Preview

It/210 Appendix G Essay Example

Satisfactory Essays
Open Document
Open Document
321 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It/210 Appendix G Essay Example
Associate Program Material
Appendix G

Sequential and Selection Process Control Structure

In the following example, the second line of the table specifies that tax due on a salary of $2,000.00 is $225.00 plus 16% of excess salary over $1,500.00 (that is, 16% of $500.00). Therefore, the total tax is $225.00 + $80.00, or $305.00.

Salary Range in Dollars Base Tax in Dollars Percentage of Excess
1. 1 0.00-1,499.99 0.00 15 %
2. 2 1,500.00-2,999.99 225.00 16 %
3. 3 3,000.00-4,999.99 465.00 18 %
4. 4 5,000.00-7,999.99 825.00 20 %
5. 5 8,000.00-14,999.99 1425.00 25 %

Input Process Output
First Name
Last Name
Gross Salary Get user Input First Name
Last Name
Gross Salary
Gross Salary Determine Range Category Salary Range
Salary Range Category
Percentage of Excess Base Tax Determine Base Tax and Percentage of Excess Percentage Excess Total Base Tax
Net Salary Determine Net Salary Net Salary
First Name
Last Name
Gross Salary
Net Salary Display Net Salary Full Name
Gross Salary
Net Salary

Main Module

Declare name as string
Declare salary as real
Declare excess as real
Declare base as real
Call input data module
Call salary range module
Call range1 module
Call range2 module
Call range3 module
Call range4 module
Call range5 module
Call output module
Call start over module

End Main Module

Input Module
Write, “employees first name”
Input first name
Write, “employees last name”
Input last name
Write, “employees gross salary”
Input gross salary

End Input Module

Call Salary Range Module

If gross salary < 1,499.99
Then Call range1 module
If gross salary > 1,499.99 and 2,999.99 and 4,999.99 and 7,999.99

You May Also Find These Documents Helpful

  • Good Essays

    The objective of this project is to help train DC Construction staff with their BRIX problems by planning how to operate the new system. The company will provide 20 laptops for this training session. When DC Construction changes their BRIX system, they will also change their financial system. Currently all locations have trouble with the financial and accounting system. The sites do not have a standard system, which may have contributed to the problem. The new STIX system will allow each site to have a high of compatibility through a standardized operating system. The company will implement the new system in six months, and will be operational, company wide, by August 30 next year. A development team will come up with a project plan to update DC Construction’s BRIX system. Management will be notified of any resources they may need to accomplish this task.…

    • 717 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    4. The calculation should be executed only after all the valid input values are provided.…

    • 1488 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Company 1: The Bloom Design Group - The mission critical business systems and services that must be protected would be the customer, suppliers, and business information, credit card or banking information made for purchases of paint and other supplies. Business database systems also must be protected. All the company and Website applications must also be protected under the DRP.…

    • 656 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Here we have plugged in the values into our formula. When solving we do order of operations first and we will solve exponents first.…

    • 652 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Domain members rely heavily on DNS services to locate domain resources. For example, when a domain-joined computer boots, it queries domain Service Locator records (SRV) in DNS to locate a Domain Controller against which to authenticate. Without a local DNS instance, this process has to take place over a potentially slow site link. Of course, once a computer has located a Domain Controller, it will continue to authenticate against that server until it something forces the client to find another DC.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    chapter 5 solutions

    • 877 Words
    • 6 Pages

    5–5A.(a)Yes. Donner Company meets the test of having paid wages totaling more than $1,500 during any calendar quarter of the current year.…

    • 877 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Peachtree is an accounting software program sold by Sage, whose parent company is the Sage Group. The software is geared for use by small- to medium-sized businesses and has progressed through several generations over the years since its conception. Initially, Peachtree was sold by Peachtree Software, a company that was established in 1978. Peachtree accounting software was acquired by the Sage Group in 1998.…

    • 3450 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    |Informed Consent |Explanation of the risks and benefits of a treatment or |Patient and attending |Before anesthesia and |…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I believe the site was authentic a lot of information was provided within the article along with illustration…

    • 621 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I will go through each page of my paper and remove the use of first person. I will rewrite each sentence properly in third person. I will also review the material in the Center for Writing Excellence that will help me better understand how to use third person correctly.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Directions: Assume that you are on the school board of your school district and you are tasked with the job of strategic planning for issues facing your district. Complete the matrix below to determine the potential response of each of the religious groups in your community. Use the attached links to research the basic moral and ethical principles believed by each group. Then determine how you believe each group will react to the issue based on what you find. Provide a brief justification for your answer. After completing the matrix, write a 300- to 500-word summary of the significant similarities and differences among the different religious groups.…

    • 1333 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    In the scenario provided, Sarah portrays several aspects of social psychology. The first is her attitude towards her curfew. She is shown to be obedient towards the curfew, but is persuaded by her new friends through the peripheral route because she likes them and, lastly, was having fun enough that she felt she could ignore her curfew. This also opens her up to cognitive dissonance in that she knows she needs to be obedient and obey her curfew but she also is having a good time with her friends and does not want to go home, causing a conflict in beliefs. She conforms quite a bit to her new friends’ beliefs, first by staying out with them, then by leaving with them when they did due to the fight, and in general just staying grouped with them. She did these things due to normative social influence but also because she hoped they would continue inviting her out and her new friends were popular. The scenario then shows how Jack was attracted to Sarah due to physical attraction, proximity, and similarity and wraps up with a display of hostile aggression and the end of the party due to the cathartic reaction. Each of these displays of the aspects of social psychology can be displayed further in-depth.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab Manual

    • 2195 Words
    • 9 Pages

    Unified Modeling Language is a standard language which is used to develop the object oriented software and software development process. UML DIAGRAMS ARE: USE CASE DIAGRAM SEQUENCE DIAGRAM CLASS DIAGRAM USE CASE DIAGRAM: A Use case is a set of scenario that describes an interaction between user and a system. A Use case diagram displays the relationship among Actors and Use cases. The two main components of Use case diagrams are: 1. Use cases Functions 2. Actors-User…

    • 2195 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Rs 22000 for the three values to 10,8 and 6 employees respectively, while firm Q…

    • 1683 Words
    • 7 Pages
    Good Essays