1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
3 years ago
13

Using C++

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
4 0

Answer:

K

Explanation:

Using C++

Your program should accept y or n for input to all questions, and does not need to handle invalid inputs.

First, your program should ask the user if they want pizza. If not, your program should exit without creating and saving any image.

However, if the user does want pizza, your program should ask about toppings, first tomato sauce, then cheese, then pepperoni, then jalapeno, then onion. (Make sure you spell the toppings correctly, because the unit tests are are checking for exact matches!) For each topping, the user can respond y or n.

Finally, your program should save the pizza image to pizza.bmp, and tell the user the filename so they can find it.

Here is an example where the user wants a pizza with all the toppings:

Welcome to PizzaMaker 2.0!

Would you like a pizza?

(y/n): y

Would you like tomato sauce?

(y/n): y

Would you like cheese with that?

(y/n): y

Would you like pepperoni?

(y/n): y

Would you like jalapeno with that?

(y/n): y

Would you like onion?

(y/n): y

Great! Your pizza is at pizza.bmp. Enjoy!

Note: You must add toppings in the specified order here. This is called a "spec" (for specification), and it's important to implement exactly to the "spec" so that the customer knows what they are getting.

You might be interested in
According to the text, the three IT trends that are having the greatest impact on the IT environment are:
maksim [4K]

Answer:

B. GRID COMPUTING , ON - DEMAND COMPUTING AND REAL TIME COMPUTING

Explanation:

Grid computing, on-demand computing and real time computing are currently the most impactful information technology processes. The Grid computing from example entails distributed computing whereby computing resources are distributed across different systems for a computing task. This is seen in server systems where a super virtual computer composed of a network of computers are connected to share resources and perform large tasks. This form of computing has majorly affected and improved complex computing tasks today.

On demand and real time computing are also other notable trends in IT with real time computing bringing the power of live and direct coverage of information to our screens and on demand making it possible for the average user to access computing resources as needed such as in the services of cloud computing providers

4 0
3 years ago
Which peripheral device is used to record sound?
faust18 [17]

he will need a microphone, it is a recording device.

8 0
3 years ago
Read 2 more answers
Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
Snowcat [4.5K]

Answer:

b. Synchronous replication

Explanation:

Replication of data in storage partitions or in a number redundant array of independent disk drives helps to promote redundancy, as implied, and faulty tolerance to reduce loss of data.

There are two categories of replication and they are synchronous and asynchronous replication.

Synchronous replication requires low latency network site to mirror data, while asynchronous replication mirrors data in large metropolitan area in high latency networks.

4 0
3 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
What are the controls in the Capture panel? Define each controls
MArishka [77]

Answer:

.............

........

8 0
3 years ago
Other questions:
  • By changing the field size for text to the maximum number necessary,
    6·1 answer
  • Under what key category do page up and page down keys fall?
    15·1 answer
  • Which are factors that go into a project plan? choose four answers
    14·1 answer
  • Let’s define a new language called dog-ish. A word is in the lan- guage dog-ish if the word contains the letters ’d’, ’o’, ’g’ a
    6·1 answer
  • The editing of digital photos us about the same level of difficulty as editing an analog photo
    12·1 answer
  • The quicksort pivot value should be the key value of an actual data item; this item is called the pivot. True or False?
    11·1 answer
  • In what decade was photography invented? the 1800s the 1820s the 1840s the 1860s
    15·1 answer
  • Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a
    7·1 answer
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
  • What do we call the software which programmers use to program?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!