Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Go to http://www.softintegration.com/ and download Ch 7.0.  You will need to click on “Ch Standard and Student editions free” then click the “Download Now!” button.  You will be asked to register with the site.  They will send you a confirmation email with a password (use your school email address), then you can log in to the site.  Follow the instructions from there.

 A) Command Mode

College life is tough.  Eating pizza for every meal is hitting you hard.  You are looking at working out to stay healthy.  You found a web site which tells you how many calories each exercise burns.  As a part of the planning, you require to find out how long it will take you to burn off your lunch.  A normal 14 inch pepperoni pizza has 2480 calories with 310 calories per slice.

For this part of the assignment, you would be using the Ch command-line interface.  Use the instructions given at the end of this portion of the assignment.

• Declare four floating point variable called Calories, Time, CPH and Slices. float Calories, Time, CPH, Slices;

• prepare the input statement for CPH and then (at the prompt) enter the value representing the average calories per hour the exercise burns.
cin >> CPH;

• prepare the input statement for Time and then (at the prompt) enter the value representing the total time you worked out.

• Determine the total amount of calories burned. Calories = Time * CPH;

• Determine the total number of pizza slices you can eat if you worked out for 2 hours. Slices = (CPH * 2)/310;

• Output the total calories burned and number of slices you could eat.
cout << “The total calories burned are ” << Calories << “ calories.” << endl;
cout << “The number of pizza slice you may eat are ” << Slices << endl;

B) Program Mode

• Open Notepad

• The first line should be the comment statement. Include your name in the comment.

• Save the file. Remember to save the work frequently.

• Type include statement that is required to facilitate input/output capabilities.

• The beginning of the code starts with the following statement: main ( ) {

• Enter your code after the opening curly bracket. Your code must contain the statements to do the following. Remember to close each line of code below with the semicolon.

a) Declare four floating point variable called CPH, Time, Calories, and Slices.

b) Output a brief phrase asking for the user’s calories per hour the exercise burns.

c) Input the calories per hour.

d) Output a short phrase asking for total timed the user worked out.

e) Input the time.

f) Determine the total calories burned at the time of the workout and the total pizzas you can eat.

g) Output the computed calories burned and number of pizzas you can eat.

• End your program code with the closing curly bracket.

• To run your program, type ./filename in the Ch command-line interface (dot forward-slash filename; the ch extension is not needed here)

• If you have error messages, note the cause of error indicated in each message and change your code to fix the problem(s).

• To make changes to your program, move back into Notepad, change the code, and save the file.

• To execute the program again, move back to the Ch window and use the up-arrow key to move the command ./filename to the current line.

• Don’t forget to save backup copies of all your work.

Academic Honesty

• The work you turn in is to be your work, not copied from someone else or from the web.

• Do not allow anyone access to your files

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9872

Have any Question? 


Related Questions in Computer Engineering

An smp uma system contains 64 processors and is to compute

An SMP UMA system contains 64 processors and is to compute a running sum by adding all of the elements in a one million-element vector. Each processor takes one cycle to perform a single addition. How many cycles would i ...

1 why are design flaws such a big issue in the study of

1. Why are design flaws such a big issue in the study of vulnerability? 2. Part of the problem in design flaws involves issues associated with software verification and validation (V&V). What is the role of V&V in system ...

1 give a detailed account of why the three-way handshake is

1. Give a detailed account of why the three-way handshake is a security threat. 2. In the chapter, we gave two examples of how a port scan can be a threat to security. Give three more examples of port scans that can lead ...

Another form of comb filter is given by the transfer

Another form of comb filter is given by the transfer function H(z)=1+ z -L For this problem, let L = 6. (a) Find the filter's impulse response h[n]. (b) Determine a canonical realization of this filter. (c) Find and plot ...

Consider the vector adt from programming project 21a

Consider the Vector ADT from Programming Project 2.1: (a) Implement a new version of the ADT using an unsorted linked list. (b) Evaluate your new implementation to determine the worst case run time of each operation. (c) ...

Implement a tree search algorithm that employs a sentinel

Implement a tree search algorithm that employs a sentinel as described in note 5. Assume that the tree has been set up so that the sentinel node exists but has not been set.

In the life model in the computer science section of the

In the Life model in the Computer Science section of the NetLogo models library, find a pattern where there are no more than 10 green cells to begin with but after 10 time steps there are at least 100 green cells. Also, ...

Advanced problem there are ways to improve the

Advanced problem!) There are ways to improve the square-and-multiply algorithm, that is, to reduce the number of operations required. Although the number of squarings is fixed, the number of multiplications can be reduce ...

The isvalidsource function can be used to evaluate a c

The isValidSource() function can be used to evaluate a C++ source file, but it is incomplete. Brackets encountered inside comments and literal strings would not be paired with those found elsewhere in the program. (a) C+ ...

Two perpendicular forces act on a ring at the end of a

Two perpendicular forces act on a ring at the end of a chain that passes over a pulley and holds a crate. What is the weight of the crate if the horizontal force pulls at 92 pounds and the vertical force pulls at 44 lb? ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen