Test debug and execute the java program

Assignment Help Basic Computer Science
Reference no: EM131229586

Perform each of the following steps:

a) Read the problem statement.

b) Formulate the algorithm using pseudocode and top-down, stepwise refinement.

c) Write a Java program.

d) Test, debug and execute the Java program.

e) Process three complete sets of data.

(Sales Commission Calculator) A large company pays its salespeople on a commission basis. The salespeople receive $200 per week plus 9% of their gross sales for that week. For example, a salesperson who sells $5,000 worth of merchandise in a week receives $200 plus 9% of $5000, or a total of $650. You've been supplied with a list of the items sold by each salesperson. The values of these items are as follows:

880_728b52eb-5dfb-4b8c-8754-b985627a0d59.png

Develop a Java application that inputs one salesperson's items sold for last week and calculates and displays that salesperson's earnings. There's no limit to the number of items that can be sold.

Reference no: EM131229586

Questions Cloud

Briefly describe relevant signs of the ad : Briefly describe relevant signs of the ad analyze the relevant signs used in the ad and how they are put together to create a certain meaning
Explain your understanding of the bioethical dilemma : Explain your understanding of the bioethical dilemma that exists. Explain (briefly) the nature of consequentialist ethics using one or more philosophers. Demonstrate how issues in consequentialist ethics apply to this case.
Business torts and ethics paper : You own University Heights Apartments, a business that rents primarily to students.  One evening, your tenant Sharon is attacked by an intruder who forces the lock on the sliding glass door of her ground-floor apartment.
Determine or influence the recommendation for action : How does the theory determine or influence each of their recommendation for action? What theory do you agree with? How would the theory determine or influence the recommendation for action?
Test debug and execute the java program : Develop a Java application that inputs one salesperson's items sold for last week and calculates and displays that salesperson's earnings. There's no limit to the number of items that can be sold.
Determine initial investment and operating cash inflows : For each of the two proposed replacement presses, determine Initial investment, Operating cash inflows (Note: Be sure to consider the depreciation in year 6.) and Terminal cash flow (Note: This is at the end of year 5.)
Why are organizational subcultures important : Why are organizational subcultures important? Can you imagine an effective use of subcultures within an organization?
Identify a boundaryless organization : Research and identify a boundaryless organization of your choice. Is the organization successful? Why or why not? Who are they partnering with? What do you think are the advantages and disadvantages of being boundaryless?
Describe the issues involved in terms of ethical theories : Describe the issues involved in terms of ethical theories. Explain the ethical position of the research company, citing philosophers who support it. Explain the ethical position of the opponents of the agreement, citing philosophers who support it.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Height of the missile

If a missile is launched from a station 200 meters above sea level with an initial velocity of 500m/sec, what is the height of the missile after 4 seconds?

  Type of fuel should you mix

Suppose a car can run on ethanol and gas and you have a 15 gallons tank to fill. You can buy fuel that is either 30 percent ethanol or 80 percent ethanol. How much of each type of fuel should you mix so that the mixture is 40 percent ethanol?

  Principals of information security

Principals of Information Security 5th Additioin Whittman1.  Identify the six components of an information system and which are the most direcctly impacted by the study of computer security.

  Compute the jaccard similarity of each of the pairs

Compute, for each pair of columns of that figure, the fraction of the 120 permutations of the rows that make the two columns hash to the same value.

  How the pages hold style continuity in grid system

Export the finished article as PDF format AND also give me the original indesign file, and the fonts you used.

  Write a program to fetch state and marital status of 5 users

Write a program to fetch state and marital status of 5 users.

  Derive the expected mean squares for a balanced

Derive the expected mean squares for a balanced three-stage nested design, assuming that A is fixed and that B and C are random.

  Print the perimeter and area of a rectangle

This program displays information about a rectangle drawn by the user.

  What operations can you perform on pointers

How would you initialize a pointer that you do not want to point to anything? What is a null pointer and how do you create it?

  Scheduling schemes relative to the rate-monotonic

Find out their details and briefly describe how they work and co-exist with each other as well as the non-real-time mechanisms. What are the pros and cons of these scheduling schemes relative to the rate-monotonic realtime scheduling?

  Basic components required to set up a network

What are the basic components required to set up a network? How do you add a PC to a network?

  Two aspects of data management

There are essentially two aspects of data management: data definition and data manipulation. Data definition is operationalized by way of data definition languages (DDL).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd