1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
4 years ago
7

Jim is writing a program to calculate the wages of workers in a teddy bear factory.

Computers and Technology
1 answer:
34kurt4 years ago
3 0

Answer:

The algorithm is as follows;

1. Start

2. Input TeddyBears

3. Input Hours

4. WagebyTeddy = 2 * TeddyBears

5. WagebyHour = 5 * Hours

6. If WagebyHour > WagebyTeddy then

6.1 Print WagebyHour

7. Else

7.1. Print WagebyTeddy

8. Stop

Explanation:

The following variables are used;

TeddyBears -> Number of teddy bears made

Hours -> Number of Hours worked

WagebyTeddy -> Wages for the number of teddy bears made

WagebyHour -> Wages for the number of hours worked

The algorithm starts by accepting input for the number of teddy bears and hours worked from the user on line 2 and line 3

The wages for the number of teddy bears made  is calculated on line 4

The wages for the number of hours worked  is calculated on line 5

Line 6 checks if wages for the number of hours is greated than wages for the number of bears made;

If yes, the calculated wages by hour is displayed

Otherwise

the calculated wages by teddy bears made is displayed

You might be interested in
You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices
ladessa [460]

The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.

Smart card key reader to be placed or installed where is required  such as an opening door  or entrance of office or organization extra.

Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.

By Installing smart card and it readers unauthorized  person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.

5 0
3 years ago
Question
LuckyWell [14K]

Answer:

you go to the what ever you use for the stuff i thing you want

Explanation:

6 0
3 years ago
Describe the Sign in process of an Email account.​
Inga [223]
User inputs email. User inputs password , if password and username match user allowed through.If not password or email address is incorrect notification is shown - and there also may be a limit on the amount of attempts you have to get it right.
8 0
3 years ago
‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
Law Incorporation [45]
"The increased availability of mobile digital devices has had a positive impact on how young people use their free time."

There are many different views that you could take upon this subject.  

1) You could say that the increased availability of mobile digital devices has allowed children to increase their academic success, by being able to search for and complete assignments using these devices.

2) You could say that the increased availability of mobile digital devices allows for children to occupy themselves by providing games, videos, books, and other things to provide them with entertainment, a learning experience, and more.

Hope this helps!
4 0
3 years ago
The LCD screens are found in​
Grace [21]
Projectors and portable consumer devices such as digital cameras, watches, digital clocks, calculators, and mobile telephones, including smartphones. LCD screens are also used on consumer electronics products such as DVD players, video game devices and clocks.
7 0
2 years ago
Other questions:
  • List and describe the issues that lead to making a successful website?​
    9·1 answer
  • __________ describes a module for which the software developer does not care how the processing is performed, but instead, knows
    7·1 answer
  • In python:
    14·1 answer
  • What does “default” refer to? the ability to be used as, or directly converted to, cash. the failure to pay back a loan. the amo
    8·1 answer
  • How do issues of equity, teacher education and budgeting impact technology in schools?
    7·2 answers
  • Which of these items will least likely increase pressure in the evaporative emission control system?
    9·1 answer
  • THE FOLLOWING IS WRITTEN IN C:
    5·1 answer
  • 3) Prompt the user for a 3-digit number, and the output should be the magical #, which is formed with each digit shifted to the
    13·1 answer
  • Full meaning of LAN and WAN
    5·2 answers
  • A water park will let a visitor on a ride if they are 48 or more inches tall OR they are 14 years old or older. WILL MARK BRAINL
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!