1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
12

You are working as the IT support person for an electrician. The electrician has asked you to create a program that generates a

report to show the month’s customers, the total number of customers, and the amount owed across all customers. Each customer record contains a customer number, customer name, number of kilowatt hours used (up to, but not including 1000.0) and the amount owed. The amount owed is based on the number of kilowatt hours used based on the following rate schedule: Number of Kilowatts Used Cost 0.0 -199.9 $0.11 per kilowatt 200.0+ $0.08 per kilowatt Your program should gather the input data from the user. Then your program should calculate and print the each customer’s record and amount owed on a weekly payroll report. All input data and calculated amounts should appear on the report. The total amount owed and total number of customers should appear at the end of the report. When there are no customers, an error message should appear instead of a report. You may assume the customer number and customer name have already been validated and will never included an empty value.
Computers and Technology
1 answer:
Alexus [3.1K]3 years ago
7 0

Answer:

Customer.java

public class Customer {

private int customerNo;

private String customerName;

private double kwhourconsumed;

private double amountowed;

public int getCustomerNo() {

return customerNo;

}

public void setCustomerNo(int customerNo) {

this.customerNo = customerNo;

}

public String getCustomerName() {

return customerName;

}

public void setCustomerName(String customerName) {

this.customerName = customerName;

}

public double getKwhourconsumed() {

return kwhourconsumed;

}

public void setKwhourconsumed(double kwhourconsumed) {

this.kwhourconsumed = kwhourconsumed;

}

public double getAmountowed() {

return amountowed;

}

public void setAmountowed(double amountowed) {

this.amountowed = amountowed;

}

Override

public String toString() {return "Customer [customerNo=" + customerNo + ", customerName=" + customerName + ", kwhourconsumed="  + kwhourconsumed + ", amountowed=" + amountowed + "]";

}

}

PayrollReport.java

import java.util.ArrayList;

import java.util.List;

import java.util.Scanner;

public class PayrollReport {

public static Customer getCustomerDetails(Scanner sc)

{

Customer cust= new Customer();

System.out.println("Enter Customer Number");

int customerNo=sc.nextInt();

cust.setCustomerNo(customerNo);

System.out.println("Enter Customer Name");

String customerName=sc.next();

cust.setCustomerName(customerName);

System.out.println("Enter Customer kilowatt hours used");

double kwhourconsumed=sc.nextDouble();

cust.setKwhourconsumed(kwhourconsumed);

return cust;

}

public static void main(String[] args) {

Scanner sc = new Scanner(System.in); //Used Scanner Class to take Input from User

//List to add all the customer details

//Customer POJO is created so that multiple Objects can be stored

List<Customer> list= new ArrayList<Customer>();

//User shoud Enter Y to add more customer details and N to stop Entering

while(true)

{

//Method to Input Customer Details

Customer cust=getCustomerDetails(sc);

//Getting back the object and setting to the list

list.add(cust);

System.out.println("To Add more customer Enter 'Y' or Else 'N'");

String yn=sc.next();

if(yn.equals("Y"))

continue;

else

break;

}

sc.close();

double amountOwed=0.0;

for(int i=0;i<list.size();i++)

{

double hrconsumed=list.get(i).getKwhourconsumed();

if(hrconsumed>0.0 && hrconsumed<=199.9)

{

amountOwed=(hrconsumed*0.11);

list.get(i).setAmountowed(amountOwed);}

else if(hrconsumed>= 200.0)

{

amountOwed=(double)(199.99*0.11)+(hrconsumed-200.0)*0.08;

list.get(i).setAmountowed(amountOwed);

}

}System.out.println("///////////////////////////");

System.out.println("Weekly Payroll Report");

double totalamountowed=0.0;

for(int i=0;i<list.size();i++)

{

System.out.println("CUSTOMER - "+i+1);

System.out.println("Customer No- "+list.get(i).getCustomerNo());

System.out.println("Customer Name- "+list.get(i).getCustomerName());

System.out.println("Customer kilowatt hours used

"+list.get(i).getKwhourconsumed());

System.out.println("Customer amount owed in $- "+list.get(i).getAmountowed());

totalamountowed=totalamountowed+list.get(i).getAmountowed();

}

System.out.println("///////////////////////////");

System.out.println("END Report");

System.out.println("Total Number of Customer "+list.size());

System.out.println("Total Amount Owed In $ "+totalamountowed);

}

}

Explanation:

Made some modifications for clarity and simplicity.

You might be interested in
Which term best describes a popular marketing strategy that centers
IceJOKER [234]

Answer:

Customer Relationship Management (CRM).

Explanation:

CRM is an acronym for customer relationship management and it typically involves the process of combining strategies, techniques, practices and technology so as to effectively and efficiently manage their customer data in order to improve and enhance customer satisfaction.

This ultimately implies that, these employees are saddled with the responsibility of ensuring the customer are satisfied and happy with their service at all times.

Marketing can be defined as the process of developing promotional techniques and sales strategies by a firm, so as to enhance the availability of goods and services to meet the needs of the end users or consumers through advertising and market research. It comprises of all the activities such as, identifying, anticipating set of medium and processes for creating, promoting, delivering, and exchanging goods and services that has value for customers.

Basically, CRM involves understanding customer needs, building and maintaining healthy long-term relationships with them, in order to add value or scale up your business.

Hence, customer relationship management (CRM) is one of the popular marketing strategy that is mainly based on the acquisition, enhancement, and retention of long-term relationships that add value for the organization and the customer.

8 0
3 years ago
What is a gamer?
mixer [17]

Answer:

It is <em>definitely </em>D.

Explanation:

I am a gamer myself so this question is easy for me. It's slim to none to be wrong when you view my answer!!!

7 0
2 years ago
PLEASE HELP :(
belka [17]

Taking data and instructions from a user, processing the data as per instructions, and displaying or storing the processed data, are the four major functions of a computer. These functions are also known as the input function, process function, output function, and storage function, respectively.

5 0
3 years ago
Consider a collection C of subsets of a nite set V . (V; C) is called a hypergraph. A hypergraph (V; C) is 3-regular if every su
kodGreya [7K]

Explanation:

polynomial-time 3-approximation for the maximum matching problem in 3-regular hypergraphs as follows: Given a 3-regular hypergraph, find a matching with maximum cardinality.

6 0
3 years ago
Overview: For the final project in this course, you will assume the role of a training manager at a cybersecurity firm needing t
Free_Kalibri [48]

<u>Solution and Explanation:</u>

<u>INTRODUCTION </u>

A) Introduction Cybersecurity should be a priority for all businesses so that they can protect their information systems and data assets. Organizations all over the world have been experiencing cyber-attacks. Types of cybercrime include identity theft, ransomware, denial of service attacks, botnets, phishing and social engineering (Khanse, 2014).

Cybersecurity threats exist from both external sources and from within a company. Cybersecurity issues will have impacted businesses financially to the tune of $6 trillion dollars per year worldwide, which is double the amount since 2013. Cybercrime is projected to be more profitable than the global illegal drug trade (Morgan, 2017). CyberLeet Technologies can safeguard businesses against these threats by strictly adhering to the core tenets of cybersecurity which are confidentiality, availability and integrity. CyberLeet will ensure these tenets by identifying vulnerabilities in client systems, implementing data security policies and utilizing threat detection monitoring.

B) Your Role at CyberLeet The role of an information security analyst at CyberLeet Technologies is to enforce the cybersecurity tenets of confidentiality, integrity and availability. This will be accomplished by performing risk assessments of its client’s software, hardware and networks. The analyst must plan and implement security measures to protect client systems, networks and data. Finally, the role includes helping the client engage in security awareness training for its employees (New England College, 2017). The CyberLeet information security analyst will perform job functions which uphold the basic tenets of cybersecurity. The analyst will perform vulnerability assessments of the client systems to ensure the cybersecurity principle of availability. He or she will monitor the client network and systems to safeguard the cybersecurity tenet of confidentiality. Also, the analyst will safeguard the cybersecurity tenet of integrity by protecting client data through the use of data encryption. Other tasks that will be performed include malware analysis, enhancement of security standards, and investigation and documentation of any security breaches. The ultimate goal of an information security analyst at CyberLeet Technologies is to uphold the cybersecurity tenets of confidentiality, integrity and availability by protecting its client systems’ assets, networks and data from cyberattacks.

C) Purpose of This Manual The purpose of this manual is to train new CyberLeet information security analyst recruits about their job duties. These duties include understanding that their client’s organization is subject to information security issues and the fundamental core cybersecurity tenets of confidentiality, integrity and availability must be applied to develop security measures (Henderson, 2017). These threat mitigation security measures include the development of cybersecurity policies including password policies, acceptable use policies, employee training policies, and basic user polices. It is imperative that information security analysts apply the principles and practices outlined in this manual and provide high-quality services to the client. Failure to do so could result in the client experiencing cyber-attacks ranging from malware, phishing, denial of service and ransomware (Khanse, 2014).

CORE TENENTS OF CYBER SECURITY

A) Confidentiality One of the core tenets of cybersecurity is confidentiality. Confidentiality is the preservation of private and proprietary information, such as customer data or health records. Only authorized users should be able access protected information, while unauthorized users should be blocked. Information security requires control on access to protected information (Henderson, 2017). An example of enforcing confidentiality includes the restriction of access to company assets and information via the use authentication and authorization techniques.

B) Integrity The core tenet of integrity is the guarding against improper modification of data or system information. Data integrity is maintained when information remains unchanged during storage, transmission and usage (Henderson, 2017). An example of maintaining system integrity is the prevention of malware which can corrupt computer files. An example of maintain data integrity is the proper encryption of data prior to transmission between systems, to prevent unauthorized access and manipulation.

C) Availability The core tenet of availability is the accessibility of users to systems and data. Availability is maintained when all components of the information system are working properly. Problems in the information system could make it impossible to access information, thereby making the information unavailable (Henderson, 2017).

 

8 0
3 years ago
Other questions:
  • A __________ is the column of data in a database that is used as the basis for arranging data.
    8·2 answers
  • A model release can be either oral or written down. true or false
    13·2 answers
  • Technologies are having a negative impact on businesses.
    8·1 answer
  • ____ is the only automated disk-to-disk tool that allows you to copy data to a slightly smaller target drive than the original s
    5·1 answer
  • A user profile has a login hour restrictions set to. Monday through A user profile has login hour restrictions set to. Monday th
    6·1 answer
  • What are 25 items that trees made?
    6·2 answers
  • When was the Ethics Resource Center (ERC) established? In the 1970s In the 1980s In the 1990s In the 2000s
    14·1 answer
  • Lucia is using the American Psychological Association (APA) style guidelines to writer her research paper. What is her most like
    5·2 answers
  • Write a Python function that join the two string and print it ​
    14·2 answers
  • Paolo, a popular basketball player in school was asked by his coach, how is your family
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!