1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
8

Using Word, write pseudocode to represent the logic of a program that allows the user to enter a value for hours worked in a day

. The program calculates the hours worked in a five-day week and the hours worked in a 252-day work year. The program outputs all the results.
Computers and Technology
1 answer:
Alexandra [31]3 years ago
7 0

Answer:

//Here is PSEUDO CODE.

1. Declare variable "hour_day".

   1.1 read the hour worked in a day and assign it to variable "hour_day".

2. Calculate the hours worked in a five day week.

   2.1 work_week=5*hour_day.

3. Calculate the hours worked in 252 days year.

   3.1 work_year=252*hour_day

4.  print the value of work_week and work_year.

5.  End the program.

//Here is code in c++.

#include <bits/stdc++.h>

using namespace std;

int main() {

double hour;

cout<<"enter the hours worked in a day:";

cin>>hour;

double work_week=5*hour;

double work_year=252*hour;

cout<<"work in a 5-day week: "<<work_week<<"hours"<<endl;

cout<<"work in a 252-day year: "<<work_year<<"hours"<<endl;

return 0;

}

Output:

enter the hours worked in a day:6.5

work in a 5-day week: 32.5 hours

work in a 252-day year: 1638 hours

You might be interested in
Language: JAVA Can someone please tell me what the problem to my "main" class is?
AleksandrR [38]

Answer:

please find the attachment of the correct code:

Output:

Bob : 1234

sue : 5678

pat : 2468

please enter a name to replace with pat:  

Chris

Bob : 1234

sue : 5678

Chris : 2468

Explanation:

In this code, when we create the class object, that is "stu1, stu2, and stu3" and call the parameterized constructor bypassing the "string and integer" value and print the object value you forget to call the "tostring" method because it is the only method which returns both "string and integer" value.  

6 0
3 years ago
Order the steps needed to design a relational database.
tia_tia [17]

Answer:

1. List the fields needed to gain information

2. Break down the date into smaller parts

3. identify the fields holding stored data

4.distribute the fields into tables by subject

5. identify the common fields for linking tables

Explanation:

edge 2021

5 0
3 years ago
What is Virtual Storage Configuration and Management, as well as Virtual Machine Management?
AveGali [126]

Answer:

Virtual storage configuration and management refers to the process of configuring and managing the storage resources of a virtualized environment. This typically involves creating and configuring virtual disks, assigning storage space to virtual machines, and managing the allocation of storage resources among different virtual machines.

Virtual machine management, on the other hand, refers to the process of managing the virtual machines in a virtualized environment. This typically involves creating and configuring virtual machines, installing and configuring operating systems and applications on the virtual machines, and managing the allocation of computing resources such as CPU, memory, and network bandwidth among different virtual machines.

An example of virtual storage configuration and management would be creating a virtual disk with a specified size and assigning it to a virtual machine to use as its primary storage. An example of virtual machine management would be creating a new virtual machine with a specified operating system and allocated resources, and then installing and configuring applications on it.

Both virtual storage configuration and management and virtual machine management are important tasks in a virtualized environment, as they help to ensure that the virtual machines have access to the necessary storage and computing resources to function properly. These tasks are typically performed by system administrators or other IT professionals who have expertise in virtualization and IT infrastructure management.

7 0
2 years ago
What is one example of how teens use the internet and social media for cyberbullying
vovikov84 [41]

Cyberbullying occurs when individuals use technology to write aggressive, embarrassing, or hateful messages to/about peers in order to intimidate, harass, shame, and control.

7 0
3 years ago
Read 2 more answers
How will I go about conducting the investigation on fake news
Leno4ka [110]

Answer:

You can begin your report, and write about CNN, BBC, or any other liberal news network.

Explanation:

5 0
3 years ago
Other questions:
  • You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
    8·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • What’s the best description of an opportunity cost
    5·1 answer
  • Considering current online newspaper editions and the characteristics of digital age media, how do you think newspaper design mi
    7·1 answer
  • How to make a Tip Calculator in code?
    12·1 answer
  • How do you detect my account for brainly?
    14·1 answer
  • 11.5 Code Practice edhesive
    10·2 answers
  • Question #1
    5·2 answers
  • Which of the following tabs on the Ribbon contains the command to add a Quick Part to a document? A Design B Insert C View D Hom
    7·1 answer
  • What is the purpose of linking text boxes?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!