1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
3 years ago
10

A small company is moving all its employee data to a computer. To make a smooth transition, a software program will permit the d

ata entry personnel to enter data into a file. Design a program that writes the employees.dat file. The program should accept user input until the user indicates there are no more records to write. The Employees file contains four fields (see the Input File Description). The program will use the employee ID as criteria to determine a current employee. Validate the employee ID and employee wage fields per the requirements below. You may use any of the library functions presented in Chapter 6 of the textbook to assist in validation. Your validation routines should include error messages and allow the user to correct an input error. Use an array to hold the valid ID numbers.
Input File Description:
File: employees.dat
Field Description Data Type
Employee first name String
Employee last name String
Employee ID # String
Employee Hourly Wage Real (2 decimal places)

Output Report - Printer Spacing Chart:
GTC1305 Company
Employee Report
Employee Name Identification Number Wage

XXXXXXXXXX XXXXXXX XXXXXXXXXX $Z9.99
Computers and Technology
1 answer:
Llana [10]3 years ago
7 0

Answer:

Explanation:

This program should hold three functions for easy usage. The first will be a main function, the second will be a check function, the third will be a write function.

Main function:

First task should be to create the file using different functions which ae different for every language, like in java the function FileOutputStream will be used to make the file and PrintWriter can be used to enter data into the aforementioned file.

FileOutputStream fout=new FileOutputStream("employees.dat");

PrintWriter pw=new PrintWriter(fout);

or

PrintWriter pw=new PrintWirter(new FileOutputStream(“employees.dat”));

What we will do next is to run a do while loop which asks for the employee ID. Then it checks whether the ID is valid or not using the check function. If is comes out to be valid, then we will send the id to the write function where the further details of the employee will be asked. If it comes out to be invalid, an error message is to be printed stating that the input is wrong. Finally, we will ask the number that whether they want to enter more data. This condition will be put in the while and it will terminate the loop once the user says no more data.

Check function:

We will take a flag variable throughout the function which will keep track whether the number is valid or not.

Firstly, we will check that the entered id is less than 10 characters long. If no, then change the flag variable to invalid.

There are 5 valid id numbers that an entered id number must contain. These 5 can be entered into the system as an array.

Then in a loop we will check that whether one of these exists as a substring of the entered number.

boolean check=false;  

//here check is the flag variable. If it remains false, it means that the entered ID is not valid.

if(length<=10)

           {

               String chch[]={"RE49762358","PR156125","OF45461","RE68566547","PR156984"};

               for(int i=0;(i<5)&&(!check);i++)

               {

                   int len1=chch[i].length();

                   for(int j=0;(j<=len-len1)&&(!check);j++)

                   {

                       String check12;

                       if(j+len+1==len)

                       check12=str.substring(j);

                       else

                       check12=str.substring(j,j+len1);

                       if(check12.equals(chch[i])){check=true;}

                   }

               }

           }

After the completion of loop, we can check return the flag variable to the main function.

Write function:

The print writer function written before shows it work here. First, we input the employee first name, last name and the employee hourly wage from the user. Do have a check statement for the hourly wage to be less than $45.50. If all conditions are fulfilled, then print all the details to the file.

pw.println(first_name);

pw.println(last_name);

pw.println(employee_id);

pw.println(hourly_wage);

pw.flush();            

You might be interested in
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
A researcher develops a new instrument to measure coping skills and conducts a pilot study to compare the new tool with an exist
alexira [117]

Answer:b)convergence.

Explanation: Convergence has the basic meaning as when two or more unit of anything meet to converge or join. In the research , the different types of the tools are brought togather and skills and compare them.The measurement is done through the tools which has the already defined parameters.

Thus this concept is the example of the convergence because the tools are being converged and compared.so, the correct answer is option (B) and other option are incorrect because they have the technique of the contrasting and separation and reading respectively.

3 0
3 years ago
A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
Alexxx [7]

Answer: (C) MAC

Explanation:

MAC is stand for the message authentication code and it is one of the key dependent hash function. Message authentication provide the data integrity and also the origin of data authentication.

  • It basically allow the specific recipients known as the holder of the symmetric key.
  • The message authentication code uses the CBC (Cipher block chaining) mode for constructing the MAC algorithm and it also uses the block cipher for the conjunction by using the CBC operations.    

On the other hand, all the options are incorrect as they are not the key dependent hash function.

Therefore, Option (C) is correct.

7 0
3 years ago
What is a computer?<br>please solve with explaining ​
ivann1987 [24]

Answer:

computer is a device for storing and processing data and also to communicate with people

5 0
2 years ago
To erase a character to the right of the insertion point, press the ____ key(s).
jeka94
<span><span>CTRL+HOME then delete, backspace, end.</span></span>
8 0
3 years ago
Other questions:
  • If you use the ___ template, as opposed to a formatted theme, you must make all design decisions?
    15·1 answer
  • To make sure that you do not get too tired when typing for long periods, how often should you get up and stretch? Every 15 minut
    9·1 answer
  • on average, someone with a bachelor’s degree is estimated to earn _______ times more than someone with a high school diploma
    13·1 answer
  • Why you should care about copyright
    13·1 answer
  • To under a clip art you must do the following.
    14·1 answer
  • In a CPMT, a(n) ____ should be a high-level manager with influence and resources that can be used to support the project team, p
    10·1 answer
  • The file descriptor stderr is represented by the number ____.
    6·1 answer
  • An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 1
    9·1 answer
  • write ms-dos command to list all the files and folders of EIGHT sub directory of C: drive in ascending order according to file n
    5·1 answer
  • FoRWarD MaRcH AND hERe We Go MEMbers of the agEncy BaKuGO AHHHHHHHHH-
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!