subject

Design a payroll class with the following fields: • name: a string containing the employee's name • idnumber: an int representing the employee's id number • rate: a double containing the employee's hourly pay rate • hours: an int representing the number of hours this employee has worked the class should also have the following methods: • constructor: takes the employee's name and id number as arguments • accessors: allow access to all of the fields of the payroll class • mutators: let the user assign values to the fields of the payroll class • grosspay: returns the employee's gross pay, which is calculated as the number of hours worked times the hourly pay rate. write another program that demonstrates the class by creating a payroll object, then asking the user to enter the data for an employee in the order: name, id number, rate, hours. the program should then print out a statement in the following format (for example, if you had an employee named chris jacobsen with id number , who works for 5 hours at $10/hr): chris jacobsen, employee number , made $50.00 in gross pay. using text forming so that the gross pay is rounded to two decimal places.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 08:00
How can smart devices benefit businesses, organizations, and social communities in the global marketplace?
Answers: 1
question
Computers and Technology, 24.06.2019 16:30
What is the item which could be matched with a statement below? software installed on a computer that produces pop-up ads using your browser an example of social engineering malware loads itself before the os boot is complete type of spyware that tracks your keystrokes, including passwords windows key + l the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer when someone who is unauthorized follows the employee through a secured entrance to a room or building a type of malware that tricks you into opening it by substituting itself for a legitimate program a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Answers: 1
question
Computers and Technology, 25.06.2019 00:30
How do i take a screenshot on a laptop?
Answers: 2
question
Computers and Technology, 25.06.2019 01:30
The study of how to design software, solve problems such as computer security threats, or come up with better ways of handling data storage
Answers: 1
You know the right answer?
Design a payroll class with the following fields: • name: a string containing the employee's name...
Questions
question
Mathematics, 21.05.2020 08:57
question
Mathematics, 21.05.2020 08:57
question
Biology, 21.05.2020 08:57
question
Biology, 21.05.2020 08:57