answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skad [1K]
2 years ago
11

Use a basic list structure to enhance Functionality 1 that you developed in Week 1. You should allow users to enter information

for five employees at the same time, where the first employee information entry is saved in index [0] and the second entry is saved in index [1], and so on. You want to make sure to enforce the user to enter the following employee information: employeeName, employeeSSN, employeePhone, employeeEmail, employeeSalary. After the user finishes entering the last employee information, they should get a message to allow them to print specific employee information from the saved list. The user can enter values between 1 and 5, where 1 will return the employee information saved in the list index [0], 2 will return the employee information saved in the list index [1] and so on. The printed result should be in the following format:
Mike Smith, 123123,(111)222-3333,mikeemail,$6000
Computers and Technology
1 answer:
grandymaker [24]2 years ago
7 0

Answer:

Python code is given below

Explanation:

# Create an empty  list

employees = []

for i in range(5):

   print('Enter information for employee number ' + str(i + 1) + ':')

#entering the employee details as input

   name = input('Enter employee name: ')

   ssn = input('Enter employee SSN: ')

   number = input('Enter employee number: ')

   email = input('Enter employee email: ')

   salary = input('Enter employee salary: ')

   employees.append([name, ssn, number, email, salary])

index = int(input('Enter value from 1-5 to print employee information and 0 to exit:'))

while index != 0:

   employee = employees[index - 1]

   print(employee[0] + ', ' + employee[1] + ', ' + employee[2] + ', ' + employee[3] + ', $' + employee[4])

   print()

   index = int(input('Enter value from 1-5 to print employee information and 0 to exit:'))

You might be interested in
n the video, McWhorter says that “textspeak” might be a good thing for young people’s brains. Why does he think this?
ANEK [815]

As you may know people learn in different ways. Some learn by audio, hands on, and simply just reading. When he says textspeak it more than likely means the text will be read to you in a way you would understand better.

3 0
2 years ago
5.16 *zyLab: Hello IDE The goal of this problem is learn how to use Eclipse or IntelliJ. Submit the source code files (.java) be
givi [52]

Answer:

import java.util.Scanner;

public class HelloIDE

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter your name: ");

 String name = input.nextLine();

 

 name = name.trim();

 

 if(name.equals(""))

     name = "stranger";

     

 System.out.println("Hello, " + name + "!");

}

}

Explanation:

import the Scanner class to be able to get input from the user

Create an object of the Scanner class called input

Ask the user to enter the name and set it to the name

Trim the name using trim() method, removes the whitespaces from the string

Check the name. If name is equal to "", set the name as stranger. This way if the name is empty, or just contains whitespaces or if name is not given, name will be set as stranger.

Print the name in required format

8 0
2 years ago
The video clip on driverless cars explained that brain signals from the individual wearing the headset are converted by computer
Olegator [25]
A saftey issue because what is the car malfunctions or red light or police jus drive yo own car
5 0
2 years ago
Read 2 more answers
If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to st
USPshnik [31]

Answer:

If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.

Explanation:

Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall

6 0
2 years ago
In __________ mode, the data within an ip packet is encrypted, but the header information is not.
Anvisha [2.4K]

Answer:

Transport mode

Explanation:

The host-to-host transport mode of internet protocol security (IPsec) is mostly used between two host devices or between a user and a server. When you go online and Google something, what you have done is send a packet request to a server. The IPsec’s transport mode offers secure protection to parts of this IP packet. The packet consists of the original IP header and an IP payload (TCP header and data). In transport mode, only the IP payload is encrypted. The original IP header is not.

6 0
2 years ago
Other questions:
  • Which option describes wearable technology?
    5·2 answers
  • ​identify a text-level element used to mark generic run of text within the document.
    15·1 answer
  • What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
    6·1 answer
  • Which feature of Badoo helped members make their profile more prominent?
    14·1 answer
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • Instructions:
    14·1 answer
  • Program MATH_SCORES: Your math instructor gives three tests worth 50 points each. You can drop one of the test scores. The final
    7·1 answer
  • Write a C program that creates two threads to run the Fibonacci and the Runner processes. Threads will indicate the start and th
    14·1 answer
  • Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
    12·1 answer
  • A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!