1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
3 years ago
15

Write a program that will read the weight of a package of breakfast cereal in ounces and output the weight in metric tons as wel

l as the number of boxes needed to yield one metric ton of cereal. In: A metric ton is 35,273.92 ounces.
Computers and Technology
1 answer:
almond37 [142]3 years ago
3 0

Answer:

The C++ code is given below

Explanation:

#include <iostream>

using namespace std;

int main () {

int flag=1;

do{

double ounce,metric,boxes;

cout<<"Enter weight of package in ounces: ";

cin>>ounce;

metric=ounce/35273.92;

cout<<"Metric ton is "<<metric<<endl;

boxes=35273.92/ounce;

cout<<"Number of boxes are: "<<boxes<<endl;

cout<<"Press 0 to quit else press 1: ";

cin>>flag;

}while(flag==1);

return 0;

}

You might be interested in
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
3 years ago
Walking paths across the part is represented by the equation why equals -4x - 6​
Setler79 [48]

Answer:

I believe this is a graph question which would be impossible to do on brainly. Butttt, if so, -4x means you would go to the right 4, and the 6 means you would go up 6

Hope this helps:)

if you want to further explain question I'd be glad to help :))

5 0
3 years ago
A computer that delivers requested web pages to your computer or mobile device is a(n) _____.
yaroslaw [1]

Answer:

Web Server

A web server is server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web. A web server can, in general, contain one or more websites. A web server processes incoming network requests over HTTP and several other related protocols.

6 0
4 years ago
Student B, lives in Phoenix, Arizona and is not on vacation. Student B, submits an assignment for science class and the teacher
frozen [14]

Answer:

Don't take this for your answer though, but no unless the student copied it off of somewhere else.

The IP address might have been spoofed or they could have used a vpn.

Otherwise it would mean that someone else used their account to sign in.

Explanation:

7 0
2 years ago
You are working on a small network. You recently created a wireless network to allow the owners laptop and mobile devices to mak
Gekata [30.6K]

Answer: enable network encryption to prevent authorized computer from accessing the wireless network.

Explanation:

1.open the wireless security settings on your router’s configuration page.

2. select security method you wish to use.

3.Enter a passphrase needed to access the network whenever authorizes personnel want access to network.

5 0
4 years ago
Other questions:
  • Ryan wants to ensure that all the words in this document are evenly spaced so that they look neat and readable . Which option in
    12·1 answer
  • "the most common way to access the internet is through ________."
    5·1 answer
  • What is the meaning of Android
    12·2 answers
  • Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy
    10·1 answer
  • Consider the eight bit signed binary number 1110 0101. Convert it to signed decimal from assuming the signed binary number is re
    5·1 answer
  • Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
    5·1 answer
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    13·2 answers
  • an individual’s Body Mass Index (BMI) is a measure of a person’s weight in relation to their height. it is calculated as follows
    6·1 answer
  • PAGE<br>DATE<br>0 What types of information should be there internet?​
    5·1 answer
  • What is wrong with a MOV BL, CX instruction?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!