Command line interface, Operating System

Assignment Help:

College life is tough.  Eating pizza for every meal is hitting you hard.  You are looking at working out to stay healthy.  You found a web site that tells you how many calories each exercise burns.  As a part of your planning, you need to determine how long it will take you to burn off your lunch.  A normal 14 inch pepperoni pizza has 2480 calories with 310 calories per slice.  

For this part of the assignment, you will be using the Ch command-line interface.  Use the instructions given at the end of this portion of the assignment to prepare your work for submission.

  • Declare four floating point variable called Calories, Time, CPH and Slices.float Calories, Time, CPH, Slices;
  • Write an input statement for CPH and then (at the prompt) enter the value representing the average calories per hour the exercise burns.cin >> CPH;
  • Write an input statement for Time and then (at the prompt) enter the value representing the total time you worked out.
  • Calculate the total amount of calories burned.

Calories = Time * CPH;

  • Calculate the total number of pizza slices you could eat if you worked out for 2 hours.

Slices = (CPH * 2)/310;

  • Output the total calories burned and number of slices you can eat.

cout << "The total calories burned are " << Calories << " calories." << endl;

cout << "The number of pizza slice you may eat are " << Slices << endl;

  • Submission instructions for assignment 9a:

1. Once you have completed all of the steps above and with the command-line interface open on your screen, press the "Print Screen" key on the keyboard.

2. Now, open Paint and use the CTRL+V key combination to paste the captured image into Paint.

3. Save the image file as lab9a.jpg (Use JPEG as the file type).

Lab 8b: Program Mode

  • Open Notepad
  • The first line must be a comment statement. Include your name in the comment.
  • Save the file as lab9b.ch. Remember to save your work frequently.
  • Type the include statement that is needed to facilitate input/output capabilities.
  • The beginning of your code starts with the following statement: main ( ) {
  • Enter your code after the opening curly bracket. Your code should contain the statements to do the following. Remember to close each line of code below with a semicolon.

1. Declare four floating point variable called CPH, Time, Calories, and Slices.

2. Output a short phrase asking for the user's calories per hour the exercise burns.

3. Input the calories per hour.

4. Output a short phrase asking for the total timed the user worked out.

5. Input the time.

6. Calculate the total calories burned during the workout and the total pizzas you can eat.

7. Output the computed calories burned and number of pizzas you can eat.

  • End your program code with the closing curly bracket.
  • To execute your program, type ./filename in the Ch command-line interface (dot forward-slash filename; the ch extension is not needed here)
  • If you have error messages, note the cause of error indicated in each message and change your code to fix the problem(s).
  • To make changes to your program, move back into Notepad, change the code, and save the file.
  • To run the program again, move back to the Ch window and use the up-arrow key to move the command ./filename to the current line.

To submit this lab, you will need create a zip file containing all the files for this lab (see instructions on my web site), then login to blackboard (blackboard.sc.edu), and upload the zip file for this lab using the assignment manager (also see instructions on my web site). 

Academic Honesty

  • The work you turn in is to be your work, not copied from someone else or from the web.
  • Never allow anyone access to your files
  • Never give anyone your password.
  • Never share your USB memory, etc.
  • Never give anyone a printed copy of your file.
  • Never allow anyone to copy your work.
  • When in doubt, consult your instructor about what is cheating in this class.

 

 


Related Discussions:- Command line interface

Designing issues in a network -transparency, Transparency Users mus...

Transparency Users must be able to access remote resources as though these resources were local. Transparency should as well promote user mobility. Users must be allowed

Explain the fork-join, Explain the Fork-join This is primitives in a hi...

Explain the Fork-join This is primitives in a higher level programming language for implementing interacting processes. The syntax is like this: fork ; join ; where

Major differences between capability lists and access lists, Q. What are th...

Q. What are the major differences between capability lists and access lists? Answer: An access list is a list for each object consisting of the domains with a nonempty set of

Mutual exclusion, With software algorithms for mutual exclusion, such as De...

With software algorithms for mutual exclusion, such as Dekker's algorithm, Peterson's algorithm, or Lamport's bakery algorithm, note that optimizing compilers and out-of-order exec

What is independent process, What is independent process? A process is ...

What is independent process? A process is independent it cannot influence or be affected by the other processes implementing in the system. Any process does not share data with

Subject: system analysis (2000 word), Overview: In this assignment, you are...

Overview: In this assignment, you are going to perform a system analysis and design of a membership and facility management system of a gymnasium of given case study Task: You are

State in a deadlock-avoidance system, Question: In a deadlock, processe...

Question: In a deadlock, processes never finish executing and system resources are tied up, preventing other jobs from starting. Deadlocks can be characterised by a set of cond

Protection, protection in operating system

protection in operating system

Explain a boot control block, Explain a boot control block A boot contr...

Explain a boot control block A boot control block can have the information required by the system to boot an operating from that partition. If the disk does not have an operati

Most wans utilize only a partially connected topology, Q. Most WANs utilize...

Q. Most WANs utilize only a partially connected topology. Why is this subsequently Answer: Cost. A completely connected network requires a link between every node in the netw

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd