1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
3 years ago
13

Using C++

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
4 0

Answer:

K

Explanation:

Using C++

Your program should accept y or n for input to all questions, and does not need to handle invalid inputs.

First, your program should ask the user if they want pizza. If not, your program should exit without creating and saving any image.

However, if the user does want pizza, your program should ask about toppings, first tomato sauce, then cheese, then pepperoni, then jalapeno, then onion. (Make sure you spell the toppings correctly, because the unit tests are are checking for exact matches!) For each topping, the user can respond y or n.

Finally, your program should save the pizza image to pizza.bmp, and tell the user the filename so they can find it.

Here is an example where the user wants a pizza with all the toppings:

Welcome to PizzaMaker 2.0!

Would you like a pizza?

(y/n): y

Would you like tomato sauce?

(y/n): y

Would you like cheese with that?

(y/n): y

Would you like pepperoni?

(y/n): y

Would you like jalapeno with that?

(y/n): y

Would you like onion?

(y/n): y

Great! Your pizza is at pizza.bmp. Enjoy!

Note: You must add toppings in the specified order here. This is called a "spec" (for specification), and it's important to implement exactly to the "spec" so that the customer knows what they are getting.

You might be interested in
One advantage of using a security management firm for security monitoring is that it has a high level of expertise.
mote1985 [20]

Answer: True

Explanation: Security management firm is the organization that provides protection to the system, functions,data, people etc of any particular business organization.They are highly capable of the problem avoidance, management of risk and other such issues.

The monitoring of the security done by the people and devices of the security management firm are more reliable and assured due to the expert skill they persist in the security field. Thus, the given statement is true.

8 0
3 years ago
Read 2 more answers
Which type of address defines a single network interface in a computer or other device?
White raven [17]
MAC address
......... ..
4 0
3 years ago
Which of the following changes the features (e.g., thickness of the line, shadow, 3-D effect, single or double, etc.) of the bor
lilavasa [31]
Border style
I hope it’s work
8 0
3 years ago
Assume in the for loop header, the range function has the three arguments: range (1, 10, 3), if you were to print out the value
Licemer1 [7]

Answer:

1, 4, 7

Explanation:

The instruction in the question can be represented as:

for i in range(1,10,3):

   print i

What the above code does is that:

It starts printing the value of i from 1

Increment by 3

Then stop printing at 9 (i.e.. 10 - 1)

So: The sequence is as follows

Print 1

Add 3, to give 4

Print 4

Add 3, to give 7

Print 7

Add 3, to give 10 (10 > 10 - 1).

So, it stops execution.

6 0
3 years ago
To save your new document or presentation, click the Start Button
Vika [28.1K]
No you would click save or save as
3 0
3 years ago
Other questions:
  • F a domain consists of dcs that are running verions of windows server earlier than windows server 2008, what replication method
    10·1 answer
  • When are number list generally used ?
    10·1 answer
  • Help me out here pleaseeeee
    9·2 answers
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • "PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisi
    7·1 answer
  • Which method is used for resolving data dependency conflict by the compiler itself?
    6·1 answer
  • WHAT IS ONE WAY A PIVOTTABLE COULD COMBINE THE FOLLOWING DATA
    10·1 answer
  • *
    6·1 answer
  • Will, there be any presents this year
    15·1 answer
  • The following statements regarding centralized administration concepts are presented to you in an interview in which only one of
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!