Enter the last names of five candidates

Assignment Help Basic Computer Science
Reference no: EM13899501

Write a program that allows users to enter the last names of five candidates in a local election and the number of votes received by each candidate. The program should then output each candidate's name, the number of votes received, and the percentage of the total votes received by the candidate. Your program should also output the winner of the election. A sample output is:

Candidate

Votes Received

% of Total Votes

Jim

5000

25.91

Cosmos

4000

20.73

Bob

6000

31.09

Evelyn

2500

12.95

Larry

1800

9.33

Total

19300

The Winner of the Election is Bob.

 

Reference no: EM13899501

Questions Cloud

What is the probability that a blue chip will be drawn : The probability of drawing a pink chip from a bowl of different colored chips is 0.35, the probability of drawing a blue chip is 0.46, the probability of drawing a green chip is 0.15, and the probability of drawing a purple chip is 0.04. What is ..
Create sheet sales and put reasonable numbers : Create a file: Pizza_by_First_Last.xlsm . Create sheet Sales and put reasonable numbers for prices (your choice), add create formulas. Put the % for sales tax in H1 (it is 8% in NY).  After that, you need to put formulas in place, add a row for total..
Analyze common ethernet standards found in a switched lan : Analyze common Ethernet standards found in a switched LAN fabric. ? Summarize the nature of Ethernet frames that are processed in LAN switching.
Cases that compare specification limits to control limits : What do control limits represent? What do specification limits represent? Describe the three cases that compare specification limits to control limits
Enter the last names of five candidates : Write a program that allows users to enter the last names of five candidates in a local election and the number of votes received by each candidate. The program should then output each candidate's name, the number of votes received, and the percentag..
Prepare a statement of cash flows using the indirect method : The following comparative balance sheets and income statement are available for Little Bit Inc. Prepare a statement of cash flows for 2012 using the indirect method and analyze the statement.
Determine the area between the curves : A stock analyst plots the price per share of a certain stock as a function of time and finds that it can be modeled by the function S(t)=25-5√10t where t is the time (in years) since the stock was purchased. Find the average price of the stock o..
What are the server-side attacks : What are the server-side attacks? What are the techniques a developer can employ to minimize these attacks?What are some of the individual rights associated with information privacy? Do expectations of privacy change depending on the individual's env..
Discuss the concept of optimal capital structure : Identify and discuss the concept of optimal capital structure

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many bits are needed to encode book in ascii with parity

Estimate how many characters, including spaces, a typical computer-science textbook contains. How many bits are needed to encode a book in ASCII with parity?

  Enterprise impact and measurement of business intelligence

Write a summary of the discussion your team had about enterprise impact and measurement of business intelligence.

  Define a 1-d array named people types

Define a 1-D array named people Types that can store a maximum of 50 integer values that will be entered at the keyboard.

  Code (sketch) for an arduino uno microcontroller

Code (sketch) for an arduino uno microcontroller that will be connected to an MT8870 decoder chip. This chip decodes the signal it receives from a phone mic as a dtmf (dual tone multiple frequency) signal. Then the decoder chip translates the tones i..

  Limit approach to determine the order

Use the limit approach to determine the order for g(n) = n^J and f(n) = n^k, where k > j > 2

  Describe steps improving or maintaining relations with other

Describe the steps necessary for improving and maintaining relations with other business units

  How does the failure region ofthe equality constraint differ

How does the failure region of the equality constraint differ from that of the inequality constraint studied in the earlier examples?

  Describe one real or future (even imaginary) iot

Describe one real or future (even imaginary) IoT (or CPS - Cyber Physical System) usecase. Provide details on the system(s) requirements from user(s)/actor(s) perspective.

  How spki be augmented to support policy

Consider a policy that, for reasons of separation of duties, does not allow an entity to exercise the rights it may grant (delegate) to others. How could SPKI be augmented to support such a policy?

  How each room is identified by a room number

Each resident patient will stay in only one room. Every room must have had a patient, and every resident patient must have a room.

  List typical reports needed by this business

List typical reports needed by this business that would be generated from this database and specify their use. For one of the reports listed, define the report, in terms of selection criteria, sort order, data elements and use of the report.

  Find benefits of using the technology to support learning

The policy should include the Do's and Don'ts of computer and internet use as well as penalties that could be applied if the policy is breached.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd