1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
3 years ago
5

Problem 2 (40 points)-Write a program. Submit a file named weight.cpp Create a program that continuously allows a user to enter

his or her weight in either pounds or kilos. The program should then convert the given weight. Possible Sample Run 1 (your program does not have to match the following exactly, but should have the same functionality): Please enter your name and weight. James 182 pounds Hi James- you weigh 82.5 kilos. Please enter your name and weight. Connor 78 Not enough info to convert. Please enter your name and weight. Connor 78 kilos Hi Connor-you weigh 171.9 pounds. Please enter your name and weight. exit Exiting…
Computers and Technology
1 answer:
JulsSmile [24]3 years ago
4 0

Answer: here

Explanation:

Hi James- you weigh 82.5 kilos. Please enter your name and weight. Connor 78 Not enough info to convert. Please enter your name and weight. Connor 78 kilos Hi Connor-you weigh 171.9 pounds. Please enter your name and weight.

You might be interested in
Filtering of packets as they leave the network destined for the internet is called ____________ .
e-lub [12.9K]
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
6 0
3 years ago
Given the following program: public class MysteryNumbers { public static void main(String[] args) { String one = "two"; String t
enyata [817]

Answer:

Check the explanation

Explanation:

/*Given the following program:

public class MysteryNumbers {

   public static void main(String[] args) {

       String one = "two";

       String two = "three";

       String three = "1";

       int number = 20;

​

       sentence(one, two, 3);

       sentence(two, three, 14);

       sentence(three, three, number + 1);

       sentence(three, two, 1);

       sentence("eight", three, number / 2);

   }

​

   public static void sentence(String three, String one, int number) {

       System.out.println(one + " times " + three + " = " + (number * 2));

   }

}*/

Write the output of each of the following calls.

sentence(one, two, 3);     three times two = 6

sentence(two, three, 14); 1 times three = 28

sentence(three, three, number + 1); 1 times 1 = 42

sentence(three, two, 1);   three times 1 = 2

sentence("eight", three, number / 2); 1 times eight = 20

7 0
3 years ago
Which of the following is a type of intangible business property that is protected by law
xz_007 [3.2K]
Google might be it ok
6 0
3 years ago
What is one effective way for employees to keep their skillsets current
iragen [17]
<span> Create a large personal network online</span>
4 0
3 years ago
Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are calle
In-s [12.5K]
Hi!

These programs which allow a peripheral device to interact with the rest of the computer system are going to be <em>device drivers.</em>

Hopefully, this helps! =)
3 0
3 years ago
Other questions:
  • A range in which a measuring instrument or controller does not respond is the
    12·1 answer
  • Which are the best examples of costs that should be considered when creating a project budget?
    11·1 answer
  • Outsourcing is an alternative systems building approach that may involve subscribing to an application service provider or hirin
    8·1 answer
  • 6. Sandra did a survey to see how
    9·1 answer
  • When working in the middle of a presentation, how do you preview the slide show from the current slide?
    12·1 answer
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 1024-byte 4-way set as
    5·1 answer
  • How to convert meters to centimeters in c programming​
    8·1 answer
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!