1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
6

What's the code?

Computers and Technology
1 answer:
lys-0071 [83]3 years ago
3 0

Answer:

Explanation:

#include <iostream>

using namespace std;

// Recipe of single portion salad

int main()

{

   float Qing[3]={0.0,0.0,0.0};

   string ItemName[3]={" "," "," "};

   int qty=0;

   cout<<"Please enter 3 Ingredients required for Salad and Quantity required for a single serve"<<endl;

   for (int i=0;i<3;i++)

   {

       cout<<"Enter the ingredient number "<<(i+1)<<" :";

       cin>>ItemName[i];

       cout<<"Qty required for single serve (in Oz) :";

       cin>>Qing[i];

   }

   cout<<"Number of servings required :";

   cin>>qty;

   cout<<endl<<"Total Quantities required for "<<qty<<" servings"<<endl;

   for (int i=0;i<3;i++)

   {

       cout<<ItemName[i]<<" Qty for "<<qty<<" servings :"<<(Qing[i]*qty)<<" Oz."<<endl;

   }

   return 0;

}

// You can run this after compiling without any problem.

You might be interested in
An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
LenaWriter [7]

In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

<h3>Should a person use certificate pinning?</h3>

Mobile applications are known to be one that often make use of   certificate or also public key pinning so that they can be able to make sure that communications are secure.

Hence it is one that  is often implemented if  the developer of the application is said to be require to validate the remote host's identity or if operating in a harsh environment.

Hence, Certificate pinning hinders which certificates are considered valid for a any kind of website,  and as such, In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

Learn more about certificate from

brainly.com/question/1874937

#SPJ1

4 0
2 years ago
Complete the procedure for adding a contact by selecting the correct term from each drop-down menu.
VARVARA [1.3K]

Answer:

1 new contact 2 save and close

6 0
3 years ago
Which of the following allows data to coordinate activity between devices? Select one: a. Address bus b. Collisions c. Data bus
AnnyKZ [126]

Answer:

The correct option is D: Control Bus

Explanation:

A control bus is usually used by the Central Processing Unit to communicate with all the devices that are connected or contained within a computer. This connections are usually done via physical connections such as printed circuits or cables. It is also called a Computer bus and helps in coordinating activities between the connected devices.

5 0
3 years ago
What types of roles are there as a webmaster?
Nuetrik [128]
<span> PHP, ASP, and Javascript. They handle the technical aspects </span>
6 0
3 years ago
Read 2 more answers
what new technology led to the chaos that spurred the establishment of the federal communications commission?
adelina 88 [10]

Answer:

The digital read Harry quaant

3 0
1 year ago
Other questions:
  • Write a function removeEvens to remove all the even numbers from input row array inRowArray which contains integer numbers. The
    15·1 answer
  • Emma wants to create a web page for her school’s volleyball team. Which of these could she use?
    7·1 answer
  • Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute
    11·1 answer
  • Helppppppppppppppppppp
    11·1 answer
  • Why would a designer choose to use an isometric sketch rather than a perspective sketch to share their idea with a design team m
    14·1 answer
  • How to connect xbox one controller
    5·1 answer
  • Multiple arrays. Jump to level 1 For any element in keysList with a value greater than 40, print the corresponding value in item
    7·2 answers
  • Which element appears within the top margin of the document but does not form the part of the body of the text?
    15·1 answer
  • Is it true or false and incomplete doing can be saved in Paint​
    15·1 answer
  • Explain with examples what is software​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!