1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
12

Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a

program that will allow her to enter each employee’s name, hourly rate of pay, number of hours worked in one week, overtime pay rate, payroll deductions (such as medical insurance, savings, etc.), and tax rate. The program should output the employee’s gross pay (before taxes and deductions) and net pay (after taxes and deductions) for each employee for one week.
Computers and Technology
1 answer:
mestny [16]3 years ago
8 0

Answer:

START LOOP FOR EACH EMPLOYEE:

   INPUT employee’s name, hourly rate of pay, number of hours worked, overtime pay rate, payroll deductions, tax rate

   SET gross pay = (hourly rate of pay x *weekly hours) + (overtime pay rate x (number of hours worked - *weekly hours))

   PRINT gross pay

   SET net pay = gross pay - (payroll deductions + (gross pay * tax rate/100 ))

   PRINT net pay

END LOOP

* weekly hours (how many hours an employee needs to work to earn overtime pay rate) is not given in the question

Explanation:

Create a loop that iterates for each employee

Inside the loop, ask for name, hourly rate, number of hours worked, overtime pay rate, payroll deductions, tax rate. Calculate the gross pay and print it. Calculate the net pay and print it

You might be interested in
If a while loop iterates forever,what is the most likely cause?
miv72 [106K]

Answer:

Runtime error probably. The program won't make it past the while loop in the code.

5 0
2 years ago
What kind of information can be found in a ROM:
tester [92]
The answer is C, ROM often stores the basic instructions a computer needs when powering on, part if the BIOS.
3 0
3 years ago
If a document reaches you, and requires you to perform some action, you should do it immediately if ________.
ankoles [38]
<span>You should do it if C. it will take less than two minutes to complete </span>
6 0
4 years ago
Read 2 more answers
A Network Management Station (NMS) is using SNMP to manage some Cisco routers and switches with SNMPv2c. Which of the following
Rom4ik [11]

Answer:

b. Using either the read-write or read-only community string.

Explanation:

The SNMP agent on a router authenticates any SNMP Get requests received from the NMS using either the read-write or read-only community string.

In the SNMPv2c, if the NMS sends either the read-write or read-only community string requests, SNMP Get requests will be allowed.

7 0
3 years ago
Read 2 more answers
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
Other questions:
  • Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
    12·1 answer
  • . What is automated testing?
    10·1 answer
  • TCP is the protocol responsible for the delivery of data on the Internet, and IP provides addresses and routing information.
    12·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    6·1 answer
  • What would be a good hash code for a vehicle identification that is a string of numbers and letters of the form “9x9xx99x9xx9999
    9·1 answer
  • What is the name of the virus that appears to be a legitimate program but when opened
    9·1 answer
  • Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
    10·1 answer
  • What are the disadvantages of vector images when compared to bitmap images?
    14·1 answer
  • When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind
    15·1 answer
  • The standard naming convention prefix tag for a query used to identify the object type is?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!