1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
2 years ago
9

3.14 LAB: Input and formatted output: Caffeine levels A half-life is the amount of time it takes for a substance or entity to fa

ll to half its original value. Caffeine has a half-life of about 6 hours in humans. Given caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 24 hours. Use a string formatting expression with conversion specifiers to output the caffeine amount as floating-point numbers.
Computers and Technology
1 answer:
nata0808 [166]2 years ago
8 0

Answer:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

double caffeineMg;

cin>>caffeineMg;

cout<<"After 6 hours: "<<fixed<<setprecision(2)<<caffeineMg/2.0<<" mg\n";

cout<<"After 12 hours: "<<fixed<<setprecision(2)<<caffeineMg/4.0<<" mg\n";

cout<<"After 24 hours: "<<fixed<<setprecision(2)<<caffeineMg/8.0<<" mg\n";

return 0;

}

Explanation:

  • Declare a variable for caffeine and take the input from user.  
  • Print the results by dividing the caffeine by relevant Half Life.
  • Use setprecision function to display the result up to 2 decimal places.
You might be interested in
Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on you
Brums [2.3K]

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

8 0
3 years ago
Is it always best for a company to make decisions based on data, or are there some situations where they should not focus on dat
Serhud [2]

Answer:

data-driven decision

Explanation:

While 91% of companies say that data-driven decision-making is important to the growth of their business, only 57% of companies said that they base their business decisions on their data. Data-driven decision-making is a great way to gain a competitive advantage, increase profits and reduce costs!

6 0
2 years ago
Coding help, if you give my the correct answer I'll give brainliest, plus 30 points...
otez555 [7]

Answer:

Flavors [4]..............

7 0
3 years ago
1) Limitations imposed by scientific principles or limited resources are called?
STALIN [3.7K]
D because it has limitations or <em><u>constraints</u></em><u /> 
D again because communication technology is used for all of these things.
Sender, Message, Receiver, Feedback
It can cause the system to conform to situations.
If they don't know the properties then they could damage their equipment or the project by misusing it.
Solids, Liquids, Gasses, Plasma, and Bose-Einstein condesates

5 0
2 years ago
A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' p
Mamont248 [21]

Answer: Threat

Explanation:

 Threat is one of the type of possible danger occur in the computer system security and also also exploit the security system that cause various types of possible harms.

Threat is alter any type of data in an organization without the permission of the owner.  

The threat can be classified into the different types are as follows:

  • Computer worm
  • DOS attack
  • Rootkit
  • Computer viruses

3 0
3 years ago
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • Write a program which simulate rolling dice. When the program runs, it will prompt the user to choose a number ranging from 1 to
    15·1 answer
  • Program documentation _____.
    8·1 answer
  • In the SQL environment, a _____________ is a logical group of database objects – such as tables and indexes – that are related t
    11·1 answer
  • Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit do
    9·1 answer
  • Http://www.alegrium.com/sgi/2/eibder
    5·1 answer
  • A central issue of public sharing is:
    13·2 answers
  • Which of the following helps you plan out every step of an animation?
    12·2 answers
  • A while loop should be used if you want the user to watch the same video three times.
    13·1 answer
  • In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!