1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
2 years ago
11

Ingredient Adjuster

Computers and Technology
1 answer:
Semenov [28]2 years ago
7 0

Answer:

#include <iostream>

using namespace std;

int main(){

float cookies=0;

float sugar=1.5;

float butter=1;

float flour=2.75;

cout<<"how many cookies do you want: "<<endl;

cin>>cookies;

float num = cookies/48;

cout<<num<<endl;

cout<< "to make " << cookies<<"cookies you need: "<<endl;

cout<<"sugar cups: "<<num*sugar<<endl;

cout<<"butter cups: "<<num*butter<<endl;

cout<<"flour cups: "<<num*flour<<endl;

return 0;

}

You might be interested in
I need help!
tekilochka [14]
True!!!!!!!!!!!!!!!!!
6 0
3 years ago
What is the keyboard shortcut to display the merge to printer dialog box?
sp2606 [1]
Alt + Shift + M are the keyboard shortcuts to display the merge to printer dialog box.
3 0
3 years ago
What finger should be on the Y key?
geniusboy [140]

Answer:

Right index

Explanation:

6 0
3 years ago
Read 2 more answers
Identify the four basic categories of hardware in a personal computer system
Pie
The four basic categories are the motherboard, the CPU, the graphics card, and the RAM.
Brainliest pls! thx! :)
5 0
3 years ago
Which skill type refers to the knowledge and ability to perform a task?
Thepotemich [5.8K]

Sound, Audio for engineering sound Quality's.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and
    8·2 answers
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • What are the defenses to protect against these attacks?
    13·1 answer
  • You’re having trouble connecting to the Internet so you call your Internet service provider for help. They need to know the perm
    15·1 answer
  • Wanna song to vibe to? Listen to Streets by Doja cat
    11·1 answer
  • Write the correct statements for the above logic and syntax errors in program below.
    12·1 answer
  • If you were practicing keyboarding and the exercise contained the letters j, k, l, m, n, and b, what section of the
    14·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!