Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You are to develop a budgeting report for a local company using a C++ program. There are two input files. The first input file lists the individual areas a budget has been defined for. Two of these are the two checking accounts where the budget is the amount of money in the accounts. The 'ledger.dat' file contains the list of budget areas.

A second file contains the list of invoices and written checks against a given budget.
You are to read in the second file 'journal.dat' and update the value in each of the budgeted areas.
Print out a report showing the budgets and their current values. Some will be under and other will be over budget.

Use an array of structures to hold the data. Use pointers to move through the array (no subscripts syntax). Read in the 'ledger.dat' and initialize the array of structs. Read in the 'journal.dat' and update the values in the array of structs.

Format of 'ledger.dat' file.
budget# budget name initialValue

Format of 'journal.dat' (More data on a line of input than you need.)
Budget# Number? date ExpenseAreaText ExpenseValue
ExpenseValue is a positive for cost and negative for deduction

Print out a nice table (using pointers) of the budget areas and the resulting balance.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9202242

Have any Question?


Related Questions in Computer Engineering

Need a use case diagram for a case studythe case studypaul

Need a use case diagram for a case study: The case study Paul is the Director of IT Services for a consulting firm Avant. The firm has been growing fast since it was launched in 2010. With over 100 employees and hundreds ...

Question the use of encryption can have adverse effects on

Question: The use of encryption can have adverse effects on incident response and incident investigations; however, from a security standpoint, encryption is a major component in network confidentiality. Present your arg ...

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

You are the senior information security manager for a

You are the senior information security manager for a federal agency. You received a phone call from an employee stating that his laptop was stolen from his workstation. He tells you that the laptop has at least 20 cases ...

Question 1 explain the various types of green architecture

Question: 1. Explain the various types of Green architecture within the enterprise, such as information architecture and solutions architecture. 2. Explain how a Green systems architecture evolves from a basic to a linea ...

Subnetting1 as system administrator you need to create 10

Subnetting 1) As system administrator, you need to create 10 subnets for the Network Address: 192.168.1.0 with a minimum of 10 hosts per subnet. Room for future expansion to more subnets is desirable. Create a table with ...

Scheduling algorithms are again becoming more important as

Scheduling algorithms are again becoming more important as we look at operating system that run on mobile devices. Are their scheduling algorithms different from those found on traditional interactive system? Compare and ...

Systems analysis chapter 6 please answer the four questions

Systems analysis chapter 6: Please answer the four questions at the tasks section Campus Bikes is a popular bicycle shop located near a major university. The business has grown and the owner, Mark Turner, wants to instal ...

Question suppose that we have a computer that can test 240

Question : Suppose that we have a computer that can test 2 40 keys each second. What is the expected time (in years) to find a key by exhaustive search if the keyspace is of size 288? What is the expected time (in years) ...

Question the chief technology officer cto has indicated

Question: The Chief Technology Officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked fo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As