Calculate and display height and cost of container

Assignment Help Basic Computer Science
Reference no: EM1364874

The company wants to know the optimal cost for a cylindrical container that holds a specified volume. Write a fragment of code that uses an ask-before-iterating loop. During each iteration of the loop, your code will ask the user to enter the volume and the radius of the cylinder. Compute and display the height and cost of the container. Use the following formulas, where V is the volume, r is the radius, h is the height, and C is the cost.

h = (V)/(pi)r^2

C = 2(pi)r(r+h)

Reference no: EM1364874

Questions Cloud

Show the types of risk for a project manager : Explain what are the types of risk that a project manager should take into account when planning an initiative and structuring teams?
Money market fund for cash investments : I have received an inheritance for which I require to make good investment decisions. I have received a $100,000 inheritance and would like to invest.
Define the term economic value added (eva) : How do managers supplement the NPV analysis of a project to gain a better understanding of a project?    Define the term economic value added (EVA).
Health service-health organisation : Consider a health service or a health organisation. What are the main components of the wider system within which this service or organisation operates?
Calculate and display height and cost of container : Compute and display the height and cost of the container. Use the following formulas, where V is the volume, r is the radius, h is the height, and C is the cost.
Organization to minimize the identified weaknesses : Provide at least 2 suggestions for each organization to minimize the identified weaknesses.
Explain synchronous time division multiplexing : Synchronous time division multiplexing is used, along with the standard analog-to-digital sampling rate, and each sample is converted into an 8-bit value?
Define what level of influence do you think each stakeholder : Explain What level of influence do you think each stakeholder has in maintaining the ethical behavior of the organization
List possible ways to interconnect three computers : List as many ways as possible to interconnect the three computers so that they could operate on one local area network.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Key factors limiting use of personalization

Two key factors limiting the use of personalization to more precisely target marketing efforts to individual customers are?

  Training data from gaussian distribution of variance

Suppose we have training data from a Gaussian distribution of known covariance S but unknown mean Mu.

  Research various types of hard drives available from online

Research the various types of hard drives available from online and/or local retail computer stores.Make a chart of several different brands or models of 1 TB desktop hard drives.

  Advantage and disadvantage of using word to work in graphics

Identify the advantages and disadvantages of using Word to work with graphics, tables, and special formatting functionality. Provide specific examples.

  Protect proprietary interest by addressing ethical issues

Advise whether you agree or disagree with CEO, specifically addressing ethical issues involved. Suppose you make a decision to hire a hacker, how would you protect your proprietary interests?

  Find out amount of access that new user needs

As a security manager for XYZ Corporation, you are asked to find out amount of access that new user needs. You contact user and ask them to help you understand what kind of access they need.

  Policies and provisions to unbundled network elements

What are some of the major policies and provisions under the 1996 Act in regards to unbundled network elements (UNEs).

  Fundamental text retrieval tasks using hash-based indexing

In this paper three fundamental text retrieval tasks where hash-based indexing. Which task is more appropriate for a text based search retrieval? Provide reasons to support your answer.

  Benefits of binary file called registry

Write down the benefits and disadvantages of configuration in binary file called registry.

  Explaining framework software architecture

Terms architectural style, architectural pattern, and framework are frequently encountered in discussions of software architecture.

  Explaining database system of facebook and google

Does Facebook and Google use same database system? Facebook seems to run with the android platform using gmail address to retain information for user such as phone numbers and contacts.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd