How do you do this using just basic v programing

Assignment Help Computer Engineering
Reference no: EM132087396

The owners of the Super Supermarket would like to have a program that computes the monthly gross pay of their employees as well as the employee's net pay.

The input for this program is an employee ID number, hourly rate of pay, and number of regular and overtime hours worked. Gross pay is the sum of the wages earned from regular hours and overtime hours; overtime is paid at 1.5 times the regular rate.

Net pay is gross pay minus deductions. Assume that deductions are taken for tax withholding (30 percent of gross pay) and parking ($10 per month). You will need the following variables:

employeeID

grossPay

hourlyRate

Tax RegHours

parking

overtimehours

netpay

How do you do this using just basic v1.01 programing?

Reference no: EM132087396

Questions Cloud

Compute the cost of the ending inventory : isa Company had 264 units in beginning inventory at a total cost of $31,944. Compute the cost of the ending inventory and the cost of goods sold
Was communism in many ways no different than nazism : 1. Was Communism in many ways no different than Nazism? Discuss.
Control of resources in sphere of the world : How did Social Darwinism play into Japan's quest for control of resources in its sphere of the world?
Should sanchez start accepting credit cards and debit cards : Should Sanchez start accepting credit cards and debit cards? Show the computations of net income under her present arrangement and under the plan
How do you do this using just basic v programing : The owners of the Super Supermarket would like to have a program that computes the monthly gross pay of their employees as well as the employee's net pay.
Prepare a schedule that shows the net cash flow : Ballard Co. reported $145,880 of net income for 2014. Prepare a schedule that shows the net cash flow from operating activities using the indirect method
Create your own unique full example for the 2 vulnerability : Create your own unique, full example for each of the 2 vulnerabilities in this category. Demonstrate for each of the two applications they are vulnerable.
Write a memo explaining what cloud computing is : The owner of CSM Tech Publishing is always thinking about how he can use technology to improve the operation of his business.
Create potential new opportunities from trial : Design teams isolated purposefully to keep from being interrupted - company culture of innovation goes beyond the individual teams and must be fully adopted

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd