Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

HW 4

PLEASE REVIEW THE INFORMATION BELOW 

Submit the .cpp source code file on Ecampus.

Write a program that has the main menu listed below.  It should be in a while loop that repeats until the user selects 6 to Exit.

Program 1 Example Output

1 = Convert Fahrenheit to Celsius
2 = Convert Miles to Kilometers
3 = Convert Pounds to Kilograms
4 = Calculate value of coins
5 = Print for loop patterns
6 = Exit

Enter Your Choice: 2

Enter the number of Miles: 2
This is 3.3333 Kilometers

<program loops and goes back to main menu>

1 = Convert Fahrenheit to Celsius
2 = Convert Miles to Kilometers
3 = Convert Pounds to Kilograms
4 = Calculate value of coins
5 = Print for loop patterns
6 = Exit

Calculating value of coins – Ask the user how many pennies, nickels, dimes, and quarters they have.  Output the dollar value of the coins.

Also, output various comments about the dollar value of the coins.  For example:

Dollar Value

Output

< $0.50

You need to search for some pennies.

>= $0.50 and < $2.00

You can barely buy a soda.

>= $2.00 and < $5.00

You can eat at McDonald’sl

>= $5

All those coins must be heavy.

Example Output

How many pennies do you have? 3
How many nickels do you have? 2
How many dimes do you have? 1
How many quarters do you have? 2

The dollar value is $0.73
You can barely buy a soda.

Optional: The user would like to exchange their coins so that they will have the same amount of money, but with the fewest possible coins.  Tell the user the fewest coins that will add up to the same dollar amount.

Print for loop patterns – Use for loops to print the following patterns:

Pattern 1 – use a single for loop to print every 5th number from 105 – 500.  There should be 20 numbers per line.
Pattern 2 – use a nested for loop to print asterisks with 1 on the first line, 2 on the second line, … 10 on the tenth line.
Pattern 3 – use a nested for loop to print dollar signs with 10 on the first line, 9 on the second line, … 1 on the last line

Example Output

~~ Pattern 1 ~~
105 110 115 120 125 130 135 140 145 150 155 160 165 170 175 180 185 190 195 200
205 210 215 220 225 230 235 240 245 250 255 260 265 270 275 280 285 290 295 300
305 310 315 320 325 330 335 340 345 350 355 360 365 370 375 380 385 390 395 400
405 410 415 420 425 430 435 440 445 450 455 460 465 470 475 480 485 490 495 500
~~ Pattern 2 ~~
*
* *
* * *
* * * *
* * * * *
* * * * * *
* * * * * * *
* * * * * * * *
* * * * * * * * *
* * * * * * * * * *
~~ Pattern 3 ~~
$ $ $ $ $ $ $ $ $ $
$ $ $ $ $ $ $ $ $
$ $ $ $ $ $ $ $
$ $ $ $ $ $ $
$ $ $ $ $ $
$ $ $ $ $
$ $ $ $
$ $ $
$ $
$
 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

D 8 of 485

Follow the attached instructions to complete this work.   Strategies for Addressing Global Threats You will start by writing a short paper as described in the discussion question. You will be using information from this week’s readings and from your own research to address the information needs expressed in the

D 7 of 485

Follow the attached instructions to complete this work. Leadership Update: Cyber Crime   You will start by writing a short paper as described in the discussion question. You will be using information from this week’s readings and from your own research to address the information needs expressed in the question.

D 8 of 413

 Follow the attach instructions to complete this work. Budgeting for Cybersecurity   You will start by writing a short paper as described in the discussion question. You will be using information from this week’s readings and from your own research to address the information needs expressed in the question. Create an

Computer Science written assignment 3

Written Essay Assignment 3-1: · Identify common risks, threats, and vulnerabilities found in the LAN-to-WAN Domain that require proper security controls for mitigation · Identify network and security policies needed to properly secure the LAN-to-WAN portion of the network infrastructure · Write a 2-3 page APA-formatted essay that identifies network

project 3 of 485

Follow the attach instructions to complete the work. Make sure it aligns with the Rubric Project #3: Presentation for Board of Directors Your Task: Padgett-Beale’s Chief Information Security Officer (CISO) has tasked you to continue supporting the Merger & Acquisition team’s efforts to bring Island Banking Services’ security program into

project 2 of 485

Fellow the attach instructions to complete this work. Make sure it aligns with the Rubric Project #2: Cybersecurity Implementation Plan Your Task: The Acquisition of Island Banking Services has moved from the strategy development phase to the integration phase. In this phase, the M&A team will develop transition and implementation

PROJECT 1 of 485

Fellow the attach instructions to complete this work. Make sure it aligns with the rubric Project #1: Cybersecurity Strategy & Plan of Action Your Task: You have been assigned to support the Padgett-Beale Merger & Acquisition (M&A) team working under the direct supervision of Padgett-Beale’s Chief Information Security Officer (CISO).

proj3-Final

Project 3: Cloud Portfolio Report  Step 1: Review BallotOnline’s Cloud Services Offerings  You’ve now had a lot of experience working on many aspects of the cloud at BallotOnline, and you will take a look at what you’ve done in the past. In this step, you will write up how you

AWS Simple Monthly Calculator

Discussion: AWS Simple Monthly Calculator Contains unread posts Now that you have discussed BallotOnline’s cloud services offerings, you will discuss the AWS Simple Monthly Calculator. You should cover the following areas: · What are some of the general use cases that are covered? · What are the requirements to use

D 5 0F 485

Follow the attach instructions to complete this work. Assessing Maturity for Cybersecurity Program Before you begin read:  Our class focuses on integrating many different aspects of cybersecurity, information security, and information assurance.  Recent developments in the field of cybersecurity have resulted in a number of “maturity models” which can be

Discussion 4 of 413

Follow the attach instructions to complete the work Data Breach Reporting Policy Review the Red Clay Renovations company profile and the weekly readings. Provide specific information about “the company” in your response. Due to changes in state and federal laws, Red Clay leadership decided the CISO will be the sole

discussion 4 of 485

Follow the attach instructions to complete this work. Cultural Differences as Barriers to Success The Merger & Acquisition team hired a team of external consultants to assist with identification of cultural issues which could result in barriers to the successful acquisition of Island Banking Services by Padgett-Beale. The consultants conducted

project 3 of 413

Follow the attached instructions to complete this work Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file

Project 2 of 413

Follow the attach instructions to complete this work. Make sure it aligns with the rubric Project #2: Manager’s Deskbook Company Background & Operating Environment Red Clay Renovations is an internationally recognized, awarding winning firm that specializes in the renovation and rehabilitation of residential buildings and dwellings. The company specializes in

Project 1 of 413

Follow the attach instructions to complete this work. Make sure it aligns with rubric Project #1: Employee Handbook Company Background & Operating Environment Red Clay Renovations is an internationally recognized, awarding winning firm that specializes in the renovation and rehabilitation of residential buildings and dwellings. The company specializes in updating

Discussion and Replies

Please see attachment for instructions     Discussion   In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. 1. Discuss some of the common issues with implementation of security policy. 2. What are some possible mitigations to ensure policy can be enforced. Replies

revision x 10

I need someone to follow all of the instructions that is provided for revision that can be done no later than tomorrow, do not request bid if this price is not enough or if you cannot fulfill the requirements this is a time sensitive manner I cannot wait 3-4 days