1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
11

Write a program that calculates and displays a person’s body mass index (BMI). The BMI is often used to determine whether a pers

on with a sedentary lifestyle is overweight or underweight for his or her height. A person’s BMI is calculated with the following formula:
BMI = weight x 703 / height2

where weight is measured in pounds and heightis measured in inches. The program should ask the user to enterhis/her weight and height. The program should display a message indicating whether the person has optimal weight, is underweight, or is overweight. A sedentary person’s weight is considered optimal if his or her BMI is between18.5 and 25. If the BMI is less than 18.5, the person is considered underweight. If the BMI valueis greater than 25, the person is considered overweight
Computers and Technology
1 answer:
GuDViN [60]3 years ago
6 0

Answer:

<em>This program is written using C++</em>

<em>Comments are used to explain difficult lines</em>

<em>Program starts here</em>

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float BMI, Height,Weight;

// Prompt user for inputs

cout<<"Ener Height (in inches): ";

cin>>Height;

cout<<"Enter Weight (in pounds): ";

cin>>Weight;

//Calculate BMI

BMI = (Weight * 703)/(Height * Height);

cout<<"Your Body Mass Index (BMI) is "<<BMI<<endl;

//Test and print whether user is underweight, overweight or optimal

if(BMI>=18.5&&BMI<=25)

{

 cout<<"You have an optimal weight";

}

else if(BMI<18.5)

{

 cout<<"You are underweight";

}

else if(BMI>25)

{

 cout<<"You are overweight";

}  

return 0;

 

}

<em>See attachment for .cpp source file</em>

Download cpp
You might be interested in
A___________ is a person who can give information to potential employers about your character and your abilities. Employer emplo
il63 [147K]
I believe the answer is reference.
6 0
4 years ago
What kind of information can be found in a ROM:
tester [92]
The answer is C, ROM often stores the basic instructions a computer needs when powering on, part if the BIOS.
3 0
3 years ago
Pam is using the Outline view in PowerPoint. She would like to reposition
erastova [34]

Answer:

Explanation:

u have just to drag it into slide 6. I think that it's like this that we do it

6 0
3 years ago
What is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data?
labwork [276]
<span>A key is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data. There are two types of cryptography, the public key and the private key. The public key uses public keys to encrypt data and private key uses private key to decrypt data. They are produced by a group of algorithms. </span>
8 0
4 years ago
What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?
dmitriy555 [2]

Answer:

The answer is Remote desktop services.

Explanation:

What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?

The answer is Remote desktop services.

Desktop virtualization is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.

Desktop virtualization can be used in conjunction with application virtualization and user profile management systems, now termed "user virtualization", to provide a comprehensive desktop environment management system. In this mode, all the components of the desktop are virtualized, which allows for a highly flexible and much more secure desktop delivery model. In addition, this approach supports a more complete desktop disaster recovery strategy as all components are essentially saved in the data center and backed up through traditional redundant maintenance systems.

6 0
3 years ago
Other questions:
  • Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
    8·1 answer
  • The rubric given to them by their teacher requires that
    14·1 answer
  • in a management information system, the quality of information is determined by its usefulness to users, and its usefulness dete
    8·1 answer
  • The easiest way to run a web page that’s already in your browser after you’ve made changes to the code for the page is to
    6·1 answer
  • Information systems cannot solve some business problems. Give three examples and explain why technology cannot help
    11·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • Every presentation should have a beginning, a middle, and an end.
    10·1 answer
  • A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord
    5·2 answers
  • When should a computer definitely have an ip address
    15·2 answers
  • How to turn off microsoft teams message notifications
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!