The program that checks the BMI of a patient is given below:
<h3>THE CODE</h3>
#include <iomanip>
#include <iostream>
#include <math.h>
using namespace std;
// C++ program to illustrate
// how to calculate BMI
float BMI(float height, float weight)
{
float bmi = weight / pow(height, 2);
return bmi;
}
int main()
{
float height = 1.79832;
float weight = 70;
// Function call
float bmi = BMI(height, weight);
cout << "The BMI is " << setprecision(15) << bmi
<< " so ";
// Conditions to find out BMI category
if (bmi < 18.5)
cout << "underweight";
else if (bmi >= 18.5 && bmi < 24.9)
cout << "Healthy";
else if (bmi >= 24.9 && bmi < 30)
cout << "overweight";
else if (bmi >= 30)
cout << "Suffering from Obesity";
return 0;
}
// This code is contributed by aarohirai2616.
<h3>Output: </h3>
The BMI is 21.64532402096181 so Healthy
Read more about algorithms here:
brainly.com/question/24953880
#SPJ1
Answer:
Most newspapers now have online editions. Subscription models have gone beyond print-only into digital-only and print-digital combinations -- and as print-only circulation is dropping, digital and combination circulation is on the rise.
Answer: Better Data Management
Explanation:
The main benefits of edge computing over cloud computing are: Better data management. Lower connectivity costs and better security practices. Reliable, uninterrupted connection.
Answer: Authorization process
Explanation
Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.
Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.
Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".