• Input a list of employee names and salaries stored in parallel arrays. The salaries should be floating point numbers in increments of 100. For example, a salary of $36,000 should be input as 36.0 and a salary of $85,900 should be input as 85.9. Find the mean (average) salary and display the names and salaries of employees who earn within a range of $5,000 from the mean. In other words, if the mean salary is $45,000, all employees who earn between $40,000 and $50,000 should be displayed in python

Answers

Answer 1

Using the knowledge in computational language in python it is possible to write a code that Input a list of employee names and salaries stored in parallel arrays.

Writting the code:

BEGIN

DECLARE

employeeNames[100] As String

employeeSalaries[100] as float

name as String

salary, totalSalary as float

averageSalary as float

count as integer

x as integer

rangeMin, rangeMax as float

INITIALIZE

count = 0;

totalSalary =0

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

//Read Employee data

WHILE name != “*” AND count < 100

employeeNames [count] = name

DISPLAY“Enter salary for “ + name + “.”

READ salary

employeeSalaries[count] = salary

totalSalary = totalSalary + salary

count = count + 1

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

END WHILE

//Calculate average salary with mix , max range

averageSalary = totalSalary / count

rangeMin = averageSalary - 5

rangeMax = averageSalary + 5

DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”

See more about python at brainly.com/question/18502436

#SPJ1

 Input A List Of Employee Names And Salaries Stored In Parallel Arrays. The Salaries Should Be Floating

Related Questions

You are a systems analyst. Many a time have you heard friends and colleagues complaining that their jobs and businesses are being negatively impacted by e-commerce. As a systems analyst, you decide to research whether this is true or not. Examine the impact of e-commerce on trade and employment/unemployment, and present your findings as a research essay.

Answers

E-commerce, the online buying and selling of goods and services, has significantly impacted trade, employment, and unemployment. This research essay provides a comprehensive analysis of its effects.

What happens with  e-commerce

Contrary to popular belief, e-commerce has led to the growth and expansion of trade by breaking down geographical barriers and providing access to global markets for businesses, particularly SMEs. It has also created job opportunities in areas such as operations, logistics, customer service, web development, and digital marketing.

While certain sectors have experienced disruption, traditional businesses can adapt and benefit from e-commerce by adopting omni-channel strategies. The retail industry, in particular, has undergone significant transformation. E-commerce has empowered small businesses, allowing them to compete with larger enterprises and fostered entrepreneurial growth and innovation. However, there have been job displacements in some areas, necessitating individuals to transition and acquire new skills.

Read mroe on  e-commerce here  https://brainly.com/question/29115983

#SPJ1

education is better than money give point​

Answers

Answer:

yes education is better than money

Explanation:

money isn't everything



How do a write 19/19 as a whole number

Answers

As a whole number it is 1.0.

Answer:

1.0

Explanation:

You divide 19 by 19 and get 1

When should you create an outline?
OA. While you are creating your slides
OB. Before you create your first slide
O C. After you create your last slide
O D. After you have presented your slide presentation


Help need help now please!!!!!!!!

Answers

Answer:custom slide show

Explanation:

Drag the tiles to the correct boxes to complete the pairs.
Match each computer field with its appropriate description.
Tiles
information support and services
network systems
programming and software development
web and digital communications
Pairs
creating interactive materials
arrowBoth
providing technical assistance to users
arrowBoth
designing and developing applications
for an organization's use
arrowBoth
developing and implementing an
organization's technology infrastructure
arrowBoth

Answers

The matchup are:

information support and services - providing technical assistance to usersnetwork systems - creating interactive materialsprogramming and software development - designing and developing applications for an organization's useweb and digital communications -developing and implementing anorganization's technology infrastructure

What is network system?

A network is known to be made up of a set of computers, servers, network devices, and other devices that are linked so that it can allow data sharing.

Therefore, The matchup are:

information support and services - providing technical assistance to usersnetwork systems - creating interactive materialsprogramming and software development - designing and developing applications for an organization's useweb and digital communications -developing and implementing anorganization's technology infrastructure

Learn more about network systems from

https://brainly.com/question/1326000

#SPJ1

Firework: tool to design UX

Perl: programming language

Flash: software to design UI

Oracle: database software

Where would you place the change score by block if you want the score to change each time the monkey touches the banana?
on start
set background color to
set mysprite •
to sprite

of kind Player
set
move
to sprite
mySprite with buttons of kind Food
on sprite of kind Player overlaps


banana♥
position to x pick randon (
ornersprite
of lndlEoodl
to 169 y pick random 10 to
A. Inside the on overlap block at the top
B. Outside of the on start block and the on overlap block
C. Inside the on start block at the top
D. Inside the on start block at the bottom

Answers

To ensure that the score changes each time the monkey touches the banana, you would place the change score block inside the on overlap block is  A. Inside the on overlap block at the top

What is the block  about?

This habit, at any time the fairy of kind Player overlaps accompanying the joker fairy, how things stand will be transformed.

Placing the change score block except for the on ride block or inside the on start block would not guarantee that how things stand changes accompanying each touch of the joker.

Learn more about  block from

https://brainly.com/question/28753487

#SPJ1

(k + 3)by the power of 3​

Answers

Answer:

k^3 + 9k^2 +27k +27

Explanation:

hope this helps

(k + 3)by the power of 3

Why would Anton perform encryption on the hard drive in his computer?
O The drive contains non-sensitive data.
The operating systems in a Windows machine need protection.
There are special programs on his computer he doesn't want to be deleted.
O There is a large amount of sensitive information on his computer.

Answers

If Anton had a lot of sensitive material on his computer, he would perform encryption on the hard drive. Data is transformed into a hidden code that can only be read by encryption.

What does hard drive encryption serve?

The information on an encrypted hard disk cannot be accessed by anybody without the required key or password. This adds an extra layer of security against hackers and other online threats and can help prevent unauthorized individuals from accessing data.

What is encryption in operating systems?

The process of securely scrambling (or encrypting) individual files and folders, entire disks, and data exchanges between devices is known as encryption.

To know more about encryption visit:-

https://brainly.com/question/17017885

#SPJ1

if a file with the specified name already exists when the file is opened and the file is opened in 'w' mode, then an alert will appear on the screen.

Answers

On the off chance that a document with the predetermined name as of now exists when the record is opened and the document is opened in 'w' mode, then, at that point, an alarm will show up on the screen. A piece of data is copied into the program when it is read from a file. When a file is closed, the program and the file lose communication.

What is the name of the procedure for obtaining data from a file?

In figuring, information recuperation is a course of recovering erased, out of reach, lost, defiled, harmed, or designed information from optional capacity, removable media or records, when the information put away in them can't be gotten to in a standard manner.

Which four kinds of data recovery are there?recovery of logical data.Physical Recovery of DataRecovery of Data Right AwayContinuous security for data.

To learn more about Recovery of Data here

https://brainly.com/question/28850135

#SPJ1

Suppose the state machine shown below is in State C and receives the string 100010. What is its ending
state?

Suppose the state machine shown below is in State C and receives the string 100010. What is its ending

Answers

The given state machine is in State C and receives the string 100010, the ending state of the state machine will be State B (option B).

What is the state machine? A state machine is a mathematical model of a system. It is an abstract machine that can be in exactly one of a finite number of states at any given time. State machines are often used for stateful entities such as computers, processors, and other electronic devices.

How to solve the problem? We start from the starting state State A and follow the given string 100010.

State A: The first symbol of the string is 1, so we move from state A to state B.

State B: The second symbol of the string is 0, so we move from state B to state D.

State D: The third symbol of the string is 0, so we move from state D to state E.

State E: The fourth symbol of the string is 0, so we move from state E to state F.

State F: The fifth symbol of the string is 1, so we move from state F to state B.

State B: The sixth and last symbol of the string is 0, so we remain in state B, and it's our ending state. Therefore, the ending state of the state machine will be State B.

For more questions on processors, click on:

https://brainly.com/question/614196

#SPJ8

What is your work solutions?

Answers

Answer:

Explanation:

< xlink:href="https://www.worktime.com/employee-time-tracking-software">employee tracking</link> worktime solutions is the best!

user intent refers to what the user was trying to accomplish by issuing the query

Answers

Answer:

: User intent is a major factor in search engine optimisation and conversation optimisation. Most of them talk about customer intent ,however is focused on SEO not CRO

Explanation:

Need help with this python question I’m stuck

Need help with this python question Im stuck
Need help with this python question Im stuck
Need help with this python question Im stuck

Answers

It should be noted that the program based on the information is given below

How to depict the program

def classify_interstate_highway(highway_number):

 """Classifies an interstate highway as primary or auxiliary, and if auxiliary, indicates what primary highway it serves. Also indicates if the (primary) highway runs north/south or east/west.

 Args:

   highway_number: The number of the interstate highway.

 Returns:

   A tuple of three elements:

   * The type of the highway ('primary' or 'auxiliary').

   * If the highway is auxiliary, the number of the primary highway it serves.

   * The direction of travel of the primary highway ('north/south' or 'east/west').

 Raises:

   ValueError: If the highway number is not a valid interstate highway number.

 """

 if not isinstance(highway_number, int):

   raise ValueError('highway_number must be an integer')

 if highway_number < 1 or highway_number > 999:

   raise ValueError('highway_number must be between 1 and 999')

 if highway_number < 100:

   type_ = 'primary'

   direction = 'north/south' if highway_number % 2 == 1 else 'east/west'

 else:

   type_ = 'auxiliary'

   primary_number = highway_number % 100

   direction = 'north/south' if primary_number % 2 == 1 else 'east/west'

 return type_, primary_number, direction

def main():

 highway_number = input('Enter an interstate highway number: ')

 type_, primary_number, direction = classify_interstate_highway(highway_number)

 print('I-{} is {}'.format(highway_number, type_))

 if type_ == 'auxiliary':

   print('It serves I-{}'.format(primary_number))

 print('It runs {}'.format(direction))

if __name__ == '__main__':

 main()

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

A network administrator determines who may access network resources by assigning users
ONICS
OUTPS
O permissions
O nodes

Answers

Answer: permissions

Explanation:

Users permissions is defined as the authorization that is given to users which in turn, allows such individual(s) to be able to have access to certain resources on a particular network.

Therefore, the user permission can be utilized by a network administrator so tht he or she can determines who can have access to network resources.

Convert the following to CNF: S→SS|AB|B A→aAAa B→ bBb|bb|Ꜫ C→ CC|a D→ aC|bb

Answers

To convert the given grammar into Chomsky Normal Form (CNF), we need to rewrite the rules and ensure that each production has only two non-terminals or one terminal on the right-hand side. Here is the converted CNF grammar:

1. S → SS | AB | B

2. A → AA

3. A → a

4. B → bBb | bb | ε

5. C → CC | a

6. D → aC | bb

Explanation:

1. The production S → SS has been retained as it is.

2. The production A → aAAa has been split into A → AA and A → a.

3. The production B → bBb has been split into B → bB and B → b.

4. The production B → bb has been kept as it is.

5. The production B → ε (empty string) has been denoted as B → ε.

6. The production C → CC has been retained as it is.

7. The production C → a has been kept as it is.

8. The production D → aC has been kept as it is.

9. The production D → bb has been kept as it is.

In summary, the given grammar has been converted into Chomsky Normal Form (CNF), where each production has either two non-terminals or one terminal on the right-hand side. This form is useful in various parsing and analysis algorithms.

For more questions on parsing, click on:

https://brainly.com/question/13211785

#SPJ8

Answer:

Explanation:

To convert the given grammar to Chomsky Normal Form (CNF), we need to follow a few steps:

Step 1: Eliminate ε-productions (productions that derive the empty string).

Step 2: Eliminate unit productions (productions of the form A → B).

Step 3: Convert long productions (productions with more than two non-terminals) into multiple productions.

Step 4: Convert terminals in remaining productions to new non-terminals.

Step 5: Ensure all productions are in the form A → BC (binary productions).

Applying these steps to the given grammar:

Step 1: Eliminate ε-productions

The given grammar doesn't have any ε-productions.

Step 2: Eliminate unit productions

The given grammar doesn't have any unit productions.

Step 3: Convert long productions

S → SS (Remains the same)

S → AB

A → aAAa

B → bBb

B → bb

C → CC

C → a

D → aC

D → bb

Step 4: Convert terminals

No changes are needed in this step as all terminals are already in the grammar.

Step 5: Ensure binary productions

The given grammar already consists of binary productions.

The converted grammar in Chomsky Normal Form (CNF) is:

S → SS | AB

A → aAAa

B → bBb | bb

C → CC | a

D → aC | bb

Note: The original grammar didn't include the production rules for the non-terminals 'S', 'C', and 'D'. I assumed the missing production rules based on the provided information.

A team of eye surgeons has developed a new technique for a risky eye operation to restore the sight of people blinded by a rare disease. Under the current, old method of operation, it is known that 30% of the patients that undergo the surgery regain their eyesight.
The surgeons complete 220 operations using the new method, with 84 of the surgeries resulting in the restoration of eyesight in the patients. Can the surgeons claim that the new method is better than the old method? Test the results at the 5% level of significance and the 1% level of significance.
(a) State the null and the alternative hypothesis.

Answers

The most popular and frequently used laser refractive procedure for treating vision issues is LASIK eye surgery.

Does LASIK hurt afterward?

The LASIK eye treatment is virtually painless.Just before the treatment, your surgeon will put numbing eye drops in both of your eyes. You might still feel some pressure while the process continues, but you shouldn't feel uneasy.

What LASIK surgery disadvantages exist?

Risks. It is extremely rare for problems to cause visual loss. However, some LASIK side effects are rather common, particularly dry eyes and momentary vision problems like glare. Due to the fact that they frequently resolve after a few weeks or months, few people believe that these are long-term problems.

To know more about LASIK visit:

https://brainly.com/question/29328575

#SPJ4

In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.

Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.

Ex: If the input is:

apples 5
shoes 2
quit 0
the output is:

Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy

Answers

Answer:

Explanation:

import java.util.Scanner;

public class MadLibs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String word;

       int number;

       do {

           System.out.print("Enter a word: ");

           word = input.next();

           if (word.equals("quit")) {

               break;

           }

           System.out.print("Enter a number: ");

           number = input.nextInt();

           System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");

       } while (true);

       System.out.println("Goodbye!");

   }

}

In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.

Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.

how do I edit my question

Answers

Answer:

There is a little slanted pen in the bottom right corner. When you click in it, you'll be able to edit and save your new answer/question.

Explanation:

Jamal wants to download a software program that is free to use. What should he do?

Jamal should download the software from ??? and should then ???.
The Free website] install the software]
a reputable website] scan the download for viruses]
the first pop-up] copy the download on a flesh drive]

please just please help me

Answers

Answer:

The Free website] install the software]

a reputable website] scan the download for viruses]

THIS is the correct answer I think

Complete the code to generate a pseudo-random integer between 1 and 44, including the possibility of both 1 and
44.
>>> import secrets
>>> secret

Answers

Answer:

Explanation:

.randbelow(44) + 1

The code above uses the secrets module, which is a part of the Python standard library and uses a cryptographically strong random number generator. The randbelow() function generates a random integer below the number given as an argument. In this case, the argument is 44, which means that the function will generate a random integer between 0 and 43. To get a random integer between 1 and 44, we add 1 to the result of the function.

help need urgently answer ​

help need urgently answer

Answers

Answer:

Explanation:

b

The answer is b, hope this helps!

Write an expression that evaluates to True if the string associated with s1 is greater than the string associated with s2

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that takes two string parameters and compares the lengths of both strings. If the string in variable s1 is greater then the function returns True, otherwise the function returns False. A test case has been provided and the output can be seen in the attached image below.

def compareStrings(s1, s2):

   if len(s1) > len(s2):

       return True

   else:

       return False

print(compareStrings("Brainly", "Competition"))

Write an expression that evaluates to True if the string associated with s1 is greater than the string

Vladimir is reworking an old slideshow. He needs to delete some of the text, combine or summarize other parts, and create a few new slides as well. He wants to only look at the text. Is there any easy way to do that?

Answers

Answer:

Outline View

Explanation:

Most slideshow software has an Outline view that shows only the text of each slide without any graphics or other distracting elements. In this view, Vladimir can easily edit, delete, and summarize the text without getting distracted by other elements.

Select the best answer for the question.
5. To save time, Carlos is estimating the building as one large room for purposes of calculating heat loss. This is called
A. envelope.
B. full space.
C. design.
D. wall-less.

Answers

B is the answer I think

in windows, the feature has the sole purpose of keeping the user from running programs that could pose a potential threat by escalating privileges to that of administrator.

Answers

In Windows, the UAC feature has the sole purpose of keeping the user from running programs that could pose a potential threat by escalating privileges to that of Administrator.

A person who oversees an organization's smooth operation is known as an administrator. Depending on the type of business, group, or body they are employed by, they may have different responsibilities. Above all, administrators must be well-organized and able to communicate effectively.

The individual a court appoints to manage a decedent's estate is also referred to by this word. In these situations, the decedent either passed away without leaving a will or the will failed to name an executor. If the designated executor is unable or unwilling to carry out their duties, the court may also nominate an administrator.

An administrator may be chosen by the court to oversee a company's operations. Specifically, to handle the affairs of a company that has run into financial trouble.

Here you can learn more about administrator in the link brainly.com/question/329994801

#SPJ4

in media literacy,
how does media influence public? and the press

⚫ analyze or compare the influences of social media
⚫ analyze the ethics or journalist, news outlets, etc​

Answers

what is mean by computers

Which octet of the subnet mask 255.255.255.0 will tell the router the corresponding host ID?

Answers

Answer: The last octet

Explanation: The last octet of the subnet mask will tell the router the corresponding host ID.

The last octet is the octet of the subnet mask 255.255.255.0 will tell the router the corresponding host ID.

What is octet in IP address?

An octet is a decimal value between 0 and 255, and it is referred to as x in the IPv4 component of the address. The octets are separated by periods. The IPv4 portion of the address must contain three periods and four octets.

People may have also heard people refer to the four digits that make up an IP address as "octets." An octet is the correct term to describe the four different digits that make up an IP address.

In subnetting, the third octet is used to identify particular subnets of network 150.150.0.0. Each subnet number in the example in the image has a different value in the third byte, indicating that it is a distinct subnet number.

Thus, it is last octet.

For more details about octet in IP address, click here:

https://brainly.com/question/10115477

#SPJ2

What are some of the issues that create conflict in the future and why?

Answers

Answer:

Some of the reasons for future conflict between nations could be:

Explanation:

1: water wars, this is something possibly brewing between Ethiopia and Egypt with Sudan being on Ethiopia's side as the dam Ethiopia plans to build which would take a lot of Egypt's water would also power Sudan with electricity. Oh and something frightening could happen as China is damming India's major rivers which could lead to a world war or India becoming a Chinese vassal and massive amounts of displaced and starving people either way.

2: a global economic drop: this will severely impact the economies of many countries, especially countries in the middle of industrialization in Africa which are very fragile, I will give it a few decades to fully blow up there.

3:Competing interests, ethnic and international for example in Central Asia there are a lot of competing influences and something could happen there but thing is wars because of what I just mentioned are already happening, look at Syria with the "moderate" rebels, between Armenia and Azerbaijan we have had a conflict which had several geopolitical implications and reasons it went as it did, currently Libya is in a proxy war too, and recently Ethiopia has had conflicts within a Northern region which are heavily ethnic-based and could lead to an Ethiopian civil war if the government does not manage to solve this, which would also mean the first war I mentioned would be delayed or prevented trough another bloody war.

4: an incident: many wars have started because of incidents escalating, so watch out for it, for example earlier this yea- oh it's been a year already since Qasem Soleimani was assasinated , however luckily nothing happened then.

Either way we're gonna have more wars before world peace and mercenaries are becoming more popular like Turkey and more countries are using in proxy wars and another thing you should watch out for is the first use of robots in war and hope that they distinguish between regular humans and soldiers and don't commit atrocities, happy 2021!

Mobile legends new hero in october aamon is coming in october 26th

Answers

Answer:

yellow

Explanation:

How can an Excel table be added to a Word document? Check all that apply

Answers

by using the Insert Object dialog box
by linking an Excel table to a Word document
by drawing the Excel table in the Word document
by using the Convert Text to Table option in Word
by inserting Quick Tables into the Word document


The answers will be A & B.
Other Questions
a nurse receives an order to administer castor oil to a patient. which action by the nurse is correct? Mrs. Ross's weekly pay at the record store is directly proportional to the number of hours she works. Her pay is $174 for 24 hours of work. Find her pay for 40 hours of work. The chief prediction of the sensory exploitation hypothesis for female choice is that:A. female preference for a male trait evolves before the male trait itself.B. the males with the best ornaments or advertisements provide the best genetic benefits to the female's offspring.C. males with the best ornaments or advertisements provide nutrients, protection, or some other benefit to females.D. B and C are both correct. There are ten pieces of pizza. Anthony ate 1 16 of the pizza for dinner. He ate 7 20 of the pizza for a bedtime snack. How much of the pizza has he eaten in all? que es el comunismo y sus logros en el mundo commonly measure website performance by tracking visits, visitor traffic, and , the amount of time per month visitors spend on their website. The area, Acm, of a patch of mould is measured daily. The area, n days after the measurements started, is given by the formula A = Asub0b^n". When n = 2, A = 1.8 and when n = 3, A = 2.4. Find the value of b. the ethical principle of universalism states that if an action is not right for all situations, then it is not right for any situation. BRAINLIEST!!!!!!BRAINLIEST!!!!BRAINLIEST!!!!BRAINLIEST!!!BRAINLIEST!!!!!BRAINLIEST!!!!BRAINLIEST!!!!BRAINLIEST !!!!!!! Which statements concerning cholesterol is false? It is a part of every cell it is an essential nutrient it is a component of bile it can be made by the body?a. Trueb. False just launched a firm in the restaurant supply industry. on the day the company was launched, andy issued a press release, indicating that the vice president of brinker international, a highly respected casual restaurant company, had agreed to serve on his board of directors. andy knows that such a high quality appointment will send an important message to his potential clientele. this phenomenon is referred to as: the nurse is caring for a couple during their initial visit to a fertility clinic after being unable to conceive for 2 years. which assessment questions would be appropriate to determine an alternate cause of infertility? Coding1. The sum of the letters of certainwords are given below:SHARE = 114 TAPE = 8PLATEAU = 13What is the sum of the letters of thefollowing words?(a) BIN(b) MOUNTAIN High tolerance for risk leads to a culture with low ethical standardsSelect one:TrueFalse For a semiannual bond, what is EAR if APR is 11%? For a semiannual bond, what is APR if EAR is 11%? knowing that mr. smith started swimming last week, what should you tell him about protecting his sutures? ffs uses apis which include all except: select one: a. read() b. move() c. write() d. open() clear my choice What 3 things make a reliable source? Prina i a databae manager. Prina i allowed to add new uer to the databae, remove current uer and create new uage function for the uer. Prina i not allowed to read the data in the field of the databae itelf. Thi i an example of: Drag each label to the correct category. Identify each source as a primary or secondary source.