1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
13

An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Ove

rtime pay equals the total overtime hours multiplied by 1.5 times the hourly wage. Write a program that takes as inputs the hourly wage, total regular hours, and total overtime hours and displays an employee’s total weekly pay.
Computers and Technology
1 answer:
Feliz [49]3 years ago
3 0

Answer:

C++ programming language is used to implement this program using Dev C++. You can use any C++ compiler to run this program. The code and its explanation is given below in explanation section.

Explanation:

#include<iostream>

using namespace std;

int main()

{

int totalWeeklyPay;//total weekly pay  

int hourlyWage;// wages per hours

 

int totalRegularHour;// total regular hours worked

int totalOverTimeHour;// total over time hours worked

 

int weeklyTotalRegularPay;

int weeklyTotalOverTimePay;

 

cout<<"Enter Wage per hour: ";

 cin>>hourlyWage;

 if (hourlyWage<0)//if use enter negative value

  {

   cout<<"Please enter positive number number for wage per hour\n";

   cout<<"Enter Wage per hour: ";

     cin>>hourlyWage;

  }

cout<<"Enter total regular hour: ";

cin>>totalRegularHour;

if (totalRegularHour<0)//if user enter negative value

  {

   cout<<"Please enter positive total number of regular hour\n";

  cout<<"Enter total regular hour: ";

     cin>>totalRegularHour;

  }

cout<<"Enter total over time hour: ";

cin>>totalOverTimeHour;

 

 if(totalOverTimeHour<0)//if user enter negative value

   {

    cout<<"Please enter positive total number of over time hour\n";

  cout<<"Enter total over time hour: ";

  cin>>totalOverTimeHour;

     

     

 }

 

weeklyTotalRegularPay =hourlyWage*totalRegularHour;// total weekly regular hour pay

weeklyTotalOverTimePay=totalOverTimeHour*hourlyWage*1.5;// total weekly overtime pay

totalWeeklyPay=weeklyTotalRegularPay + weeklyTotalOverTimePay;//total weekly regular hour pay + // total weekly overtime pay

cout<<"Total Weekly Pay is: "<<totalWeeklyPay<<"$";//output

 

 

return 0;

 

}

You might be interested in
A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is
DanielleElmas [232]

Answer:

A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is called <u>Multidimensional website architecture</u>

Explanation:

There are different types of website architecture. One of them is multidimensional website architecture. In Multidimensional architecture, Multiple links of the websites pages are given on the a page and each page contain the multiple links of the website. in this architecture from any page of the website we can access the other page of the website.

for example

On Wikipedia, we search some topic named as website architecture, the website architecture shows on the screen. On this page, there are different link of pages such as sequential website architecture, multidimensional website architecture and Hierarchical website architecture. If click one of the link such as Hierarchical website architecture, the page of Hierarchical website architecture will open and show on the screen. This page also contains different pages links. These links may include the main page link of website architecture. This is called Multidimensional Architecture.

7 0
3 years ago
Describe the basic features of the relational data model and discuss their importance to the end user and the designer. Describe
Mandarinka [93]

Answer:

The answer to this question can be described as follows:

Explanation:

Relational data model:

The use of data tables to organize sets of entities into relationships requires a relational data model. this model work on the assumption, which is a primary key or code, that is included in each table configuration. The symbol for "relational" data links and information is used by other tables.

Model Design:

This model is used for database management, it consists of structure and language consistency. It is design in 1969.

Importance of data model:  

This provides a common standard for processing the potentially sound data in machines, that was usable on almost any one device.  

Big Data:

It moves to locate new and innovative ways to handle large volumes of authentication tokens and to gather business insights when offering high efficiency and usability at an affordable cost at the same time.

6 0
3 years ago
Some architectures support the ‘memory indirect’ addressing mode. Below is an example. In this case, the register R2contains a p
egoroff_w [7]

Answer:

Following is given the solution to question I hope it will  make the concept easier!

Explanation:

7 0
3 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
¿Toda sustancia de aspecto homogéneo es siempre una sustancia pura?
Gwar [14]

Answer:

No, las sustancias homogéneas pueden ser mezclas.

8 0
3 years ago
Other questions:
  • #TODO: Define a data structure to keep track of which links are part of / not part of the spanning tree.
    14·1 answer
  • What is PHP language
    12·1 answer
  • What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
    6·1 answer
  • A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within anothe
    8·1 answer
  • Describe some advantages of a 64-bit versus 32-bit version of windows.
    9·1 answer
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • Part cost Calculator Modify the GUI in your program to look like the following GUI. To do that you need to add the following to
    13·1 answer
  • What kind of security features does Microsoft Security Analyzer promise?
    5·1 answer
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!