Enter the last names of five candidates

Assignment Help Basic Computer Science
Reference no: EM13899501

Write a program that allows users to enter the last names of five candidates in a local election and the number of votes received by each candidate. The program should then output each candidate's name, the number of votes received, and the percentage of the total votes received by the candidate. Your program should also output the winner of the election. A sample output is:

Candidate

Votes Received

% of Total Votes

Jim

5000

25.91

Cosmos

4000

20.73

Bob

6000

31.09

Evelyn

2500

12.95

Larry

1800

9.33

Total

19300

The Winner of the Election is Bob.

 

Reference no: EM13899501

Questions Cloud

What is the probability that a blue chip will be drawn : The probability of drawing a pink chip from a bowl of different colored chips is 0.35, the probability of drawing a blue chip is 0.46, the probability of drawing a green chip is 0.15, and the probability of drawing a purple chip is 0.04. What is ..
Create sheet sales and put reasonable numbers : Create a file: Pizza_by_First_Last.xlsm . Create sheet Sales and put reasonable numbers for prices (your choice), add create formulas. Put the % for sales tax in H1 (it is 8% in NY).  After that, you need to put formulas in place, add a row for total..
Analyze common ethernet standards found in a switched lan : Analyze common Ethernet standards found in a switched LAN fabric. ? Summarize the nature of Ethernet frames that are processed in LAN switching.
Cases that compare specification limits to control limits : What do control limits represent? What do specification limits represent? Describe the three cases that compare specification limits to control limits
Enter the last names of five candidates : Write a program that allows users to enter the last names of five candidates in a local election and the number of votes received by each candidate. The program should then output each candidate's name, the number of votes received, and the percentag..
Prepare a statement of cash flows using the indirect method : The following comparative balance sheets and income statement are available for Little Bit Inc. Prepare a statement of cash flows for 2012 using the indirect method and analyze the statement.
Determine the area between the curves : A stock analyst plots the price per share of a certain stock as a function of time and finds that it can be modeled by the function S(t)=25-5√10t where t is the time (in years) since the stock was purchased. Find the average price of the stock o..
What are the server-side attacks : What are the server-side attacks? What are the techniques a developer can employ to minimize these attacks?What are some of the individual rights associated with information privacy? Do expectations of privacy change depending on the individual's env..
Discuss the concept of optimal capital structure : Identify and discuss the concept of optimal capital structure

Reviews

Write a Review

Basic Computer Science Questions & Answers

  When you need to return the value of a function

In C programming: When you need to return the value of a function and you are not allowed to use the normal return value of the function, could you do it using: Call_by_val or Call_by_reference?

  The number of occurrences of each status using the count

Write a SQL expression to display each Status and the number of occurrences of each status using the Count(*) function; display the result of the Count(*) function as CountStatus. Group by Status and display the results in descending order of CountSt..

  Using professional principles and standards

Design and develop the below queries using professional principles and standards: A set of SQL Statements that returns all rows and all data for each table in your database. Two SQL Statements that return a subset of columns and a subset of rows ..

  Display the new list as well as the two old list

Display the new list as well as the two old list Thank you in advance.

  Design a payroll class

Write the appropriate accessor and mutator methods and a constructor that accepts the employee's name and ID number as arguments.

  Explaining negative reactions to pop-up and pop-behind

Many people have strong negative reactions to pop-up, pop-behind, interstitial, and rich media ads. Assume you are the director of an advertising agency that specializes in creating and placing these ads.

  Revise the solution to the balanced-braces problem

revise the solution to the balanced-braces problem so that the expression can contain three types of delimiters ( ), [ ], and { }: Thus {ab(c[d])e} is valid, but {ab(c))is not.

  Research wireless standard

Research the 802.11 wireless standards, select 3 implementations (802.11e, 802.11i, 802.11n, 802.11ac, etc.), and describe each of them in 1-2 paragraphs.

  How would you recommend that encyclopedia

How would you recommend that Encyclopedia Britannica adapt to this new threat

  Tools or tactics used by risk assessment team

In your new position at XYZ Corporation, you have been asked to lead risk assessment team. How can you bring everyone to agreement an what are there any tools or tactics you might use to help?

  Discuss the points and tabulate the strengths and weakness

Please discuss the points and tabulate the strengths and weaknesses

  Use a truth table to determine whether

Use a truth table to determine whether or not the following argument form is valid. You can  justify  your answer by doing the following: indicate which columns represent the premises and which represent the conclusion;

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd