1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
6

This is a quick and easy program that will let you practice the basics of the switch statement. You will ask the user to enter a

fabric code found on a pair of pants. The fabric code is in the form of . Read the code and then inform the user what material the pants are made out of. Valid user entries are: - 'C' for Cotton - 'L' for Liner - 'P' for Polyester The number is the thread count of the material and must be between 100 and 1000 inclusive. If either the code or the count is invalid print the indicated invalid statement. Prompt: Enter the fabric code found on your pants: Possible Output: Your pants contain cotton with a thread count of 300. Air dry to avoid shrinking! Your pants contain linen with a thread count of 400. They are cool but wrinkle easily! Your pants contain polyester with a thread count of 1000. They are stain resistant! Invalid fabric code. Please run the program again. Notes and Hints: 1) You must use a Switch statement for this 2) You must accept the upper or lowercase version of the letters 3) This is not a trivial excercise, Hand write the algorithm BEFORE you start coding!!
Computers and Technology
1 answer:
Nikolay [14]3 years ago
5 0

Answer:

Explanation:

oof okay

You might be interested in
Under what circumstances are composite primary keys appropriate?
guajiro [1.7K]
A composite primary key<span> is a set of several primary </span>keys<span> that, together, uniquely identifies each record.</span>
Primary keys are used as identifiers of composite entities. In this case each primary key combination is allowed only once in the *:* relationship.
Other case where primary keys are used is as identifiers of weak entities, where the weak entity has a strong identifying relationship with the parent entity. 
8 0
4 years ago
. What physical characteristic does a retinal scan biometric device measure?
elena-s [515]

Answer: D)The pattern of blood vessels at the back of the eye.

Explanation: The retinal scan is the techniques which is used in the bio-metric mechanism.The scanning of the retina's blood vessel pattern is capture by the scanner is the unique technique which is used for bio-metric purpose.

Blood vessel pattern is capture because it is present in unique form for every person and will help in distinguishing a person from another person while scanning.

Other options are incorrect because light reflection or reaching near retina and light pattern are not the unique way for identification while scanning a person.Thus the correct option is option(D).

4 0
3 years ago
Items that are cut or copied are placed on the Clipboard.
WINSTONCH [101]

Anwer is <u>True</u>

please mark me brainliest answer

7 0
3 years ago
Read 2 more answers
When planning your website, what is one of the key things you should consider
Alex_Xolod [135]

You should definitely consider what kind of audience you are appealing to. For example, if you were running a business based on cosmetic products you may want to focus your website on self-care and makeup tips rather than something like cooking. By making your website direct about what you offer, the better the audience will understand. This will make your website succeed. Hope this helped :))

4 0
3 years ago
Read 2 more answers
Describe the information technology industry today
Volgvan

Answer:

The information technology (IT) sector includes companies that produce software, hardware, or semiconductor equipment, and companies that provide internet or related services.

Explanation:

6 0
2 years ago
Other questions:
  • Which three phrases describe a wireframe
    12·1 answer
  • ___ is a career discipline focusing on helping companies use computer technology effectively.
    12·1 answer
  • To connect multiple usb devices to a single usb port, a ____ can be used.
    12·1 answer
  • • Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1= 500 kbps, R2
    15·1 answer
  • Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
    9·1 answer
  • Sequential codes may be used to represent complex items or events involving two or more pieces of related data.
    7·1 answer
  • (1) Output a menu of automotive services and the corresponding cost of each service. (2 pts)Ex:Davy's auto shop servicesOil chan
    9·1 answer
  • (main.c File)
    7·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • The getElementById DOM Method do?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!