How electricity usage file the amount of electricity

Assignment Help Computer Engineering
Reference no: EM1334876

An electricity supply authority records on an electricity usage file the amount of electricity that each customer uses. This file consists of:

- a header record (first record), which provides the total kilowatt hours used during the month by all customers
- a number of detail records, each containing the customer number, customer name and electricity usage (in kilowatt hours) for the month.

Design a solution algorithm that will read the electricity usage file and produce an electricity usage report showing the customer number, customer name, electricity usage and the amount owing. The amount owing is calculated at 11 cents for each kilowatt hour used, up to 200 hours, and 8 cents for each kilowatt hour used over 200 hours. The total electricity usage in kilowatt hours is also to be accumulated.

At the end of the program, compare the total electricity usage accumulated in the program with the value provided in the header record, and print an appropriate message if the totals are not equal.

Reference no: EM1334876

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Program to experiment various sort algorithms

Develop a program which enables you to experiment along with the various sort algorithms. This program must allow you to easily plug-in the new sort algorithms and provide comparison between them.

  Explain protocol and network switching device

An area along the north wall of the coffee house has been set aside for the five computer stations, and since this is a very popular local hangout, it is expected that the computers, as well as wireless connections, would be in constant use. She i..

  Give differences between human centered and user centered

What are the differences between "human centered" and "user centered" approaches? Do you agree that human centered approach is more effective? Why or why not?

  What is the best process to prevent it

What is the best process to prevent it. What is your experience with Spam? How is spam affecting the Internet as a whole.

  Suggestions for ensuring an adequate change control

What are two suggestions for ensuring the adequate change control on projects that involve outside contracts.

  What type of procedures might a company put into place

What are some common steps and what type of procedures might a company put into place.

  Describe the behaviour of the delete operation

What changes will you make to the above axioms in order to carry out the other two types of deletion discussed in class.

  What is "fit software tests to code needs"

According to the article "Fit Software Tests to Code Needs," why are coding standards important to testing? How can programmers and testers work together to create program testing more efficient and effective?

  Peer-to-peer networking

Explain the term peer-to-peer networking? Describe why is bit torrent regarded to be a more efficient protocol? In the bit torrent context, explain how seeders and the leechers work.

  Describe disparity between vulnerability, threat and control

Describe disparity between vulnerability, threat and control

  Create a gui front end for bubble sort

This is what I want to achieve. I have an array of positive integers that I wish to sort according to the sequence represented by the integer number line

  Write a c function named change that has a floating point

Call the function change from main function three times and print out the contents of the variables quarters, dimes, nickels, and pennies after each function return.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd