Write a program that mimics a calculator. The program should take as input two integers and the operation to be performed. It should then output the numbers, the operator, and the result. For division, if the denominator is zero, output an appropriate message. Limit the supported operations to -/ *and write an error message if the operator is not one of the supported operations. Here is some example output:3 4

Answers

Answer 1

Answer:

The cpp calculator program is as follows.

#include <iostream>

using namespace std;

int main()

{

   //variables to hold two numbers and operation

   int num1;

   int num2;

   char op;

   char operations[] = {'-', '/', '*'};

   std::cout << "Enter first number: ";

   cin>>num1;

   std::cout << "Enter second number: ";

   cin>>num2;

   do

   {

       std::cout << "Enter the operation to be performed(-, /, *): ";

       cin>>op;

       if(op!=operations[0] && op!=operations[1] && op!=operations[2])

           std::cout << "Invalid operator." << std::endl;

   }while(op!=operations[0] && op!=operations[1] && op!=operations[2]);

   std::cout<< "Numbers are "<< num1 <<" and "<< num2 <<std::endl;

   std::cout << "Operator is " <<op<< std::endl;

   if(op==operations[0])

       std::cout << "Result is "<< num1-num2 << std::endl;  

   if(op==operations[1])

       if(num2==0)

           std::cout << "Denominator is zero. Division cannot be performed." << std::endl;

       else

           std::cout << "Result is "<< num1/num2 << std::endl;

   if(op==operations[2])

           std::cout << "Result is "<< num1*num2 << std::endl;

   return 0;  

}

OUTPUT

Enter first number: 12                                                                                                                    Enter second number: 0                                                                                                                         Enter the operation to be performed(-, /, *): +                                                                                                Invalid operator.                                                                                                                              Enter the operation to be performed(-, /, *): /                                                                                                Numbers are 12 and 0                                                                                                                           Operator is /                                                                                                                                  Denominator is zero. Division cannot be performed.

Explanation:

1. Declare two integer variables to hold the numbers.

int num1;

int num2;

2. Declare one character variable to hold the operation to be performed.

char op;

3. Declare one character array to hold all the operations.

char operations[] = {'-', '/', '*'};

4. User input is taken for the two numbers followed by the operation to be performed.

5. Validation is applied for incorrect operation entered by the user. This is done using if statement inside a do-while loop.

6. Once the correct input is obtained, the calculator program performs the required operation on the numbers. This is done using if statements.

7. If the denominator number is zero for division operation, a message is displayed to the user.

8. The numbers followed by the operation chosen by the user are displayed.

9. The result of the operation is computed and displayed.


Related Questions

A/an is a series of instructions or comands that computers follows used to create software

Answers

Answer:

Program

Explanation:

All computers have to follow a program to operate. Without a program, computers would not do what they are capable of today, and computers most likely wouldn't work.

Hope this helps! :)

which are the focus area of computer science and engineering essay. According to your own interest.

Answers

Answer:

Explanation:

While sharing much history and many areas of interest with computer science, computer engineering concentrates its effort on the ways in which computing ideas are mapped into working physical systems.Emerging equally from the disciplines of computer science and electrical engineering, computer engineering rests on the intellectual foundations of these disciplines, the basic physical sciences and mathematics

How did the case Cubby v. CompuServe affect hosted digital content and the contracts that surround it?

Answers

Although CompuServe did post libellous content on its forums, the court determined that CompuServe was just a distributor of the content and not its publisher. As a distributor, CompuServe could only be held accountable for defamation if it had actual knowledge of the content's offensive character.

What is CompuServe ?

As the first significant commercial online service provider and "the oldest of the Big Three information services," CompuServe was an American company. It dominated the industry in the 1980s and continued to exert significant impact into the mid-1990s.

CompuServe serves a crucial function as a member of the AOL Web Properties group by offering Internet connections to budget-conscious customers looking for both a dependable connection to the Internet and all the features and capabilities of an online service.

Thus,  CompuServe could only be held accountable for defamation if it had actual knowledge of the content's offensive character.

To learn more about CompuServe, follow the link;

https://brainly.com/question/12096912

#SPJ1

What do we call stores in a physical world?


non-virtual stores

location stores

brick-and-mortar stores

physical stores

Answers

Answer:

brick and mortar stores i believe

What are the different types database of end users? Discuss the main activi-ties of each

Answers

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

Answer:

1. Casual End Users

These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.

2. Naive or parametric end users

These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:

The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.

Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.

Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.

3. Sophisticated end users

These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.

4. Standalone users

These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

Whst addresses do not change if you copy them to a different cell?

Answers

The type of addresses that do not change if you copy them to a different cell is Absolute references.

What are absolute references?

There are known to be two types of cell references which are: relative and absolute.

Note that Relative and absolute references can work differently if copied and filled to other cells. The Absolute references, is one that often remain constant, no matter where a person may have copied them to.

Therefore, The type of addresses that do not change if you copy them to a different cell is Absolute references.

Learn more about Absolute references from

https://brainly.com/question/11764922

#SPJ1

Two variables named largest and smallest are declared for you. Use these variables to store the largest and smallest of the three integer values. You must decide what other variables you will need and initialize them if appropriate. Your program should prompt the user to enter 3 integers. Write the rest of the program using assignment statements, if statements, or if else statements as appropriate. There are comments in the code that tell you where you should write your statements. The output statements are written for you. Execute the program by clicking the Run button at the bottom of the screen. Using the input of -50, 53, 78, your output should be: The largest value is 78 The smallest value is -50

Answers

Here's an example program in Python that stores the largest and smallest of three integer values entered by the user:

```python

# Declare variables for largest and smallest

largest = None

smallest = None

# Prompt user to enter three integers

num1 = int(input("Enter first integer: "))

num2 = int(input("Enter second integer: "))

num3 = int(input("Enter third integer: "))

# Determine largest number

if num1 >= num2 and num1 >= num3:

   largest = num1

elif num2 >= num1 and num2 >= num3:

   largest = num2

else:

   largest = num3

# Determine smallest number

if num1 <= num2 and num1 <= num3:

   smallest = num1

elif num2 <= num1 and num2 <= num3:

   smallest = num2

else:

   smallest = num3

# Output results

print("The largest value is", largest)

print("The smallest value is", smallest)

```

In this program, the variables `largest` and `smallest` are declared and initialized to `None`. Three additional variables `num1`, `num2`, and `num3` are declared and initialized with integer values entered by the user using the `input()` function and converted to integers using the `int()` function.

The program then uses a series of `if` and `elif` statements to determine the largest and smallest of the three numbers, based on their values. The `largest` and `smallest` variables are updated accordingly.

Finally, the program outputs the results using two `print()` statements.v

what is human computer interaction​

Answers

Explanation:

Human computer interaction is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Answer:

It is the way humans interact with computers; interfaces, special effects, icons, and buttons, it does not end there. HCI can also be looked at as a study to see what [person] will do with the computer.

this has nothing to do with computers but its for brainly. if somebody is an expert in brainly im not sure. but why do my questions keep getting deleted? my question “does not follow guidelines” but im just trying to ask a math question

Answers

Answer:

Maybe its a word or the subject you are talking about. If its a exam or ohio state test they might delete you're question.

You work part-time at a computer repair store. You are building a new computer. A customer has purchased two serial ATA (SATA) hard drives for his computer. In addition, he would like you to add an extra eSATA port that he can use for external drives. In

Answers

Install an eSATA expansion card in the computer to add an extra eSATA port for the customer's external drives.

To fulfill the customer's request of adding an extra eSATA port for external drives, you can install an eSATA expansion card in the computer. This expansion card will provide the necessary connectivity for the customer to connect eSATA devices, such as external hard drives, to the computer.

First, ensure that the computer has an available PCIe slot where the expansion card can be inserted. Open the computer case and locate an empty PCIe slot, typically identified by its size and the number of pins. Carefully align the expansion card with the slot and firmly insert it, ensuring that it is properly seated.

Next, connect the power supply cable of the expansion card, if required. Some expansion cards may require additional power to operate properly, and this is typically provided through a dedicated power connector on the card itself.

Once the card is securely installed, connect the eSATA port cable to the expansion card. The cable should be included with the expansion card or can be purchased separately if needed.

Connect one end of the cable to the eSATA port on the expansion card and the other end to the desired location on the computer case where the customer can easily access it.

After all connections are made, close the computer case, ensuring that it is properly secured. Power on the computer and install any necessary drivers or software for the expansion card, following the instructions provided by the manufacturer.

With the eSATA expansion card installed and configured, the customer will now have an additional eSATA port available on their computer, allowing them to connect external drives and enjoy fast data transfer speeds.

For more question on computer visit:

https://brainly.com/question/30995425

#SPJ8

An if statement must always begin with the word “if.” True False python

Answers

Answer:

true

Explanation:

The given statement is true, that an if statement must always begin with the word “if.” in python.

What is the python?

A high-level, all-purpose programming language is Python. Code readability is prioritized in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing.

It supports a variety of paradigms for programming, including functional, object-oriented, and structured programming. An “if” statement must always be the first word in a sentence.

One of the most often used conditional statements in computer languages is the if statement in Python. It determines whether or not particular statements must be performed. It verifies a specified condition; if it is true, the set of code included within the “if” block will be run; if not, it will not.

Therefore, it is true.

Learn more about the python, refer to:

https://brainly.com/question/18502436

#SPJ2

Jessica has a file named “Articles” on her laptop. She decides to assign a different name to the file. Which option should she use to save the file with a different name? A. right-click and save the file B. right-click and open the file C. right-click and rename the file D. right-click and copy the file E. right-click and close the file

Answers

Answer:

I think the answer is C.

Explanation:

I tried it on my laptop and it worked. Therefore I believe the answer is C. Also since Jessica found the file named article on her computer we can assume the file is already saved.

Answer:

I think the answer is C.

Explanation:

I tried it on my laptop and it worked. Therefore I believe the answer is C. Also since Jessica found the file named article on her computer we can assume the file is already saved.

Explanation:

Using relevant examples from a country of your choice critically examine the issue of Bring your own device in Organisation

Answers

Answer:

jtnntnthjrjrjhrhehrhhrhhrhrhtbtbbthtbtbrbbtbt

Perform an “average case” time complexity analysis for Insertion-Sort, using the given proposition
and definition. I have broken this task into parts, to make it easier.
Definition 1. Given an array A of length n, we define an inversion of A to be an ordered pair (i, j) such
that 1 ≤ i < j ≤ n but A[i] > A[j].
Example: The array [3, 1, 2, 5, 4] has three inversions, (1, 2), (1, 3), and (4, 5). Note that we refer to an
inversion by its indices, not by its values!
Proposition 2. Insertion-Sort runs in O(n + X) time, where X is the number of inversions.
(a) Explain why Proposition 2 is true by referring to the pseudocode given in the lecture/textbook.
(b) Show that E[X] = 1
4n(n − 1). Hint: for each pair (i, j) with 1 ≤ i < j ≤ n, define a random indicator
variable that is equal to 1 if (i, j) is an inversion, and 0 otherwise.
(c) Use Proposition 2 and (b) to determine how long Insertion-Sort takes in the average case.

Answers

a. Proposition 2 states that Insertion-Sort runs in O(n + X) time, where X is the number of inversions.

b. The expected number of inversions, E[X],  E[X] = 1/4n(n-1).

c. In the average case, Insertion-Sort has a time complexity of approximately O(1/4n²).

How to calculate the information

(a) Proposition 2 states that Insertion-Sort runs in O(n + X) time, where X is the number of inversions. To understand why this is true, let's refer to the pseudocode for Insertion-Sort:

InsertionSort(A):

  for i from 1 to length[A] do

     key = A[i]

     j = i - 1

     while j >= 0 and A[j] > key do

        A[j + 1] = A[j]

        j = j - 1

     A[j + 1] = key

b. The expected number of inversions, E[X], can be calculated as follows:

E[X] = Σ(i,j) E[I(i, j)]

= Σ(i,j) Pr((i, j) is an inversion)

= Σ(i,j) 1/2

= (n(n-1)/2) * 1/2

= n(n-1)/4

Hence, E[X] = 1/4n(n-1).

(c) Using Proposition 2 and the result from part (b), we can determine the average case time complexity of Insertion-Sort. The average case time complexity is given by O(n + E[X]).

Substituting the value of E[X] from part (b):

Average case time complexity = O(n + 1/4n(n-1))

Simplifying further:

Average case time complexity = O(n + 1/4n^2 - 1/4n)

Since 1/4n² dominates the other term, we can approximate the average case time complexity as:

Average case time complexity ≈ O(1/4n²)

Therefore, in the average case, Insertion-Sort has a time complexity of approximately O(1/4n²).

Learn more about proposition on

https://brainly.com/question/30389551

Date:
Difference between Chemical Equivalent and Electroche-
mical equivalent.​

Answers

Answer:

chemical equivalent of an element is the value obtained by dividing the atomic weigh of the given element by valency

Use the drop-down menus to select the software term being described. The is what the user interacts with when operating a computer. The is the most important computer software. The is the software located within the hardware.

Answers

Answer:

1.)  A. application software

2.) C. operating system

3.) B. basic input/output system

Answer:

All of his are correct :)

Explanation:

Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.

Answers

The three genuine statements almost how technology has changed work are:

Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.

With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.

Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.

Technology explained.

Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.

Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.

Learn more about technology below.

https://brainly.com/question/13044551

#SPJ1

To address cybercrime at the global level, law enforcement needs to operate
.

Answers

In order to address  cybercrime on a worldwide scale, it is imperative that law enforcement agencies work together in a collaborative and cooperative manner across international borders.

What is the cybercrime?

Cybercrime requires collaboration and synchronization among countries. Collaboration among law authorization organizations over different countries is basic for the effective request, trepidation, and conviction of cybercriminals.

In arrange to combat cybercrime in an compelling way, it is pivotal for law authorization to collaborate and trade insights, capability, as well as assets.

Learn more about cybercrime  from

https://brainly.com/question/13109173

#SPJ1

List and describe in detail any four power management tools that were developed by at
least two manufacturers to prevent and/or reduce the damage of processors from the
process of overclocking. Your answer must also include the manufacturers name

Answers

Power management tools is a kind of technology that enables the efficient and optimized management of the power that is consumed by computer hardware.

What is the purpose of a power management tool?

The key purpose of a power management tool is to help:

minimize power consumption;save costspreserve the optimal performance of the system.

Examples of power management tools are:

Signal chain PowerADI Power StudioLTpowerPlay, etc.

Learn more about Power management tools at:
https://brainly.com/question/12816781

GPS consists of three segments. What are these segments?
GPS consists of three segments:
blank 1:
technical
terrestrial
space
blank 2:
control
aerodynamics
academic
and
blank 3:;
internet
user
geology

GPS consists of three segments. What are these segments?GPS consists of three segments:blank 1: technicalterrestrialspaceblank

Answers

Answer the answer is he Global Positioning System (GPS) is a U.S.-owned utility that provides users with positioning, navigation, and timing (PNT) services. This system consists of three segments: the space segment, the control segment, and the user segment. The U.S. Space Force develops, maintains, and operates the space and control segments.

Explanation:

Need an answer in Python

Write a program for. checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Answers

Using the knowledge in computational language in python it is possible to write a code that checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Writting the code:

def conjunction(p, q):

    return p and q

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = conjunction(p, q)

        print(p, q, a)

def exclusive_disjunction(p, q):

    return (p and not q) or (not p and q)

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = exclusive_disjunction(p, q)

        print(p, q, a)

See more about python at brainly.com/question/18502436

#SPJ1

Need an answer in PythonWrite a program for. checking the truth of the statement (X Y Z) = X Y Z for

Implement a class Balloon that models a spherical balloon that is being filled with air. The constructor constructs an empty balloon. Supply these methods:

void addAir(double amount) adds the given amount of air.
double getVolume() gets the current volume.
double getSurfaceArea() gets the current surface area.
double getRadius() gets the current radius.

Supply a BalloonTester class that constructs a balloon, adds 100cm^3 of air, tests the three accessor methods, adds another 100cm3 of air, and tests the accessor methods again.

Answers

Answer:

Here is the Balloon class:

public class Balloon {  //class name

private double volume;  //private member variable of type double of class Balloon to store the volume

 

public Balloon()  {  //constructor of Balloon

 volume = 0;  }  //constructs an empty balloon by setting value of volume to 0 initially

 

void addAir(double amount)  {  //method addAir that takes double type variable amount as parameter and adds given amount of air

 volume = volume + amount;  }  //adds amount to volume

 

double getVolume()  {  //accessor method to get volume

 return volume;  }  //returns the current volume

 

double getSurfaceArea()  {  //accessor method to get current surface area

 return volume * 3 / this.getRadius();  }  //computes and returns the surface area

 

double getRadius()  {  //accessor method to get the current radius

 return Math.pow(volume / ((4 * Math.PI) / 3), 1.0/3);   }  } //formula to compute the radius

Explanation:

Here is the BalloonTester class

public class BalloonTester {  //class name

  public static void main(String[] args)    { //start of main method

      Balloon balloon = new Balloon();  //creates an object of Balloon class

      balloon.addAir(100);  //calls addAir method using object balloon and passes value of 100 to it

      System.out.println("Volume "+balloon.getVolume());  //displays the value of volume by getting value of volume by calling getVolume method using the balloon object

      System.out.println("Surface area "+balloon.getSurfaceArea());  //displays the surface area by calling getSurfaceArea method using the balloon object

             System.out.println("Radius "+balloon.getRadius());   //displays the value of radius by calling getRadius method using the balloon object

     balloon.addAir(100);  //adds another 100 cm3 of air using addAir method

       System.out.println("Volume "+balloon.getVolume());  //displays the value of volume by getting value of volume by calling getVolume method using the balloon object

      System.out.println("Surface area "+balloon.getSurfaceArea());  //displays the surface area by calling getSurfaceArea method using the balloon object

             System.out.println("Radius "+balloon.getRadius());    }  }  //displays the value of radius by calling getRadius method using the balloon object

//The screenshot of the output is attached.

Implement a class Balloon that models a spherical balloon that is being filled with air. The constructor

"The constructor signature is defined as the constructor __________ followed by the __________. (3 points)
1) name, parameter list
2) name, return type
3) definition, body
4) definition, parameter list
5) header, body"

Answers

"The constructor signature is defined as the constructor name followed by the parameter list. (Option A)

What is a constructor?

A constructor is a specific sort of subroutine that is invoked to build an object in class-based, object-oriented programming. It is responsible for preparing the new object for usage by receiving parameters that the constructor uses to set needed member variables.

A constructor is a particular function in Java that is used to initialize objects. When a class object is formed, the constructor is invoked.

It is called a constructor because it builds the values when an object is created. A constructor does not have to be written for a class. It's because the java compiler generates a default constructor if your class lacks one.

Learn more about Constructor:
https://brainly.com/question/17347341
#SPJ1

You are asked to transfer a few confidential enterprise files using the file transfer protocol (FTP). For ensuring utmost security, which variant of FTP should you choose

Answers

Considering the situation described above, to ensure utmost security, the variant of FTP people should choose is SFTP.

What is SFTP?

SFTP is the acronym for Secure File Transfer Protocol (SFTP). It functions through the Secure Shell (SSH) data stream to create a secure connection.

SFTP is generally known for providing excellent protection for file transfer.

Other types of FTP

Anonymous FTPPassword Protected FTPFTP Secure (FTPS)FTP over explicit SSL/TLS (FTPES)

Hence, in this case, it is case, it is concluded that the correct answerer is SFTP.

Learn more about file transfer protection here: https://brainly.com/question/17506968

In this lab, you complete a prewritten c++ program that computes the largest and smallest of three integer values.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

 int num1, num2, num3;

 int largest, smallest;

 cout << "Enter three integers: ";

 cin >> num1 >> num2 >> num3;

 // Write your code here

 cout << "The largest number is " << largest << endl;

 cout << "The smallest number is " << smallest << endl;

 return 0;

}

The code to complete the program is as follows:

//Write your code here

if (num1 >= num2 && num1 >= num3) {

 largest = num1;

 if (num2 >= num3) {

   smallest = num3;

 }

 else {

   smallest = num2;

 }

}

else if (num2 >= num1 && num2 >= num3) {

 largest = num2;

 if (num1 >= num3) {

   smallest = num3;

 }

 else {

   smallest = num1;

 }

}

else {

 largest = num3;

 if (num1 >= num2) {

   smallest = num2;

 }

 else {

   smallest = num1;

 }

}

Match the features of integrated development environments (IDEs) and website builders to the appropriate location on the chart.

Match the features of integrated development environments (IDEs) and website builders to the appropriate

Answers

Answer:

website builder

complex coding techniques and advanced programming languages.

And one well written paragraph, explain how you can put raw data into excel and turn it into something useful that could be used in different Microsoft office applications.

Answers

The way that you can put raw data into excel and turn it into something useful that could be used in different Microsoft office applications are:

Open the Excel file into which the data is to be imported.Now, select the Data tab on the ribbon.Select  the Get Data option. Select From File > From Text/CSV.Through the use of the explorer, Select a CSV file. Lastly, Select the Load button.

What is excel about?

Excel is said to often used to save, analyze, a well as report on large volume of data.

Note that It is often used as a tool by accounting teams for the recording of financial analysis, as well as been used by professional to manage a list of and unwieldy form of datasets. Examples of Excel applications are balance sheets, budgets, etc.

Learn more about Microsoft office applications from

https://brainly.com/question/15131211
#SPJ1

Name the computer crime that has to do with posting false information/ accusations about another person online.​

Answers

Answer:

cyberstalking

Explanation:


Classify the following into online and offline storage
CD-ROM,Floppy disk,RAM,cache Memory,Registers

Answers

RAM and cache memory are examples of online storage as they provide direct and fast access to data. CD-ROM, floppy disk, and registers are examples of offline storage as they require external devices or are part of the processor's internal storage.

Online Storage:

1. RAM (Random Access Memory): RAM is a type of volatile memory that provides temporary storage for data and instructions while a computer is running. It is considered online storage because it is directly accessible by the computer's processor and allows for fast retrieval and modification of data.

2. Cache Memory: Cache memory is a small, high-speed memory located within the computer's processor or between the processor and the main memory. It is used to temporarily store frequently accessed data and instructions to speed up processing. Cache memory is considered online storage because it is directly connected to the processor and provides quick access to data.

Offline Storage:

1. CD-ROM (Compact Disc-Read-Only Memory): A CD-ROM is a type of optical disc that stores data and can only be read. It is considered offline storage because data is stored on the disc and requires a CD-ROM drive to read the information.

2. Floppy Disk: A floppy disk is a portable storage medium that uses magnetic storage to store data. It is considered offline storage because it requires a floppy disk drive to read and write data.

3. Registers: Registers are small, high-speed storage locations within the computer's processor. They hold data that is currently being used by the processor for arithmetic and logical operations. Registers are considered offline storage because they are part of the processor's internal storage and not directly accessible or removable.

for more questions on memory

https://brainly.com/question/28483224

#SPJ11

Other Questions
What observations and reasoning led to the development of Hubble's Law? How many possible combinations for march madness bracket. 41 is 10 1/4% of what number Ideally, questionable requests not to participate in a patient's care should be considered for review by the ___________ What is the range of possible sizes for side x? Online content that has been created and posted by unpaid contributors such as customers or fans of a product or service is referred to as:. How much is 200000 in yen in US dollars? When applying LP to diet problems, the objective function is usually designed to a) maximize profits from bends of nutrients b) maximize ingredient blends c) minimize production losses d) maximize the number of products to be produced e) minimize the costs of nutrient blends help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help help 17. Factor completely: A. 9x2 + 24x + 16B. 80 405x4 C. 0.3x3 + 8.1D. x4 + 2x3 5x 10 Why did Scott believe he should be free?here is the story help pls turkey farmingplacing poor performers alongside strong performer Find the missing side. Round tothe nearest tenth.1940[ ? Select the correct text in the passage.Which quotation in the text foreshadows a romantic encounter?from The Squatter and the Donby Mara Ruiz de BurtonThe Squatter and the Don involves two families in San Diego in the 1870s. The Alamar family, headed by Don Mariano, has lived on a large ranch for decades. But since the Mexican-American War ended, settlers from the eastern United States have been occupying the Alamars land. In this excerpt, Clarence Darrell, the son of one such settler, runs into Seor Alamars son Don Victoriano.Good morning, said Clarence, I am glad to catch up with you, Don Victoriano. I have been wanting to speak to you.Victoriano bowed, saying, Will you go to my house?No, I'd rather not. I am not dressed to be seen by ladies. I would rather speak to you here.You are going to build a large house, Mr. Darrell? said Victoriano, turning his horse so as to ride beside Clarence; judging by the amount of lumber being hauled.Yes; rather. We are a large family, and require a good deal of room. But before we do any more work I want to speak with your father. I want to ask himask him as a favorand yet, as a business propositionhe hesitated; he was evidently embarrassed; but Victoriano, not guessing the drift of his words, remained waiting silently, offering no assistance. Well, he continued, I mean this: I don't like this fashion of taking people's lands, and I would like to pay to Seor Alamar for what has been located by us, but at the same time I do not wish my father to know that I have paid for the land, as I am sure he would take my action as a reproachas a disclaimer of his own action, and I don't wish to hurt his feelings, or seem to be disrespectful.I understand, and I think my father will be willing to sell the land. He is at home now. Let us go up to see him.Had you not better speak to him, and make an appointment for me to see him to-morrow, or some other time? I'd rather not risk being seen by the ladies in this blue flannel shirt and heavy boots. I look too roughlike a smuggler or a squatter, sure.I can call my father to speak to you outside, so that the ladies need not see you. But if they should, that needn't disturb you. They have too much sense not to know that you would not be working in white kid gloves. Come on. The front veranda is empty. Mother and three of my sisters are at the Mechlin's. Mercedes is the only one at home, and she is too busy with her embroidery in Madam Halier's room to come near you. I'll bring father to the front veranda.Clarence and Victoriano tied their horses by the garden gate and walked to the piazza. The hall door was ajar. Clarence saw no ladies about and felt reassured. What is the future value of $100,000 after 8 years earning 3ompounded monthly? round to the nearest whole number. _____ refers to the process of using various methods to reduce the possibility of a loss occurring. multiple choice loss avoidance loss control risk assumption risk transfer Find the length s of the circular arc. (Assume r = 2 and = 116.) find k such that x(t) = 9^t is a solution of the differential equation ndx/dt = kx to better ensure that an item is clearly true or false, what should be avoided?a. use of positive languageb. use of qualifiers such as "always" and "never"c. writing the item as a questiond. asking for an opinion 3.15 Fuel cells are being developed that make use of organic fuels; in due course they might be used to power tiny intra- venous machines for carrying out repairs on diseased tissue. What is the maximum non-expansion work that can be ob- tained from the metabolism of 1.0 mg of sucrose to carbon dioxide and water?