Create a program that is composed of five files

Assignment Help Computer Engineering
Reference no: EM132164349

Using C++ create a program that is composed of five files to calculate the determinant of a user-entered square matrix. The program will have two functions, each with its own header file and source code (.hpp and .cpp) and a main file to run everything.

The matrix will be square and the size will be 2x2 or 3x3. The first function is readMatrix(). It will have two parameters: a pointer to a 2D array and an integer as the size of the matrix. It will prompt the user to fill a square matrix and store the input into the 2D array.

The second function is determinant().

It will have 2 parameters: a 2D array and an integer, which is the size of the square. It will return an integer value with is the determinant of the matrix stored in the 2D array.

In the main file, you will create a program that ask users to choose the size of the matrix (2x2 or 3x3), then uses readMatrix() to prompt the user to enter 4 or 9 values to fill the array, calculate the determinant using determinant(), and display both the array and the determinant to the user. The array should not be displayed in a single line but in a square format.

Reference no: EM132164349

Questions Cloud

What evidence supports the main point : Using the CSU Online Library, please locate an article regarding entrapment. Your article should be no more than five years old and should come.
Print a list of the perfect numbers : Print a list of the perfect numbers between 1 and 100 ;
Standard deviation of the annual salaries of fire? fighters : Is there enough evidence to support the claim that the standard deviation of the annual salaries of fire? fighters' is different from ?5600 at the 5?% level
What are the requirements to become a police officer : Talk about the law enforcement in the country, is it centralized, decentralized, semi-centralized. What are the requirements to become a police officer?
Create a program that is composed of five files : Create a program that is composed of five files to calculate the determinant of a user-entered square matrix.
Customer for breach of contract : Your firm, Brisk8, has been sued for $3 million by a customer for breach of contract.
Describe cognitive functions that are maintained : Describe cognitive functions that are maintained or improve in late adulthood. What aspects of aging contribute to them?
How does stress affect officers : Law enforcement officers face all types of stress during their daily activities. How does stress affect officers? After watching officer stress videos.
Prove that for any experiment and associated sample space : Using the axioms of probability, prove that for any experiment and associated sample space ?, P(f) = 0.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Electrical or magnetic field that the nervous system produce

activation of the brain is measured by electrophysiological techniques using an electrical or magnetic field that the nervous system produces. These types of measures include may include magneto-encephalography (MEG) or electroencephalography (EEG..

  What are the most important factors to consider

How will implementing these controls affect the CIA (confidentiality, integrity, availability) triad of your enterprise?

  Question1 demonstrate your understanding of it

question1 demonstrate your understanding of it infrastructure by answering following questions -a what characteristic

  What types of networks have you used

Some common threats to resources and delivery are rogue access points, DOS attacks, social engineering, viruses, worms and phishing.

  When you are using a search engine how refine your search

Mention some examples of generic Top Level Domain and its meaning. What is the difference between Search Engine and Subject Directory? When you are using a search engine: How refine your search?

  Write a compare function that returns 1

The user must be prompted for the values of a and b. The compare function must have arguments for a and b.

  Advances in security of biometrics

Advances in Security of Biometrics - Aims and Objectives: Modern biometrics is defined as the science of using biological properties to identify individuals. Biometrics delivers an enhanced level of security by means of a "proof of property"

  What your relationship would be like with the technical

What instances of collaberation and communications do you and the technical staff explore.

  Critique or defend the use of the application

Explain the advantages and disadvantages of each. If you locate such a guide online, please make sure you give credit where credit is due.

  Integration of e-commerce and erp systems

Integration of E-commerce and ERP Systems with other ICT (information and communication technologies) to create value for customers and shareholders.

  Federal rules and criminal codes

Think about computer forensics professional’s testimony preparations, and how the investigator must ensure that the federal rules and criminal codes are followed both during and after the completion of the investigation. Identify and discuss some ..

  Design an application that allows a user to input a price

Design application that allows a user to input a price until appropriate sentinel value is entered. Output is price of each item on each day, one through seven.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd