Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75). You should use input to read a string and float() to convert the string to a number. Do not worry about error checking the user input - assume the user types numbers properly.​

Answers

Answer 1

I've included my code in the picture below. Best of luck.

Write A Program To Prompt The User For Hours And Rate Per Hour Using Input To Compute Gross Pay. Pay

Related Questions

You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature, the model may result in.
1. Increase in R-square
2. Decrease in R-square
A) Only 1 is correct
B) Only 2 is correct
C) Either 1 or 2
D) None of these

Answers

Answer:

The answer is "Option A".

Explanation:

Add extra functionality, otherwise, it increases the R-square value, which is defined in the following points:      

To incorporate essential elements, R-square is explicitly promoted. It Increases the R-square value, which is an additional feature. It removes the features, which provide the value of the reduce R-square. After incorporating the additional features is used as the model, which is R-square, which is never reduced.

The opening on the front of a camera that regulates the amount of light entering the lenses is called:​

Answers

Answer:

The Aperture is part of the camera lens. It controls how much of the light that enters the camera lens reaches the image sensor which is located inside the camera

Explanation:

The coding system that has just two characters is called:

a
binary
b
dual.
c
basic.
d
double.

Answers

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

Functional languages like LISP are not composed of statements, but instead are a nested set of functions.
a) True
b) False

True
False

Answers

Answer:

True

In a purely functional language everything is a function and functions are based of other functions.

Answer:

true

Explanation:

What are some applications of a Router?

Answers

Applications of Routers. Routers are the building blocks of Telecom service providers. They are used for connecting core hardware equipment such as MGW, BSC, SGSN, IN and other servers to remote location network. Thus work as a backbone of Mobile operations.

4.9 Code Practice: Question 4 Edhisive

Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.

Sample Run
Enter Temperature: 27.6
Enter Temperature: 29.5
Enter Temperature: 35
Enter Temperature: 45.5
Enter Temperature: 54
Enter Temperature: 64.4
Enter Temperature: 69
Enter Temperature: 68
Enter Temperature: 61.3
Enter Temperature: 50
Sum = 504.3

Answers

i = 0

total = 0

while i < 10:

   temp = float(input("Enter Temperature: "))

   total += temp

   i += 1

print("Sum: {}".format(total))

I wrote my code in python 3.8. I hope this helps!

The program accepts 10 temperature inputs from the user, and takes the sum of the inputs gives before displaying the total sum of the temperature. The program is written in python 3 ;

temp_count = 0

#initialize the number of temperature inputs given by the user and assign to temp_count variable

sum = 0

#initialize the sum of the temperature inputs given

while(temp_count < 10):

#loop allows 10 inputs from the user

values = eval(input('Enter temperature : '))

#prompts user to input temperature values

sum+= values

#adds the inputted values to sum

temp_count+=1

#increases count of input by 1

print('sum of temperature : ', sum)

#displays the total sum

Learn more :https://brainly.com/question/18253379

Which line of code in this program is MOST likely to result in an error

Answers

Answer:

What are the choices?

Explanation:

Answer:

line 2 it needs quotation marks :D

Explanation:

who plays a role in the finanical activites of a company

Answers

Financial managers are responsible for the financial health of an organization. They produce financial reports, direct investment activities, and develop strategies and plans for the long-term financial goals of their organization.

HELP URGENTLY!!!!!

Elly supervises an eye doctors office. The office recently received new equipment. To keep that equipment working accurately and dependably, she should:
(Select all that apply.)

Copy the users manual and distribute to all the employees
Identify individuals to complete the tasks
Create a log to document maintenance
Set up auto reminders
Read the manual
List the maintenance tasks
Establish the frequency of the maintenance tasks
Update the software in the office

Answers

Note that where Elly supervises an eye doctor's office, and the office recently received new equipment, to keep that equipment working accurately and dependably, she should:

Copy the users manual and distribute to all the employeesCreate a log to document maintenanceSet up auto remindersRead the manualList the maintenance tasksEstablish the frequency of the maintenance tasksUpdate the software in the office.

What is the rationale for the above response?

In order to ensure that the equipment is working properly and optimally, Elly should distribute the user manual to all employees.

In addition, she should identify individuals to complete maintenance tasks, create a log to document maintenance, set up auto reminders, read the manual, list the maintenance tasks, establish the frequency of the maintenance tasks, and update the software in the office to keep new equipment working accurately and dependably. This will ensure optimal equipment maintenance and lifetime.

Learn more about equipment maintenance:

https://brainly.com/question/21853224

#SPJ1

Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
Explain how commit works in a multi-transaction / multi-system function and what would need to be in place for a rollback to be successful.
Explain how buffering of data achieves a more efficient way to do I/O. Why is it important to add buffering to I/O?
What is the difference between blocking calls and non-blocking calls? Explain 2 methods to remove blocking from your application.

Answers

Answer:

integrgrg

Explanation:

integrety or not iim not

Non-blocking code does not prevent execution from continuing while blocking code prevents execution from continuing until the operation is complete. Blocking calls hold off on returning until the I/O operation is finished. Synchronous results are returned from it.

What is the difference between blocking calls and non-blocking calls?

Blocking calls hold off on returning until the I/O operation is finished. Synchronous results are returned from it. During the waiting period, nothing else in that process happens. In contrast, a non-blocking call uses a different method to check for completion and returns right away without any results.

Non-blocking code does not prevent execution from continuing while blocking code prevents execution from continuing until the operation is complete. Blocking occurs when subsequent JavaScript in the Node. js process needs to wait until a non-JavaScript activity is finished, according to the documentation for the language.

A program that is non-blocking does not prevent the execution of subsequent operations. Non-blocking techniques run in an asynchronous fashion. Asynchronously refers to the possibility that the program may not always run line by line.

To learn more about blocking and non-blocking calls refer to:

https://brainly.com/question/14286067

#SPJ2

Write a statement that calls a function named IncreaseItemQty, passing the variable addStock. Assign mugInfo with the value returned by IncreaseItemQty.

Answers

Answer:

Explanation:

#include <stdio.h>

#include <string.h>

typedef struct ProductInfo_struct {

char itemName[30];

int itemQty;

} ProductInfo;

ProductInfo IncreaseItemQty (ProductInfo productToStock, int increaseValue) {

productToStock.itemQty = productToStock.itemQty + increaseValue;

return productToStock;

}

int main(void) {

ProductInfo mugInfo;

int addStock;

addStock = 10;

scanf("%s", mugInfo.itemName);

scanf("%d", &mugInfo.itemQty);

**** /* Your solution goes here */ ****

printf("Name: %s, stock: %d\n", mugInfo.itemName, mugInfo.itemQty);

return 0;

}

Answer:

#include <stdio.h>

typedef struct ProductInfo_struct {

  char itemName[50];

  int itemQty;

} ProductInfo;

ProductInfo AddToStock(ProductInfo productToStock, int increaseValue) {

  productToStock.itemQty = productToStock.itemQty + increaseValue;

  return productToStock;

}

int main(void) {

  ProductInfo mugInfo;

  int addStock;

  scanf("%s", mugInfo.itemName);

  scanf("%d", &mugInfo.itemQty);

  scanf("%d", &addStock);

mugInfo = AddToStock(mugInfo, addStock);

  printf("Name: %s, stock: %d\n", mugInfo.itemName, mugInfo.itemQty);

  return 0;

}

Explanation:

mugInfo holds both an int and a char

Write code that will read the contents of umich_buildings.json and load its value into the gobal variable umich_buildings. Note that umich_buildings will be a list.

Answers

Answer:

import json

umich_buildings = []

with open("umich_buildings.json", "r") as json_file:

   content = json.load(json_file)

json_file.close()

for value in content:

   umich_buildings.append(value)

print("the resultant is : ", umich_buildings)

Explanation:

The python source code gets information from a json file, it imports the json package and opens and assigns the json file "umich_building" to the variable "json_file" and continuously parse the json to python with the load() method, then append the items to the global list variable "umich_buildings"

All early programming languages were object-oriented.
a) True
b) False

True
False

Answers

Answer:

False.

Object orientation is a paradigm that came later.

Question #6
Fill in the Blank
You designed a program to create a username using the first three letters from the first name and the first four letters of the last na
name.
You are testing your username program again for a user whose name is Paula Mano.
The output should be
______.

Answers

Answer:

PauMano

Explanation:

those are the first 3 and 4 letters of the names

What manages and controls the speed of a motherboard's buses? *

RAM
CPU
Chipset
L1 cache

Answers

A bus is simply a circuit that connects one part of the motherboard to another. The back side bus connects the CPU with the level 2 cache. The processor determines the speed of the back side bus. The memory bus connects the northbridge to the memory.

I hope this helps

Chipset manages and controls the speed of a motherboard's buses, Items installed on the motherboard include the CPU and RAM.

What is the speed of a motherboard's buses?

The motherboard is managed by the chipset, it is used to transfer data to and from the CPU and other PC components or PCs.

The path on the motherboard of the PC used to carry data to and from the CPU and other PC components is known as a PC bus, commonly referred to as "the bus." This includes software-to-software communication. The backside bus's speed is set by the processor.

The northbridge and memory are linked by the memory bus. The southbridge is linked to the disk drives through an IDE or ATA bus. The video card is linked to the CPU, memory, and AGP bus.

Therefore, option C is correct.

Learn more about motherboards, here:

https://brainly.com/question/6968002

#SPJ2

Write a function named findmax()that finds and displays the maximum values in a two dimensional array of integers. The array should be declared as a 10 row by 15 column array of integers in main()and populated with random numbers between 0 and 100.

Answers

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Random r = new Random();

    int[][] numbers = new int[10][15];

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            numbers[i][j] = new Random().nextInt(101);

        }

    }

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            System.out.print(numbers[i][j] + " ");

        }

        System.out.println();

    }

   

    findmax(numbers);

}

public static void findmax(int[][] numbers){

    int max = numbers[0][0];

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            if(numbers[i][j] > max)

                max = numbers[i][j];

        }

    }

    System.out.println("The max is " + max);

}

}

Explanation:

*The code is in Java.

Create a function called findmax() that takes one parameter, numbers array

Inside the function:

Initialize the max as first number in the array

Create a nested for loop that iterates through the array. Inside the second for loop, check if a number is greater than the max. If it is set it as the new max

When the loop is done, print the max

Inside the main:

Initialize a 2D array called numbers

Create a nested for loop that sets the random numbers to the numbers array. Note that to generate random integers, nextInt() function in the Random class is used

Create another nested for loop that displays the content of the numbers array

Call the findmax() function passing the numbers array as a parameter

Let g(x) = cos(x/2) - 3x. Let f(x) = 2x + 5. What is g(f(x))?​

Answers

Answer:

f = 2

Explanation:

g(x) = cos(x/2) - 3x=w where w=-3.5 or -1 or -38.5

13– (13/2)-3*13=-3.5 (1st d value of g(x))

-1-(-1/2)-3*(-1)=-1 (the 2nd possible value)

g(x) = cos(x/2) - 3x=-1 where the first x=13 and the 2nd one=-1

where the first x=-1 and the 2nd one=-38.5 (the 3rd value)

g(x) = cos(x/2) - 3x)=0 where cos(x/2=-3.5

g(f(x)) = cos(f(x)/2) - 3 aka 0.5 f(x) = cos(2x+5 aka 7x) (x/2 - 3 =aka -1 );

(2x+5) = 7x by definition but the equation has to be set to 7 to find x)

(7x/2 -6x=0) -7 on both sides

x/2–6x=-7

x/2= 13

26/2=x

x=13 (these values are set up for 2x+5=7.

13-(-7)=-7

13-6+-1=-7

the 2nd x=-1

gfx=cos*2*x i.e cos*2*13 or cos*2*-1

cos*2*13=26

cos*2*(-1)=-1

cos=1

(cos*2*13)=the 1st gfx value=26 basically.

( cos*2*(-13)=-26 (the 2nd gfx value)

cos*2*(-1)=-`1 (the 3rd gfx value)

f=2

hope this helped!

how can i fix my code so that a teepee is properly formed? here is what i currently have (my output is uploaded as an image):

public static void teepee(int a){
for(int i=a; i>0; i--){
for(int j=a; j>0; j--){
System.out.print(" ");
}
System.out.print("/");
for(int k=i; k System.out.print(" ");
}
System.out.println("\\");
}
}

Answers

We are not sending them any other one tryin was there to a point that they had been doing the work for the first

Which fixed expense would be most difficult to change if money is needed for car payments? rent electricity cable Internet

Answers

Answer: rent

Explanation: just took the quiz on edge

Answer:

rent

Explanation:

took the quiz

Where should citations be included in your research paper? Select all that apply.
In the header
At the end of every paragraph
As footnotes
In a separate Works Cited page

Answers

Answer:

it would be the first one because it's the header and that's what applies

Given a binary search tree containing N integers, create an AVL tree containing the same values. You should not destroy the original BST in the process. What is the worst case time?

Answers

Answer:

answer : 0 (n log n )

Explanation:

Creating an AVL tree containing the same values and containing N integers and without destroying the original BST in the process, the worst case time will be : 0 ( n log n ) and this is because each insertion will take 0 (log n ) time

The worst case time for a binary search algorithm that contain N integers without destroying the original binary search tree (BST) is [tex]0(NlogN)[/tex]

What is a binary search?

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element from a sorted list of data, especially by using the run-time complexity of [tex]0(logN)[/tex].

Note: N is the total number of elements contained in a list.

In this scenario, the worst case time for this binary search algorithm that contain N integers without destroying the original binary search tree (BST) is given by [tex]0(NlogN)[/tex]

Read more on binary search here: https://brainly.com/question/24268720

A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.a. Intrusion prevention system b. intrusion detection system c. defense-in-depth strategy d. quantitative risk assessment

Answers

Answer:b. intrusion detection system

Explanation:

An intrusion detection system (IDS)  helps to  alert  service administrators   to detect suspicious or malicious activity  by monitoring and analyzing  specific patterns to network traffic. Most times, the IDS may be configured  to  respond to suspicious malicious traffic by  blocking the cyber attacker making  such IP address unable to access that particular  network.

An intrusion detection system (IDS)  can be either a Host Based Intrusion Detection Systems (HIDS) or a Network Based Intrusion Detection Systems (NIDS) depending on preference by the user.

It is therefore necessary for  businesses who require high level of security   to adopt good and effective  intrusion detection systems so  that the communication of information from businesses to businesses  can be safeguarded and secure from cyber attacks.

9.2.2: Output formatting: Printing a maximum number of digits. Write a single statement that prints outsideTemperature with 4 digits. End with newline. Sample output with input 103.45632: 103.5

Answers

Answer:

The single print statement that does the required in python is:

print("%.4g" % outsideTemperature)

Explanation:

The full program is as follows:

The first line prompts user for input

outsideTemperature = float(input("Outside Temperature: "))

To print significant figures, we make use of g formats. And this is implemented as follows:

print("%.4g" % outsideTemperature)

The above prints 4 significant digits of outsideTemperature

For other significant figures, simply change the 4 to another number

Which Packet Tracer feature do you think will be most helpful for you in learning how to manage a network

Answers

Answer:

Its ability to sniff and analyze packets in a network.

Explanation:

Network administrators require advanced skills and tools to manage a large network, to analyze packets as they are transmitted across the network.

Packet tracer helps to monitor the network connection and packet transfer. It informs the administrator of a dropped connection, slow transmission due to a bottle-neck, and many more packet related issues

A DVD-ROM can store more data than a CD-ROM of the same size. Comment.

Answers

Answer:

ya its true that DVD-ROM can store more data except CD-ROM

Explanation:

more dat saving in with DVD-ROM

1. What do you think of the use of Moore’s Law to hypothesize a timeframe for the origin of life?
2. How does Moore’s Law apply to the efficiency of algorithms as we discussed in the last class?
3. Where do you think computers will be in 10 years? 100?

Answers

Answer:

1. I think it was actually a very good idea. As time goes on technology is improved, new laws and theories are proven, scientists are disproven, and efficiency of doing certain tasks evolves. Another reason would be, why not? It does not hurt to make a hypothesis or try a new approach.  

1. We spend countless time exploring and digging only to possible never find what we need to exactly pin the first life forms on Earth and when they lived, why not try a new different angle. So, I think that it was a very clever and interesting to use and Moore's Law to hypothesis the origin of life.  

2. Moore's law applies to the efficiency of algorithms because he came up with a way to hypothesis were in technology we should stand after a certain amount of time and how much improvements should be integrated into our computers.

2. Moore’s Law applies to the efficiency of algorithms because Moore created a exponential equation and graph of a hypothesis proven to help guide engineers on a steady path of improvement should be made to  computer processors and components with in a certain amount of time.

3. In a 10 years I think computers would have only made simply yet very effective and efficient improvements. Like longer battery life, or faster speeds, but virus firewalls and defenders. But when faced with 100 years I think that would have lead to a huge drastic change to what the normal idea of a computer is. It would be so high tech to us but with the world our grandkids are living in it'll be normal to have holographic computers.

3. I think that in 10 years computers would have improved much like they have recently, smaller, more compact, faster, and longer lasting, but within 100 years we would have a another invention entirely. Computers would have changed so much more than we could have every thought.

Explanation: I put a few different answers for each question so you can mix and match and use what's easiest for you but both are correct.

An uniterruptible power supply

Answers

Answer:

An uninterruptible power supply  is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails.

Explanation:

Your welcome :) PLZ mark brainliest

A wireless network administrator is using 3 access points (APs) to cover an area. At some locations, all 3 APs may be in range of a single wireless device. What wireless channels should be assigned to the APs?

(Hint: Pick 3 different channels.)

a. 6
b. 7
c. 1
d. 3
e. 2
f. 4
g. 5
h. 8
i. 10
j. 9
k. 11

Answers

Answer:

A, C, and K

Explanation:

Wireless networks use access points ( APs) for wireless communication. The APs provide a collision avoidance channel for the connected devices. Devices communicating at a channel of a given frequency would experience signal interference, so all the connected APs in a wireless network is configured to operate in different channels with considerable differences in their frequencies.    

Nathaniel wanted to buy a microphone. He went to an electronics store and was told that there are actually two types of microphones that he can choose from. What are the two types of microphones that Nathaniel can choose from?
Nathaniel can choose either of two types of microphone: dynamic or ____ .

Answers

Answer:

Condenser Microphone

Explanation:

google

Feel free to make me brainlyest!

Answer: condenser

Explanation:

i took the test and got it correct

what is the art of prolonging the life of the food items that are available​

Answers

Answer:

Food preservation.

Explanation:

Food preservation can be defined as an art that typically deals with the process of preventing food spoilage by reducing or mitigating the growth of microorganisms and other external factors while maintaining the nutritional value, flavor and texture of the food.

Some of the factors that causes food spoilage include microorganisms (bacteria, yeast and molds), temperature, moisture content, oxidation etc.

Hence, food preservation is the art of prolonging the life of the food items that are available.

Basically, there are physical, chemical and biological methods which can be used to prolong the life of food items and thus sustaining the edibility and nutritional value of foods. These methods are;

1. Freezing.

2. Pasteurization.

3. Drying.

4. Retorting.

5. Thermal sterilization.

6. Fermentation.

7. Irradiation.

Other Questions
Evaluate the expression 2 52 5 + 8 answer this i need it quick PLEASE let it be said that the negro soldier did his duty under the flag whether that flag protects him or no? summarize the meaning of the quote? Which graph is the solution of the following systems HELP ON ON GRADPOINT how do I solve 9x-4= -44 Which of the following statements best describes thestructure of Gloria Steinem's address?A Steinem introduces her support for the ERA, liststhe harmful myths about women, provides evidenceto disprove each myth, and concludes with theadvocacy of full constitutional rights.0 B Steinem describes how the myths about womenhave personally affected her life.C Steinem makes a point about why the ERA isimportant and argues with anyone who disagreeswith her (i.e. Mrs. Wolfgang).D Steinem introduces her support for the ERA,compares the marginalization of women to that ofblack men, and concludes with a call for both partiesto receive full constitutional protection. A market economy is not based on _____.a votehaving no choicespersonal choicethe public A rocket is fired in deep space, where gravity is negligible. In the first second it ejects 1/160 of its mass as exhaust gas and has an acceleration of 14.0 m/s^2.Required:What is the speed vgas of the exhaust gas relative to the rocket? A line with a slope of 3 passes through (2,5). Which choice is an equation of this line? Which is the best example ofparaphrasing for the followingpassage?42Well-a-well, we've all got togo, they ain't no gettingaround it. Man that is born ofwoman is of few days and farbetween, as Scriptur' says.Yes, you look at it any wayyou want to, it's awful solemnand cur'us: they ain't nobodycan get around it; all's got togo--just everybody, as youmay say.A. The Bible says that one day, everyonemust die. No one can escape death,B. The Bible says that if a man is born to awoman, then he will die.C. The Bible says that no one can avoidbeing born Read the excerpt from "Opening Ceremonies of the New York and Brooklyn Bridge" by Hon. Seth Low, Mayor of the City of Brooklyn.Brooklyn becomes available, henceforth, as a place of residence to thousands, to whom the ability to reach their places of business without interruption from fog and ice is of paramount importance. To all Brooklyn's present citizens a distinct boon is given. The certainty of communication with New York afforded by the Bridge is the fundamental benefit it confers.Read the following summary of the excerpt.It is great that the Brooklyn Bridge finally created new business opportunities by allowing the citizens of Brooklyn to easily commute to Manhattan.Which of the following flaws can be found in this summary of the excerpt?The summary gives the readers personal opinion.The summary does not include the main idea.The summary is written in the mayors words.The summary includes unimportant details. SCIENCE; Give an example of a landform caused by weathering. State if your example is a result of chemical or physical weathering.HELP ITS DUE PLEASE Question 51 ptsWhat organelle of a cell has the genetic information?O VacuoleO MitochondriaChloroplastO Nedeus Find the equationof a circle whose centre is (-3-15) and passing point (5,-1) find the equation of circle.. Study the map of US climate regions.A map of climate regions in the United States. A key notes the types of climates. The Southeast has a Humid subtropical climate. The Northeast has Humid continental (warm) and Humid continental (cool) climates. The Southwest has arid and semiarid climates. The West Coast has Mediterranean, Marine West Coast, Arid, and Humid continental (cool) climates. The Midwest has Semiarid, Humid continental (cool and warm), and Humid subtropical climates.Which climates are primarily experienced in the Southwestern states of Arizona and New Mexico? Select three optionsaridsemiaridMediterraneanhumid subtropicalmarine west coasthumid continental (warm) T (escribir) A. escribe B. escribes C. escribo D. escriba please help. what happens to a monomer once it is used to create a polymer?A. the monomer can be reused once the polymer is deconstructedB. the monomer is destroyed C. The monomer is permanently part of the polymer D. Escribe una frase original segn el modelo. 16 puntosmodelo: ellos/ir -- Ellos habran ido pero no fueron porque ya haban ido.1. yo / visitar / Crdoba2. ellos / ir / banco3. ella / lavar / ropa4. nosotros / pedir / prstamo5. t / decir / respuesta6. ustedes / ayudar7. ella/hacer / viaje8.yo / salir What inputs of this function have an output of -2? Find the density of a liquid, in lb/ft^3, that exerts a pressure of 0.400 lb/in^2 at a depth of 42.0 in.