Command line interface, Operating System

Assignment Help:

College life is tough.  Eating pizza for every meal is hitting you hard.  You are looking at working out to stay healthy.  You found a web site that tells you how many calories each exercise burns.  As a part of your planning, you need to determine how long it will take you to burn off your lunch.  A normal 14 inch pepperoni pizza has 2480 calories with 310 calories per slice.  

For this part of the assignment, you will be using the Ch command-line interface.  Use the instructions given at the end of this portion of the assignment to prepare your work for submission.

  • Declare four floating point variable called Calories, Time, CPH and Slices.float Calories, Time, CPH, Slices;
  • Write an input statement for CPH and then (at the prompt) enter the value representing the average calories per hour the exercise burns.cin >> CPH;
  • Write an input statement for Time and then (at the prompt) enter the value representing the total time you worked out.
  • Calculate the total amount of calories burned.

Calories = Time * CPH;

  • Calculate the total number of pizza slices you could eat if you worked out for 2 hours.

Slices = (CPH * 2)/310;

  • Output the total calories burned and number of slices you can eat.

cout << "The total calories burned are " << Calories << " calories." << endl;

cout << "The number of pizza slice you may eat are " << Slices << endl;

  • Submission instructions for assignment 9a:

1. Once you have completed all of the steps above and with the command-line interface open on your screen, press the "Print Screen" key on the keyboard.

2. Now, open Paint and use the CTRL+V key combination to paste the captured image into Paint.

3. Save the image file as lab9a.jpg (Use JPEG as the file type).

Lab 8b: Program Mode

  • Open Notepad
  • The first line must be a comment statement. Include your name in the comment.
  • Save the file as lab9b.ch. Remember to save your work frequently.
  • Type the include statement that is needed to facilitate input/output capabilities.
  • The beginning of your code starts with the following statement: main ( ) {
  • Enter your code after the opening curly bracket. Your code should contain the statements to do the following. Remember to close each line of code below with a semicolon.

1. Declare four floating point variable called CPH, Time, Calories, and Slices.

2. Output a short phrase asking for the user's calories per hour the exercise burns.

3. Input the calories per hour.

4. Output a short phrase asking for the total timed the user worked out.

5. Input the time.

6. Calculate the total calories burned during the workout and the total pizzas you can eat.

7. Output the computed calories burned and number of pizzas you can eat.

  • End your program code with the closing curly bracket.
  • To execute your program, type ./filename in the Ch command-line interface (dot forward-slash filename; the ch extension is not needed here)
  • If you have error messages, note the cause of error indicated in each message and change your code to fix the problem(s).
  • To make changes to your program, move back into Notepad, change the code, and save the file.
  • To run the program again, move back to the Ch window and use the up-arrow key to move the command ./filename to the current line.

To submit this lab, you will need create a zip file containing all the files for this lab (see instructions on my web site), then login to blackboard (blackboard.sc.edu), and upload the zip file for this lab using the assignment manager (also see instructions on my web site). 

Academic Honesty

  • The work you turn in is to be your work, not copied from someone else or from the web.
  • Never allow anyone access to your files
  • Never give anyone your password.
  • Never share your USB memory, etc.
  • Never give anyone a printed copy of your file.
  • Never allow anyone to copy your work.
  • When in doubt, consult your instructor about what is cheating in this class.

 

 


Related Discussions:- Command line interface

Problem, whats the problem in two state model ?

whats the problem in two state model ?

What are the five major activities of an operating system, What are the fiv...

What are the five major activities of an operating system in regard to process management? The creation and deletion of both user and system processes The suspension and res

Conversion of binary to hex, Take the binary number and divide it into grou...

Take the binary number and divide it into groups of 4 bits starting from the right hand side , if no group of 4 exists fill out leading 0's, then convert each group of 4 to a hex n

Explain first fit allocation algorithm, Describe the following allocation a...

Describe the following allocation algorithms: a. First fit b. Best fit c. Worst fit   a. First-fit: search the list of available memory and all

Algorithm for reconstructing a logical ring, Q. Present an algorithm for re...

Q. Present an algorithm for reconstructing a logical ring after a process in the ring fails? Answer: Typically distributed systems utilize a coordinator process that performs

Explain the spawnlp functions used in the netware, Explain the Spawnlp Func...

Explain the Spawnlp Functions Used in the NetWare Spawnlp(flags, execName, arg0,...)  The Spawnlp function is used to load  a NetWare executable file (NLM) specified by exec

Read - write cycles of microprocessors, Examining the write/cycles as shown...

Examining the write/cycles as shown below We can see that the bus is designed for asynchronous read/write cycles. The operation of the write cycle is simple in that the add

Determine a critical section is a program segment, Determine a critical sec...

Determine a critical section is a program segment  Critical section is where shared resources are accessed

Find the optimal solution and optimal value, Find the optimal solution and ...

Find the optimal solution and optimal value of the following linear program. Use both (a) the enumerating the corner points method and (b) the iso-profit line method. Also identify

Is computers protect the operating system, Q. Some untimely computers prot...

Q. Some untimely computers protected the operating system by placing it in a memory partition that couldn't be modified by either the user job or the operating system itself. Expl

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd