1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
4 years ago
15

Project Description The Department plans to purchase a humanoid robot. The Chairman would like us to write a program to show a g

reeting script the robot can use later. Our first task is to use the following script to prototype the robot for presentation: (Robot) Computer: Hello, welcome to Montgomery College! My name is Nao. May I have your name? (Visitor) Human: Taylor (Robot) Computer: Nice to have you with us today, Taylor! Let me impress you with a small game. Give me the age of an important person or a pet to you. Please give me only a number! (Visitor) Human: 2 (Robot) Computer: You have entered 2. If this is for a person, the age can be expressed as 2 years or 24 months or about 720 days or about 17280 hours or about 1036800 minutes or about 62208000 seconds. If this is for a dog, it is 14 years old in human age If this is for a gold fish, it is 10 years old in human age (Robot) Computer: Let's play another game, Taylor. Give me a whole number (Visitor) Human: 4 (Robot) Computer: Very well. Give me another whole number (Visitor) Human: 5 (Robot) Computer: Using the operator +'in C++, the result of 4 + 5 is 9. Using the operator , the result of 4/5 is 0; however, the result of 4.0/5.0 is about 0.8 (Robot) Computer: Do you like the games, Taylor? If you do, you can learn more by taking our classes. If you don't, I am sad. You should talk to our Chairman! Write a program that uses the script above as a guide without roles, i.e. robot computer and visitor human, to prototype robot greeting in C++
Computers and Technology
1 answer:
artcher [175]4 years ago
4 0

Answer:

C++ code is explained below

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

// Variables to store inputs

string robot_name = "Nao";

string visitor_name;

int age, first_num, second_num;

// Constant variable initialisation for programmer name

const string programmer_name = "XXXXXXXX";

// Constant variable initialisation for assignment number

const string assignment_num = "123546";

// Constant variable initialisation for due date

const string due_date = "16 August, 2019";

// Displaying robot's name as script

cout << "Hello, welcome to Montgornery College!";

cout << "My name is " << robot_name << " . May I have your name?" << "\n\n";

// Taking visitor's name as input from the visitor

cin >> visitor_name;

// Displaying vistor's name as script

cout << "\n\nNice to have your with us today, " << visitor_name << "! ";

cout << "Let me impress you with a small game.";

cout << "Give me the age of an important person or a pet to you. ";

cout << "Please give me only a number!" << "\n\n";

// Taking human age as input from the visitor

cin >> age;

// Displaying human's age as script

cout << "\n\nYou have entered " << age << ". If this is for a person,";

cout << " the age can be expressed as " << age << " years or ";

// Computing months, days, hours, minutes and seconds from age input

double months = age*12;

double days = months*30;

double hours = days*24;

double minutes = hours*60;

double seconds = minutes*60;

// Computing dogs and fish age from human's age

double dogs_age = 7*age;

double gold_fish_age = 5*age;

// Displaying months, hours, minutes, hours and seconds as script

cout << months << " months or about " << days << " days or";

cout << " about " << fixed << setprecision(0) << hours << " hours or about " << minutes;

cout << " or about " << fixed << setprecision(0) << seconds << " seconds. If this is for a dog.";

// Displaying dogs age and gold fish age as script

cout << " it is " << dogs_age << " years old in human age.";

cout << " If this is for a gold fish, it is " << gold_fish_age;

cout << " years old in human age" << "\n\n";

cout << "Let's play another game, " << visitor_name << "!";

cout << "Give me a whole number." << "\n\n";

// Taking first whole number from the visitor

cin >> first_num;

cout << "\nVery well. Give me another whole number." << "\n\n";

// Taking second whole number from the vistor

cin >> second_num;

// Computing sum and division for displaying in the script

double sum = first_num+second_num;

double division = first_num/second_num;

float floatDivision = (float)first_num/second_num;

// Displaying sum and division script

cout << "\nUsing the operator '+' in C++,";

cout << " the result of " << first_num << " + " << second_num;

cout << " is " << sum << ". Using the operator '/', the result ";

cout << "of " << first_num << " / " << second_num << " is " << division;

cout << "; however, the result of " << first_num << ".0 /" << second_num;

cout << ".0 is about " << floatDivision << "." << "\n\n";

cout << "Do you like the games, " << visitor_name << "?";

cout << " If you do, you can learn more by taking our classes.";

cout << ". If you don't, I am sad, You should talk to our Chairman!" << "\n\n";

// Displaying Programmer Name, Assignment Number and due date to output screen

cout << "Programmer Name : " << programmer_name << endl;

cout << "Assignment Number : " << assignment_num << endl;

cout << "Due Date : " << due_date << endl;

 

return 0;

}

You might be interested in
While conducting routine maintenance, you discover a network server that needs to
patriot [66]

Answer:

tell the truth and make other people aware of what is going on inorder for them to also be hands on deck and come up with solutions to also help solve the problem

3 0
2 years ago
What level does Drantini evolve? I'm currently grinding on my TI 84 calculator.
ad-work [718]

Answer:

Dratini first evolves into dragonair at level 30, which then later on evolves into dragonite at level 55.

4 0
3 years ago
To create a digital signature, two steps take place that result in the actual signature that is sent with data. In the first ste
Ket [755]

Answer: Integrity verification of message.

Explanation:  Digital signature is used for the security purpose of the documents by the encryption technique such as passwords etc.The signature is created electronically for a digital document protection.The document is authenticated if correctly signed by the user/signer .

The collection of algorithms that are encrypted verifies the authenticity while being transferred if document content does not get tampered.This is the verification of integrity of the message sent from the sender to the signer.

4 0
3 years ago
Look at the following partial class definition, and then respond to the questions that follow it:
zhannawk [14.2K]

Solution :

a.

public Book($\text{String title}$, String author, $\text{String publisher}$, int $\text{copiesSold}$) {

 this.$\text{title}$ = $\text{title}$;

 this.$\text{author}$ = $\text{author}$;

 this.$\text{publisher}$ = $\text{publisher}$;

 this.$\text{copiesSold}$ = $\text{copiesSold}$;

b). $\text{public String}$ getTitle() {

 return $\text{title}$;

}

$\text{public void}$ setTitle($\text{String title}$) {

 this.$\text{title}$ = $\text{title}$;

}

$\text{public String}$ getAuthor() {

 return author;

}

$\text{public void}$ setAuthor(String author) {

 this.$\text{author}$ = $\text{author}$;

}

$\text{public String}$ getPublisher() {

 return $\text{publisher}$;

}

$\text{public void}$ setPublisher(String $\text{publisher}$) {

 this.$\text{publisher}$ =$\text{publisher}$;

}

public int get$\text{copiesSold}$() {

 return $\text{copiesSold}$;

}

$\text{public void}$ set$\text{copiesSold}$(int $\text{copiesSold}$) {

 this.$\text{copiesSold}$ = $\text{copiesSold}$;

}

4 0
3 years ago
When discussing the behavior of vulnerability assessments which choice will exploit a weakness?
yKpoI14uk [10]

Answer:

a) Penetration test

Explanation:

A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.

In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.

Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.

5 0
3 years ago
Other questions:
  • A ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.​
    10·1 answer
  • Which of the following is not a thing needed to make a network?
    6·2 answers
  • How to type in color on clash royale
    15·2 answers
  • having one password for all accounts is an easy way to remember passwords, but it will expose you to what risk?
    8·1 answer
  • Discuss FOUR challenges that have an impact on domestic tourism
    6·1 answer
  • What special responsibilities do computer professionals have with respect to understanding and protecting the privacy rights of
    5·1 answer
  • Decribe the advantages of using emails compared with physical faxing ?
    8·1 answer
  • Spam is _____.
    6·2 answers
  • What can visible light and ultraviolet light do together
    14·1 answer
  • Why are women more exposed to mass media?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!