1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
5

You will write a flowchart, and C code for a program that does the following: Within main(), it asks for the user's annual incom

e.Within main(), it calls a function called printIt() and passes the income value to printIt(). The printIt() function evaluates the income, and if the number is over 90000, prints a congratulatory message. If the income is not over 90000, it prints a message of encouragement, like "You WILL make $90,000, if you keep going."

Computers and Technology
1 answer:
elena-s [515]3 years ago
7 0

Answer:

Explanation:

To write a C program for the above problem:

#include <stdio.h>

int main()

{

// we define the variable to get the annual income

float AnIncome;

// to get the annual income from the user

printf("Enter your annual income here: ");

scanf("%f", &Anincome);

// This is the function to test the annual income

float printIt(x){

//we test the amount inputted now

if (x>= 90000){

printf("Congratulations on your income\n"); // This is the congratulatory message

}

if (x<=0){

// This statement is included to avoid putting zero as annual income

printf("Annual Income cannot be zero or less than zero\n");

}

else{

printf("You WILL make $90,000, if you keep going.\n");

}

}

printIt(AnIncome);

return 0;

}

Attached is the image for a flow chat for the program

You might be interested in
Is a type of bullying that takes place when a person intentionally posts negative information about another that is not true
MakcuM [25]

Cyberbullying is bullying that takes place over digital devices like cell phones, ... posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else ... as well as any negative, mean, or hurtful content

6 0
2 years ago
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
What is a social media networks
Mumz [18]

You mean social networking? If so, Social networking is the use of Internet-based websites to stay connected with friends/family/anyone really. Social networking can have a social purpose, a business purpose, or both, through various websites. Hope this helps!! :)

4 0
2 years ago
Many large IT departments use a(n) _____ team that reviews and tests all applications and systems changes to verify specificatio
mafiozo [28]

Answer:

Quality assurance team

Explanation:

Software development life cycle (SDLC) is a process or stages of processes a software application must go through to be materialized. The stages of SDLC are planning, design, implementation or development, testing or verification, deployment and maintenance.

An implemented software design must be tested. It is tested based on the pre-dertermined design and the quality standard of the company. A group of test expect are approached for this purpose, they are called the quality assurance team

They are equipped with skills to use third party applications to analyze and verify the quality of the developed software.

6 0
2 years ago
Design a hierarchy of classes, where the Media superclass has the artistName and the mediaName as the common attributes. Create
zaharov [31]

Answer:

See attached file.

Explanation:

See attached file for detailed code.

Download txt
7 0
3 years ago
Other questions:
  • Why would you want to minimize the Ribbon?
    11·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top
    8·1 answer
  • Assembly (Procedure and Conditional Processing). For the following program, what are outputs for register EAX, EBX, ECX, and EDX
    11·1 answer
  • When you are working in Performance Monitor, in the "Add Counters" dialog box, and need more information about a particular coun
    8·1 answer
  • Write a program that will remove "May" from the list using .Pop and .Index methods.(5pts) GIVEN: lst=["January", "February", "Ma
    15·1 answer
  • _____moves the head to proper track
    13·2 answers
  • The getElementById DOM Method do?
    13·1 answer
  • Read each of the following statements about Computer Science and explain why you think that statement is true.
    9·1 answer
  • The iso 14001:2004 standards require documentation of a firm's environmental program. Which component requires a plan to improve
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!