pseudo code, Programming Languages

Assignment Help:
I need help putting this into a flowchart constant c as Integer = 3500 Constant CALORIESTOOUNCE as Integer = 219 Declare Sex as Character Declare Age as Integer Declare Weight as Integer Declare Height as Integer Declare Calories as Integer Declare Exercise as Integer Declare Duration as Integer Declare CaloriesBurnedByExercise as Float Declare TotalCaloriesBurned as Float Declare CalorieDifference as Float Declare bmr as Float //Declare an array of MET values. We will have 9 common activities Declare met [10] as Float Declare HarrisBMR as Float Declare Choice as Integer Declare M as Integer //for counter CONSTANT Pound to Calories as Integer = 3500//Let’s go ahead and initialize our array of METs met[0] = 4.3 //Walking for exercise met[1] = 7 //Jogging met[2] = 9.8 //Running 6.0/10 min mile met[3] = 11 //Running 7.0/8 min mile met[4] = 7.5 //Bicycling met[5] = 6.0 //Weight lifting met[6] = 6.5 //Basketball met[7] = 4.8 //Golf met[8] = 8.8 //Jump Rope met[9] = 0 //Nothing Write "********Learning Team A –Calorie Management Program****************" Write “This program computes calories based on caloric intake and caloric expenditure.” Call InputData module Call PerformCalculations module Call OutputResults module End Program

Related Discussions:- pseudo code

Use an insertion sort to sort an array, Use an insertion sort to sort an ar...

Use an insertion sort to sort an array (sequence) of long word integers. The size of the list will appear just before the list itself. Use the same labels as in this example: LE

C++, You are to write a program which will answer a pair of questions for s...

You are to write a program which will answer a pair of questions for squares, triangles, circles and ellipses. A square is defined by its lower left corner (SLLx,SLLy), and the len

Write a program to decrypt encrypted messages, You are working for a crypto...

You are working for a cryptography department, where one of your jobs is to decipher intercepted messages that have been encrypted using a book cipher. The messages are sent by dif

Explain the different states of activity diagram, Question 1 Discuss on In...

Question 1 Discuss on Inheritance Question 2 What are the four phases of the object modeling technique that can be repetitively executed? Question 3 Explain the di

Prolog predicate to remove nth element, Write a Prolog predicate remove_nth...

Write a Prolog predicate remove_nth(N,L1,L2) that is true if list L2 is just list L1 with its Nth element removed. If L1 does not have an Nth element then the predicate should fail

Lmc, Plan, design and dry run a program for the Little Man Computer (LMC) t...

Plan, design and dry run a program for the Little Man Computer (LMC) that produces the same result using a fixed number of 10 iterations.

Define remote procedure call, Problem: (i) Define Remote Procedure Cal...

Problem: (i) Define Remote Procedure Call (RPC). (ii) Explain with diagram how RPC works? (iii) A remote procedure is uniquely defined by (a) Program number. (b)

List recursion to de ne the function, Use list recursion to de ne the funct...

Use list recursion to de ne the function mySum which takes as input an integer and a list of integers and returns the list obtained by adding every element of the list by the rst

Implement a program that can draw graphs, 1. Implement a program where an e...

1. Implement a program where an ellipse follows the perimeter of the window. 2. Implement a program that can draw graphs, possibly following your plan from last week. Have it gr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd