1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
2 years ago
9

write a C++ program that ask the user for the number of cookies eaten and display the calorie consumption

Computers and Technology
1 answer:
Artyom0805 [142]2 years ago
4 0

Answer:

#include <iostream>

using namespace std;

int main()

{

   int cookies;

   cin >> cookies;

   cout << "The calorie consumption is: " << cookies * 142 << endl;

   return 0;

}

Explanation:

First line: include basic library of C++(input and output).

using namespace std;

Says to compiler we are using std.

int main() Main function

int cookies, cookies variable, of int type

cin >> cookies

get the number of the cookies from user

cout Print the text and calories(one cookie have 142 calories)

Have a nice day ;)

You might be interested in
what you can do to increase your chances of getting employed with changes to your current digital footprint​
xxTIMURxx [149]
1) Show your work. Build an electronic portfolio, ideally on a website that you own, that shows the skills you have and the projects you have worked on. ,
2) Create a professional account on LinkedIn with your resume and recent photo. Connect with others there who can help you land a job.
3) Don't put anything on social media that would be embarrassing to you if your family found out or if it appeared in the newspaper or on the television news. Always assume that whatever you put online can be shared, no matter what the privacy setting is supposed to be.
4) Network with professionals who are doing the sort of work that you aspire to do. Ask thoughtful questions about the work that they do that you admire.
4 0
3 years ago
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
2 years ago
The major difference between a calculator and a computer, when performing calculations, is that a
tester [92]
A calculator is slower and needs more human assistance
7 0
3 years ago
Read 2 more answers
in a block in a blockchain what represents the transactional data, sender, receiver, and number of coins? group of answer choice
erastova [34]

In a block in a blockchain, a resource which represent the transactional data, sender, receiver, and number of coins is: A. data.

<h3>What is a blockchain?</h3>

A blockchain can be defined as a digital and dynamic financial system that is designed and developed to be used in recording and maintaining transactions that are associated with or made through the use of a bitcoin, usually as a database containing various set of data.

In this context, we can infer and logically deduce that data is a resource that typically represent all of the transactional data, sender, recipient (receiver), and the number of bitcoins in a block in a blockchain.

Read more on blockchain here: brainly.com/question/25700270

#SPJ1

6 0
10 months ago
You have deployed several 802.11b wireless networks at your company's location. Recently, users complained that they were having
SOVA2 [1]

Answer:

The correct answer to the following question is Microwave ovens.

Explanation:

Because microwave ovens and the WIFI(Wireless Fidelity) both are operated at the same frequency that is 2.4 GHz.

It is not a magic, of course, logically explainable effects the radio waves. When the devices use WiFi signals to connect to the Internet then these signals are sent with the radio waves and despite all the advanced features of wireless interference can happen.

7 0
2 years ago
Other questions:
  • The email program shipped with Microsoft office
    15·1 answer
  • Jeremy wants to run a program file from the command prompt. Which of the following should Jeremy type in the command prompt wind
    8·2 answers
  • David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to i
    15·1 answer
  • Fill in each blank with the correct step from the fetch-execute cycle.
    14·1 answer
  • What is a spreadsheet program?<br> A spreadsheet program is a computerized version of _______
    5·1 answer
  • Will mark brainliest! What does this code do? What kind of code is this called?
    15·1 answer
  • What are the different types of monitors?
    8·1 answer
  • Why do we need to learn about engineering and technology?
    6·1 answer
  • 7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​
    8·1 answer
  • When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!