1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
2 years ago
13

Write the pseudocode for a program that will process attendance records of CA students. The students attend college five days a

week. Input values are the student’s name, number, and the time in and time out for each day of the week (i.e. five different times in and times out must be input). If a student attends college more than 36 hours in a week, a congratulatory message is printed. If a student attends college less than 30 hours in a week, a warning message is printed. The output for each student is the name, hours, and the appropriate attendance message. Processing continues until a student number of zero is input. Assume that students always check in and out on the hour. Therefore, timeIn and timeOut will be integer variables (i.e. they represent whole hours, and minutes are ignored).
Computers and Technology
1 answer:
Alenkasestr [34]2 years ago
3 0

Using the knowledge of pseudocodes it will be possible to write a code that calculates the amount of hours worked and giving warnings about it.

<h3>Writing a pseudocode we have that:</h3>

<em>while </em>

<em>if number == 0</em>

<em>break</em>

<em>hours =0 </em>

<em>for i =1 to 5 </em>

<em>hours = hours + time_out[ i ] - time_in[ i ]</em>

<em> If hours >36 : </em>

<em>print ( "Name is " ,name)</em>

<em>print( "No of hours are ",hours)</em>

<em>print("Congratulaion! Your working hours are more than 36")</em>

<em>If hours <30 : #</em>

<em>print ( "Name is " ,name)</em>

<em>print( "No of hours are ",hours)</em>

<em>print("Warning !!!")</em>

<em>End loop</em>

See more about pseudocode at brainly.com/question/13208346

#SPJ1

You might be interested in
Do you think it's better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
Alex787 [66]

Answer:

The young designer should use free open-source art programs for his designs. The designer can create new tools and get and update a verse collection of design tools in the software.

Explanation:

An open-source program is a software or application whose source code is available for changes, upgrade and sharing within the public.

Rather than in closed-source software where all upgrades and changes are made only by the tech-company with the license, and the expensive nature of the purchase, the open-source code programs are mostly free with a general public license.  

5 0
3 years ago
True or false, cloud storage does not require internet access?
Dmitry_Shevchenko [17]
False, the storage is being accessed from the cloud which can only be accessed through an internet connection.
3 0
3 years ago
Who is "TheBrain" He doesn't Give Answers, Or Questions, Keeps liking Profiles and.. Has Thousands of followers.. is he a Mod? ​
ss7ja [257]

Nope, he is a BOT not a MOD. He is made to run for this purpose only. He used to give answers in brainly.in but now he is used for deleting useless answers and questions, to welcome a new user and acts as a server bot.

You can also call "TheBrain" as AI

8 0
2 years ago
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy
torisob [31]

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

3 0
2 years ago
Barat explains that if you have a cell that is the sales price of a given product, the value of which will change to produce the
Mice21 [21]

Answer Choices:

a.goal cell

b.constraint

c.changing cell

d.absolute cell

Answer:

c.changing cell

4 0
3 years ago
Other questions:
  • How does the team know what to work upon during the iteration
    6·1 answer
  • What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
    6·1 answer
  • How many possible keys does the playfair cipher have? an approximate power of 2
    14·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • Why is a high-quality bond typically considered a lower-risk investment than a stock
    10·2 answers
  • Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
    10·1 answer
  • Type the correct answer in the box. Spell all words correctly. Complete the sentence based on the role education plays to help y
    5·1 answer
  • PLEASE HELP WILL MARK BRAINLIEST ASAP
    14·1 answer
  • Which of the following is a database concept that allows for storage and analysis for a dozen to billions of data points?
    7·1 answer
  • You are working with a database table that contains data about music. The table includes columns for track_id, track_name (name
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!