Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75).

Answers

Answer 1

Answer:

Following is the program in the python language

hr = input("input hours:") #Read input by user

h1 = float(hr)

rate =input("Input Rate:") #Read RATE BY USER

r1 = float(rate) #CONVERT INTO FLOAT

if h1 <= 40: #check condition

   t=h1 * r1

   print (t) #DISPLAY

else :#else block

   t1=(40 * r1) + (h1 -40) * r1 * 1.5

   print('The pay is :')

   print(t1)#DISPLAY

Output:

input hours:45

Input Rate:10.50

The pay is :

498.75

Explanation:

Following are the description of program

Read the value of hour in the "hr" variable and convert into the float value in the "h1" variable .Read the value of rate in the " rate" variable and convert into the float value in the "r1" variable .After that check the condition of hour if block if the hour is less then or equal to 40 then it multiplied h1 *t1 otherwise else block will be executed and print the value of pay .


Related Questions

Without using parentheses, enter a formula in C4 that determines projected take home pay. The value in C4, adding the value in C4 multiplied by D4, then subtracting E4.

HELP!

Answers

Parentheses, which are heavy punctuation, tend to make reading prose slower. Additionally, they briefly divert the reader from the core idea and grammatical consistency of the sentence.

What are the effect of Without using parentheses?

When a function is called within parenthesis, it is executed and the result is returned to the callable. In another instance, a function reference rather than the actual function is passed to the callable when we call a function without parenthesis.

Therefore, The information inserted between parenthesis, known as parenthetical material, may consist of a single word, a sentence fragment, or several whole phrases.

Learn more about parentheses here:

https://brainly.com/question/26272859

#SPJ1

consider this list of numbers: 9 3 6 8 4 7. after three comparisons have been made the list is 3 6 9 8 4 7 . which algorithm is being applied

Answers

Answer: The algorithm being applied is "Insertion Sort".

Explanation:

Insertion sort works by iteratively inserting each element of the input list into its proper place in a growing sorted list. In each iteration, the algorithm selects the first unsorted element and compares it with each element in the sorted portion of the list until it finds its correct position. It then inserts the element into the sorted portion of the list and moves on to the next unsorted element.

In the given example, the first three elements of the list (9, 3, and 6) are compared and swapped to produce the partially sorted list 3 9 6 8 4 7. Then, the next unsorted element (6) is compared with the sorted elements (3 and 9) and inserted in its correct position between 3 and 9, resulting in the list 3 6 9 8 4 7.

how would you feel if the next version of windows becomes SaaS, and why?

Answers

If the next version of Windows becomes SaaS, SaaS or Software as a Service is a software delivery model in which software is hosted on the cloud and provided to users over the internet.

Moving Windows to a SaaS model means that Microsoft will continue to deliver updates and new features through a subscription-based service rather than through major new versions of the operating system.

This approach has its own advantages and challenges.

Benefits of the SaaS model for Windows:

Continuous Updates: Users receive regular updates and new features, ensuring they always have access to the latest improvements and security patches.

Flexibility: Subscriptions offer different tiers and plans so users can choose the features they need and customize their experience.

Lower upfront costs: A subscription model could reduce the upfront cost of purchasing Windows, making Windows more accessible to a wider audience.

Improved security: Continuous updates can help address vulnerabilities and security threats more rapidly, enhancing overall system security.

Challenges and concerns with a SaaS model for Windows:

Dependency on internet connectivity: Users would need a stable internet connection to receive updates and access features, which may not be ideal for those in areas with limited or unreliable internet access.

Privacy and data concerns: Users might have concerns about data collection, privacy, and the potential for their usage patterns to be monitored in a subscription-based model.

Cost considerations: While a subscription model may provide flexibility, some users may find it less cost-effective in the long run compared to purchasing a traditional license for Windows.

Compatibility issues: Continuous updates could introduce compatibility challenges for legacy software and hardware that may not be updated or supported in the new model.

Whether you view Windows' migration to a SaaS model as a positive or negative is ultimately determined by your personal perspective and specific implementations by Microsoft.

Cost: SaaS is a subscription-based model, which means users have to pay recurring fees to use the software.

They have to rely on the provider to update, maintain, and improve the software.To sum up, I would feel hesitant about using SaaS if the next version of Windows becomes SaaS.

For more questions on Software as a Service:

https://brainly.com/question/23864885

#SPJ8

Alicia wants to change the display of the Outlook Today window on her computer. After clicking on Customize Outlook Today, which steps should she follow to change the display from three columns to one column?

In the Startup area, click 1 from the drop-down menu.
In the Startup area, click Standard (one column) from the drop-down menu.
In the Styles area, click Standard (one column) from the drop-down menu.
In the Styles area, click 1 from the drop-down menu.

Answers

Outlook is the mailing program used to receive and send emails. The display from three columns to one column can be changed by clicking in the style's area and selecting the standard. Thus, option c is correct.

What is the style's area?

The styles area is the option in the Outlook used to change the format of how the display looks to the users in the mail area. They are found in the format text tab.

In the tab select the style's area and choose the standard option which is the one-column option that can be selected from the drop-down buttons.

Therefore, option c.  choosing the standard option in the style area is used to change the display.

Learn more about outlook here:

https://brainly.com/question/19755799

#SPJ1

int r=6;
int v=20;
System.out.println( r % v );

Answers

Answer:

output: 6

Explanation:

6 is the remainder of 6/20

how do you keep word from trying to capitalize every isolated letter "i"

Answers

Write "i" the write random words then delete it and add the lowercase i
Answer: It’s best to write the letter “i” then on the word suggestions, click “i” and repeat it a few times to let the phone register that you only want your individual “i” to be lowercase.

list eight applications software​

Answers

Answer:

Eight applications software are:

Word processing softwareSpreadsheet software Graphics software Database software Web browser softwareAnimation softwareInternet browser softwares like: fire fox, chrome etcPresentation software

Which of the following form factors does not have expansion slots on the motherboard, but instead uses a riser card for expansion cards?a. NLXb. BTXc. Mini-ITX

Answers

The NLX form factor does not have expansion slots on the motherboard, but instead uses a riser card for expansion cards. Correct answer: letter A.

The BTX form factor has expansion slots, while the Mini-ITX form factor is a very small form factor that does not have any expansion slots.

The NLX form factor is typically used for low-power computers such as embedded systems and media centers. The riser card allows for additional expansion cards to be added, such as sound cards, network cards, and USB cards.

The BTX form factor is designed to improve cooling by allowing for a larger heatsink and better air flow. It also has more expansion slots than the NLX form factor. The Mini-ITX form factor is the smallest motherboard form factor and has no expansion slots. It is typically used in small form factor PCs and is limited in terms of expandability and upgradeability.

Learn more about The NLX:

https://brainly.com/question/3586603

#SPJ4

Please help with Com Sci work!

Please help with Com Sci work!

Answers

Copyright protection is not absolute. Various kinds of "fair use" are allowed by US and some other countries' copyright laws. The examples of fair use: D. 1 and 4 only

What is fair use?

In the United States, there is a legal concept known as fair use that permits the utilization of copyrighted material to some extent without obtaining authorization from the rights holders.

Examples of permitted applications come in forms like criticism, comment, news reporting and even educational or scholarly research. This concept adheres to discretion when it comes down to factors such as purpose and character of use, the type of content being used, the quantity/amount of the extracted portion, its significance relative to the overall composition, and how utilizing it may affect distribution marketing or value proposition. Implementation therefore happens on a case-by-case viewpoint.

Learn more about copyright on

https://brainly.com/question/357686

#SPJ1

Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not following that format is incorrect and should be ignored. Use the substring() method to parse the string and extract the date. The input ends with -1 on a line alone. Output each correct date as: 3/1/1990. Ex: If the input is:

Answers

Answer:

Explanation:

The following code was written in Java it creates a switch statement for all the month values in order to turn them from Strings into integer values. Then it reads every line of input places them into an array of dates if they are the correct input format, and loops through the array changing every date into the correct output format.Ouput can be seen in the attached picture below.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static int intForMonth(String monthString) {

       int monthValue;

       switch (monthString) {

           case "January": monthValue = 1;

               break;

           case "February": monthValue = 2;

               break;

           case "March": monthValue = 3;

               break;

           case "April": monthValue = 4;

               break;

           case "May": monthValue = 5;

               break;

           case "June": monthValue = 6;

               break;

           case "July": monthValue = 7;

               break;

           case "August": monthValue = 8;

               break;

           case "September": monthValue = 9;

               break;

           case "October": monthValue = 10;

               break;

           case "November": monthValue = 11;

               break;

           case "December": monthValue = 12;

               break;

           default: monthValue = 00;

       }

       return monthValue;

   }

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       ArrayList<String> dates = new ArrayList<>();

       String date;

       String month;

       String day;

       String year;

       int i = 0;

       while (true) {

           date = scnr.nextLine();

           if (date.equals("-1")) {

               break;

           }

           dates.add(date);

       }

       for (i = 0; i < dates.size(); i++) {

           try {

               month = dates.get(i).substring(0, dates.get(i).indexOf(" "));

               day = dates.get(i).substring(dates.get(i).indexOf(" ") + 1, dates.get(i).indexOf(","));

               year = dates.get(i).substring(dates.get(i).indexOf(",") + 2, dates.get(i).length());

               System.out.println(intForMonth(month) + "/" + day + "/" + year);

           } catch (Exception e) {}

       }

   }

}

Complete main() to read dates from input, one date per line. Each date's format must be as follows: March

Question 11 (2.5 points)
A start-up company has hired you to implement an email strategy for its organization.
The company wants all of its employees to have an enterprise-level email client and
is considering Windows Live Essentials. They ask you if there are any limitations
about this email solution. Which of the following is a major limitation?

Answers

Answer:

the dot

Explanation:

the dot is a good day forecast for a bit

Explain why the scenario below fails to meet the definition of competent communication with a client about
website design.
Situation: Jim, an owner of a small business, wants a website to expand his business.
Web designer: "Jim, you have come to the right place. Let me design a website, and then you can tell me if it meets
your needs."

Answers

Answer:

The scenario fails to meet the definition of competent communication with a client about website design because the web designer does not engage in a proper dialogue with Jim, the client. Competent communication involves actively listening to the client, asking questions to understand their needs, and working collaboratively to develop a website that meets those needs.

In this scenario, the web designer is assuming that they know what Jim wants without seeking his input. Instead of having a conversation with Jim to identify his business goals, target audience, and design preferences, the web designer is proposing to create a website on their own and then ask Jim if it meets his needs.

This approach does not take into account Jim's unique needs and preferences, and it could result in a website that does not align with his business objectives. Competent communication requires a partnership between the web designer and the client, where both parties work together to create a website that meets the client's specific needs and goals.

Explanation:

Most of the indentured servants in the American colonies were born in. A. Africa B. Asia OC. South America OD. Europe

Answers

Answer:Europe

Explanation: Just took it

What are some examples and non-examples of digital etiquette?

Answers

Answer:

saying hello to strangers and standing up to cyber bullies

using all caps. cyber bullying. cursing. stalking

dont download that file

Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks?

Answers

The counterterrorism alert system, it warns the government and key sectors ( such as drinking water companies and the energy sector) about terrorist threats

List and briefly describe various types of Malware?

Answers

Answer:

Here yah go.

Explanation:

Virus: A virus is a malicious program that attaches itself to legitimate files and spreads by infecting other files. It can cause damage to the infected system by corrupting or deleting files, slowing down the computer, or spreading to other connected devices.

Worm: Worms are self-replicating programs that spread over computer networks without the need for user interaction. They exploit vulnerabilities in operating systems or software to propagate themselves and can cause significant damage by consuming network bandwidth or carrying out malicious activities.

Trojan Horse: A Trojan horse appears as a legitimate and harmless program, but it contains malicious code that performs unauthorized activities without the user's knowledge. Trojans can enable remote access to a computer, steal sensitive information, or download and install additional malware.

Ransomware: Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid. It typically displays a ransom note, demanding payment in exchange for the decryption key. Ransomware attacks can be highly disruptive and costly for individuals and organizations.

Spyware: Spyware is designed to secretly monitor a user's activities and gather information without their consent. It can track keystrokes, capture screenshots, record browsing habits, and steal personal or sensitive data. Spyware often aims to collect financial information or login credentials.

Adware: Adware is a type of malware that displays unwanted advertisements on a user's computer. It can redirect web browsers, modify search results, and slow down system performance. Adware is typically bundled with legitimate software and generates revenue for its creators through advertising clicks or impressions.

Keylogger: Keyloggers are designed to record keystrokes on a computer or mobile device. They can capture usernames, passwords, credit card details, and other confidential information. Keyloggers can be delivered through malicious downloads, infected websites, or email attachments.

Botnet: A botnet is a network of compromised computers, also known as "zombies" or "bots," that are controlled by a central command and control (C&C) server. Botnets can be used for various malicious activities, including distributed denial-of-service (DDoS) attacks, spam distribution, or spreading other types of malware.

Rootkit: A rootkit is a type of malware that provides unauthorized access and control over a computer system while hiding its presence from detection by security software. Rootkits often modify operating system components and can be difficult to detect and remove.

Backdoor: A backdoor is a hidden entry point in a system that bypasses normal authentication mechanisms, allowing unauthorized access to a computer or network. Backdoors are often used by attackers to gain persistent access for further exploitation or to create a secret pathway for future access.

It is essential to stay vigilant, use reputable antivirus software, keep systems up to date, and exercise caution when downloading files or clicking on suspicious links to protect against these various types of malware.

Computer-
Why do people use PDF over word document

Answers

Answer:

.PDF Are Universal: Ms Word is used to author document before converting to PDF.

2.Security: Businesses around the world faces hundreds of cyber-attacks daily, thereby exposing their confidential document to high risk, especially in our digitalized world.

3.Easy to Create: MS Word, Excel, Power Point or any other document can be easily to PDF format file.

Explanation:

Select the correct answer.
Jasmine is a software developer. Her upcoming project requires building system software for a manufacturing plant. The software should be
powerful and fast and provide high performance. Which programming language should she use while programming the manufacturing plant's
system software?
OA PHP
OB. Python
C C++
OD. Java

Answers

Answer: C++

Explanation: it is correct on PLATO

What is the significance of backing up data on a computer?

Backing up data allows you to browse the Internet more quickly.
Your computer will never become infected with a virus.
A copy of your work can be saved in case the computer crashes.
The web cache will be cleared regularly.

Answers

Answer:

the answer is c

Explanation:

i got it right

Answer:

c

Explanation:

edg2020

Are computer software programs an example of land, labor or capital?

Answers

Answer:

Labor

Explanation:

"You win!" never displays. What line is responsible for this error?

Answers

Answer:

Line 3

Explanation:

The programmer’s modification of the accounting system was:

Answers

Because she was taking advantage of her position and avoiding costs, the programmer's alteration of the accounting system was unethical. Every time he entered, he had to sign a register at a security counter.

The term ____ photography syndrome is often used to refer to photographers who who use zoom lenses all the time rather than prime lenses.

Answers

Answer:

The term Gear Acquisition photography syndrome is often used to refer to photographers who who use zoom lenses all the time rather than prime lenses.

Explanation:

You can only choose one Animation effect on one slide in Power Point
*
a) True
b) False

Answers

Answer: B False

Explanation:

Write a program that calculates and prints the number of minutes in a year.
Assume the following:
1 year = 365 days (Ignore leap years)
1 day = 24 hours
1 hour = 60 minutes
Below is an example of the correct output format:
The number of minutes in a year is X

Answers

Answer:

#include <stdio.h>

int main() {

int minutes_in_an_hour = 60;

int hours_in_a_day = 24;

int days_in_a_year = 365;

int total_minutes = minutes_in_an_hour * hours_in_a_day * days_in_a_year;

printf("The number of minutes in a year is %d\n", total_minutes);

return 0;

}

Explanation:

This program calculates the number of minutes in a year by multiplying the number of minutes in an hour, the number of hours in a day, and the number of days in a year. The result is then stored in the total_minutes variable and printed to the screen with the printf function.

which statements are true? Select 4 options. Responses A function can have no parameters. A function can have no parameters. A function can have a numeric parameter. A function can have a numeric parameter. A function can have only one parameter. A function can have only one parameter. A function can have a string parameter. A function can have a string parameter. A function can have many parameters. A function can have many parameters.

Answers

Answer:

A function can have a numeric parameter.

A function can have many parameters.

A function can have only one parameter.

A function can have a string parameter.

Explanation:

1. Imagine you are in a computer shop. Choose five things that would improve your digital lif​

Answers

Answer:

definitley a mac

Explanation:

im not much of an apple company person but i would love to try a mac im more of that disney person who likes the animated stuff like raya and the last dragon which came out in march and luca which came out last friday

In which sections of your organizer should the outline be located?

Answers

The outline of a research proposal should be located in the Introduction section of your organizer.

Why should it be located here ?

The outline of a research proposal should be located in the Introduction section of your organizer. The outline should provide a brief overview of the research problem, the research questions, the approach, the timeline, the budget, and the expected outcomes. The outline should be clear and concise, and it should be easy for the reader to follow.

The outline should be updated as the research proposal evolves. As you conduct more research, you may need to add or remove sections from the outline. You may also need to revise the outline to reflect changes in the project's scope, timeline, or budget.

Find out more on outline at https://brainly.com/question/4194581

#SPJ1

Can anyone do this I can't under stand

Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand

Answers

Answer:

I think u had to take notes in class

Explanation:

u have yo write 4 strings

You are designing an internet router that will need to save it's settings between reboots. Which type of memory should be used to save these settings?
a. Disk
b. Does not matter
c. SRAM
d. Flash
e. DRAM

Answers

Answer:

d. Flash

Explanation:

A flash memory can be defined as an electronic non-volatile memory chip (storage medium) that is typically used on computer systems and other digital devices such as routers, USB flash drives, switches, digital cameras, mp3 players etc. A flash memory is an electronically erasable programmable read only memory (EEPROM) and as such data saved (written) on it can be erased electronically. Also, a flash memory do not require a source of power (electricity) to save or retain data through the use of a floating gate MOSFET (FGMOS) or floating gate transistor.

In this scenario, you are designing an internet router that will need to save it's settings between reboots. The type of memory that should be used to save these settings is a flash memory because it does not require power to write or save data.

Other Questions
How can supply chain management system increase retailers level of product availability and decrease its inventory investment Determine which steps are used to find the product shown. Put the steps in the order in which they would t2+7=+10[2 + 35 + 2.=2+41+412 + 65 + 5 When the price of pistachio nuts is $7.50 per lb. the quantity demanded is 48 lbs. When the price of pistachios is $9.00 per lb. the quantity demanded is 40 lbs. When the midpoint formula is used to measure the price elasticity of demand we can say that the demand for pistachio nuts is simplify each expression 3x + 4x + 5x Help please giving out brainless and 100 points THANK YOU Jaden has 3 times as many pieces of gum as Brian has. Jaden has 150 pieces of gum. How many pieces of gum does Brian have? 3a - 2b - ab - (a-b+ab)+3ab+b-9 How does a ******, orphan, son of a *****And a Scotsman, dropped in the middle of a forgotten spotIn the Caribbean by providence impoverishedIn squalor, grow up to be a hero and a scholar?The ten-dollar founding father without a fatherGot a lot farther by working a lot harderBy being a lot smarterBy being a self-starterBy fourteen, they placed him in charge of a trading charterAnd every day while slaves were being slaughtered and carted awayAcross the waves, he struggled and kept his guard upInside, he was longing for something to be a part ofThe brother was ready to beg, steal, borrow, or barterThen a hurricane came, and devastation reignedOur man saw his future drip, dripping down the drainPut a pencil to his temple, connected it to his brainAnd he wrote his first refrain, a testament to his painWell, the word got around, they said, this kid is insane, manTook up a collection just to send him to the mainlandGet your education, don't forget from whence you cameAnd the world is gonna know your nameWhat's your name, man?Alexander HamiltonMy name is Alexander HamiltonAnd there's a million things I haven't doneBut just you wait, just you waitWhen he was ten his father split, full of it, debt-riddenTwo years later, see Alex and his mother bed-riddenHalf-dead sittin' in their own sick, the scent thickAnd Alex got better but his mother went quickMoved in with a cousin, the cousin committed *******Left him with nothin' but ruined pride, something new insideA voice saying, "Alex, you gotta fend for yourself"He started retreatin' and readin' every treatise on the shelfThere would have been nothin' left to do for someone less astuteHe woulda been dead or destitute without a cent of restitutionStarted workin', clerkin' for his late mother's landlordTradin' sugar cane and rum and all the things he can't affordScammin' for every book he can get his hands onPlannin' for the future see him now as he stands onThe bow of a ship headed for the new landIn New York you can be a new manIn New York you can be a new man (just you wait)In New York you can be a new man (just you wait)In New York you can be a new manIn New York, New YorkJust you waitAlexander HamiltonAlexander HamiltonWe are waiting in the wings for youWaiting in the wings for youYou could never back downYou never learned to take your timeOh, Alexander HamiltonAlexander HamiltonWhen America sings for youWill they know what you overcame?Will they know you rewrote your game?The world will never be the same, ohThe ship is in the harbor nowSee if you can spot him (just you wait)Another immigrant comin' up from the bottom (just you wait)His enemies destroyed his rep America forgot himWe, fought with himMe, I died for himMe, I trusted himMe, I loved himAnd me, I'm the dang fool that shot him (shot him, shot him)There's a million things I haven't doneBut just you waitWhat's your name, man?Alexander Hamilton What are the:a) Norton currentb) Norton resistancec) Thevenin voltaged) Thevenin resistance+ELV17T-. For this circuit? (GIVING BRAINLIEST) what statement best completes this diagram Comte, spencer, durkheim, weber, and marx all witnessed what major societal change? On a Windows 10 workstation, you want to use the Storage Spaces feature to create a logical drive. Which of the following components are used to configure Storage Spaces?Storage devices, which are physical drives such as SATA drives or external drives.Pools of storage, which are logically created from free space on storage devices.Storage spaces, which are logically defined units created from a pool of storage.ExplanationStorage spaces are composed of three components:Devices are the hard disks or other types of storage from which storage pools are created. You can use a variety of devices such as SATA drives and external drives to create storage pools.Pools of storage are created from the available disk space. A pool is a logical concept composed of the free space available on the specified storage devices.Storage spaces define logical units of space created from a pool. One or more storage spaces can be created from the pool. To the Windows system and the user, storage spaces appear as disks with typical drive letters (e.g., E: drive, F: drive).Parity, thin provisioning, and data resiliency are benefits of Storage Spaces. Microsoft Office is available for users of all operating systems o True o False Altira Corporation provides the following information related to its merchandise inventory during the month of August 2021: Aug.1 Inventory on hand2,200 units; cost $6.30 each. 8 Purchased 11,000 units for $5.70 each. 14 Sold 8,800 units for $12.20 each. 18 Purchased 6,600 units for $5.20 each. 25 Sold 7,800 units for $11.20 each. 28 Purchased 4,200 units for $5.80 each. 31 Inventory on hand7,400 units. Exercise 8-14 (Algo) Part 1 Required: 1. Using calculations based on a perpetual inventory system, determine the inventory balance Altira would report in its August 31, 2021, balance sheet and the cost of goods sold it would report in its August 2021 income statement using the FIFO method. Which point represents 2 and one-fourth on the graph?A number line going from negative 4 to positive 4. Point D is between negative 3 and negative 2. Point B is between negative 2 and negative 1. Point E is between negative 1 and 0. Point C is between 2 and 3. Point A is between 3 and 4.Point APoint CPoint DPoint E the cash effects of transactions that create revenues and expenses are explain two consequences of Gorbachevs leadership 1)13C1057Aa. 36.2b40.2c81.6d43.9 PLEASE HELP IM STRUGGLING IN MATH!! THANK YOU!!!! the term electricity is derived from the greek word ? , and means "to be like amber."