1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
3 years ago
8

Given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a Vend

ingMachine object that performs the following operations:
Purchases input number of drinks Restocks input number of bottles.
Reports inventory Review the definition of "VendingMachine.cpp" by clicking on the orange arrow.
A VendingMachine's initial inventory is 20 drinks.

Ex: If the input is: 5 2
the output is: Inventory: 17 bottles
Computers and Technology
1 answer:
ivann1987 [24]3 years ago
8 0

Answer:

In C++:

#include <iostream>

using namespace std;

class VendingMachine {

 public:

   int initial = 20;};

int main() {

 VendingMachine myMachine;

   int purchase, restock;

   cout<<"Purchase: ";  cin>>purchase;

   cout<<"Restock: ";  cin>>restock;

   myMachine.initial-=(purchase-restock);

   cout << "Inventory: "<<myMachine.initial<<" bottles";  

   return 0;}

Explanation:

This question is incomplete, as the original source file is not given; so, I write another from scratch.

This creates the VendingMachine class

class VendingMachine {

This represents the access specifier

 public:

This initializes the inventory to 20

   int initial = 20;};

The main begins here

int main() {

This creates the object of the VendingMachine class

 VendingMachine myMachine;

This declares the purchase and the restock

   int purchase, restock;

This gets input for purchase

   cout<<"Purchase: ";  cin>>purchase;

This gets input for restock

   cout<<"Restock: ";  cin>>restock;

This calculates the new inventory

   myMachine.initial-=(purchase-restock);

This prints the new inventory

   cout << "Inventory: "<<myMachine.initial<<" bottles";  

   return 0;}

You might be interested in
A computer network is best described as two or more computers that are
ANTONII [103]
A computer network is best described as two or more computers that are linked together. 
6 0
3 years ago
System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
kap26 [50]

Answer:

-32 to +31

Explanation:

6 bit 2s complement representation will be of the form b1b2b3b4b5b6 where each bit is either 0 or 1.

The largest positive number that can be represented using this scheme is 011111

Translating this to decimal this is 1*2^4 + 1^2^3 + 1^2^2 + 1^2^1 + 1^2^0

=16 + 8 + 4 + 2 + 1 =31

The smallest negative number that can be represented using this scheme is 100000

Translating this to decimal = -1 * 2^5 = -32

So the range of decimal values that can be represented is -32 to +31.

6 0
4 years ago
Betty is developing a machine learning algorithm that looks at vast amount of data collected over 100 years and checks for relat
wolverine [178]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Betty is developing a machine learning algorithm that looks at a vast amount of data that is collected over 100 years, and She also wants to check the relationship among variables such as humidity, temperature, and rainfall in the given data.

So, the correct answer to this question is b. She is developing an association machine learning algorithm.

Because the association tells the relationship between variables. She used the association to find the relationship among variables such as humidity, temperature,  and rainfall.

While the other options are not correct because:

Regression is used to find out the cause and effect relationship between dependent and independent variables. Big data is the biggest field of data analysis, so this option does not best suit this context. Classification is used to classify data, or organizing data into their related group. While clustering is the task of dividing the population into a number of groups such that populations in the same groups are more similar to other populations in the same group than those in other groups. so these are all incorrect options to this question except the "b" option i.e association.

5 0
3 years ago
The layout gallery displays 10 slide layouts with a variety of placeholders to define text and content positioning and formattin
Papessa [141]
The above statement is FALSE.

The layout gallery displays 9 slide layouts NOT 10. 

These 9 layouts have various<span> placeholders to define text and content positioning and formatting.

</span>1 - Title slide
2 - Title and content
3 - Section Header
4 - Two content
5 - Comparison
6 - Title only
7 - Blank 
8 - Content with Caption
9 - Picture with Caption
8 0
3 years ago
............................... ?
Alborosie

............................... ? ................................

6 0
4 years ago
Other questions:
  • A device that makes it possible for multiple customers to share one address is called a/n _____.
    15·1 answer
  • What is the service provided by a third party (such as an ISP) that enables you to connect another cloud directly to your Google
    15·1 answer
  • Create a list of 15 colleges in Texas
    8·2 answers
  • "The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of message
    6·2 answers
  • What makes up data encryption standard ?
    9·1 answer
  • If a switch needs to send information to other switches in the network it would send out a ___________.
    7·2 answers
  • Why does this happen to me?
    14·1 answer
  • Write a program that lets the user enter the loan amount and loan period in number of years and displays the monthly and total p
    13·1 answer
  • I want to write a Java program to display the multiplication table for the number entered by the user and the values doesn’t exc
    8·1 answer
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!