.
A: Intro The Four Primary Types of Network Threats Unstructured threats. Structured threats.…
C++ language
Step by step
Solved in 3 steps with 1 images
- FOLLOW THE TEMPLATE GIVEN!! Use the class conversion guide given below in creating the program. Do not use any advanced methods other than the given class conversion guide Problem: Create a java program that will ask the weight (kg) and height (cm) of the user, the program will calculate and display the user's BMI status. If the BMI of a person is greater than or equal to 30, display “Obese”, if the BMI greater than or equal to 25, display “Overweight”, and if the BMI is greater than or equal to 18.5, display “Normal”, else display “Underweight”.When you use a mortgage to purchase a home, the lending institution effectively owns the home. You buy back part ownership in the home with each monthly payment. The part you have bought back is your equity in the home. If the mortgage amount is P dollars, the monthly interest rate is r as a decimal, and the term of the mortgage is t months, then your equity after k payments is E(k) = P((1 + r)k − 1) (1 + r)t − 1 dollars. In this exercise, assume that the mortgage amount is $200,000, the APR is 6% so r = .06/12 and the term of the loan is 30 years (360 months). (a) Find a formula for the equity. (b) Make a graph of the equity over 360 months, the term of the loan. (c) Does the graph show that you have half-ownership in the home halfway through the term of the mortgage? Halfway through the term of the mortgage corresponds to k1 = _______ payments. From the graph, we see that E(k1) is ________ half of the mortgage amount, so we _______ have half-ownership in the home…Write multiple if statements:If carYear is before 1967, print "Probably has few safety features." (without quotes).If after 1971, print "Probably has head rests.".If after 1991, print "Probably has electronic stability control.".If after 2000, print "Probably has airbags.".End each phrase with period and newline. Ex: carYear = 1995 prints:Probably has head rests. Probably has electronic stability control. public class SafetyFeatures {public static void main (String [] args) {int carYear; carYear = 2001;
- When you borrow money to buy a house, a car, or for some other purpose, you repay the loan by making periodic payments over a certain period of time. Of course, the lending company will charge interest on the loan. Every periodic payment consists of the interest on the loan and the payment toward the principal amount. To be specific, suppose that you borrow $1,000 at an interest rate of 7.2% per year and the payments are monthly. Suppose that your monthly payment is $25. Now, the interest is 7.2% per year and the payments are monthly, so the interest rate per month is 7.2/12 = 0.6%. The first months interest on $1,000 is 1000 0.006 = 6. Because the payment is $25 and the interest for the first month is $6, the payment toward the principal amount is 25 6 = 19. This means after making the first payment, the loan amount is 1,000 19 = 981. For the second payment, the interest is calculated on $981. So the interest for the second month is 981 0.006 = 5.886, that is, approximately $5.89. This implies that the payment toward the principal is 25 5.89 = 19.11 and the remaining balance after the second payment is 981 19.11 = 961.89. This process is repeated until the loan is paid. Write a program that accepts as input the loan amount, the interest rate per year, and the monthly payment. (Enter the interest rate as a percentage. For example, if the interest rate is 7.2% per year, then enter 7.2.) The program then outputs the number of months it would take to repay the loan. (Note that if the monthly payment is less than the first months interest, then after each payment, the loan amount will increase. In this case, the program must warn the borrower that the monthly payment is too low, and with this monthly payment, the loan amount could not be repaid.)Write a simple payroll program that will display employee’s information. Refer to the UMLClass Diagram for the names of the variable and method. This should be the sequence of theprogram upon execution:a. Prompt the user to input the name of the employee.b. Prompt the user to select between full time and part time by pressing either F (fulltime) or P (part time).c. If F is pressed, ask the user to type his monthly salary. Then, display his name andmonthly salaray.d. If P is pressed, ask the user to type his hourly rate and hours worked separated by aspace. Then display his name and wage.Write a whole program to ask the user for his/her name, age, and gpa, then print on the screen "Hello NAME!, you are AGE years old and your Grade Point Average is GPA.", where NAME, AGE, and GPA are replaced by the values that the user typed.User data should be stored in a struct variable of type userType, which has three components: name of type string, age of type int, and gpa of type double. Write a program that reads students’ names followed by their test scores. The program should output each student’s name followed by the test scores and the relevant grade. It should also find and print the highest test score and the name of the students having the highest test score. Student data should be stored in a struct variable of type studentType, which has four components: studentFName and studentLName of type string, testScore of type int (testScore is between 0 and 100), and grade of type char. Suppose that the class has 20 students. Use an array of 20 components of type studentType.…
- using Java Write a grading program for a class with the following grading policies:1. There are two quizzes, each graded on the basis of 10 points.2. There is one midterm exam and one final exam, each graded on the basis of 100 points.3. The final exam counts for 50% of the grade, the midterm counts for 25%, and two quizzes each count for 12.5%. (Do not forget to normalize the quiz scores. They should be converted to a percent before they are averaged in.)Any grades of 90 or more is an A, any grades of 80 or more (but less than 90) is a B, any grades of 70 or more (but less than 80) is a C, any grades of 60 or more (but less than 70) is a D, and any grades below 60 is an F.The program will read in students’ scores from an input file named “input.txt” and output the students’ records to a file named “output.txt”, which consist of student’s ID, name, two quizzes and two exam scores as well as the students’ average score for the course and final letter grade. Define and use a class for a…For this assignment, write a program named PizzaPrices that prompts the user to make a choice for a pizza size - S,M, L, or X - and the number of pizza the user wants to order. The price for different size pizzas are $6.99, $8.99, $12.5, and $15.0 respectively. There is also a discount based on the number of pizza ordered: no discount for one pizza, 10% discount for 2 pizzas, 15% discount for 3-5 pizzas, and 20% for more than 5 pizzas. Display a full accounting of the transaction, similar to the sample screenshot. Please make sure you use parallel arrays and range match in your solution.Rewrite each of the following statements in the form “If A, then B.”a. Candidate Lu winning the election will be a sufficient condition for property taxes to increase.b. The user clicks Pause only if the game level changes.c. The components are scarce, therefore the price increases.d. Healthy hair is a necessary condition for good shampoo.
- Write a program that computes the cost of painting and installing carpet in aroom. Assume that the room has one door, two windows, and one bookshelf. Your program must do the following:a. Prompts the user to enter, in feet, the length, width, and height of aroom. Read the dimensions of the room.b. Prompts the user to enter the widths and heights, in feet, of the door,each window, and the bookshelf. Read these quantities.c. Prompts the user to enter the cost, per square foot, of painting thewalls. Read these quantities.d. Prompts the user to enter of cost, per square foot, of installing carpet.Read these quantities.A student makes the following argument. if I receive a good grade, the instructor teaches well. I didn't receive a good grade. Therefore, the instructor didn't teach well. is the student's argument valid? Let A be the statement, "I receive a good grade" and B be the statement, " the instructor teaches well." Then, rewrite the above paragraph using A and B.Write the following compound statement in terms of the simple statements p, q, and r. "I go to office hours and ask questions, and my professor does not remember me." p: I go to office hours. q: I ask questions. r: My professor remembers me.