Creating c+ programing

Assignment Help Operating System
Reference no: EM1379673

[1] Given the following declaration and definition of a structure:

struct computer {
float cost;
int year;
int cpu_speed;
char cpu_type[16];
} model;

Create a program to display the initial values held by the structure (you must use a structure) on the screen.

[2] When you enter the following data:

Enter the year: 1996
Enter the cost: $1234.56
Enter the CPU type: Pentium
Enter the CPU speed: 100MHz

[3] Your output will look like this:

The type of the CPU inside your computer is: Pentium
The speed (MHz) of the CPU is: 100
The year that your computer was made: 1996
You paid : $1234.56 for your computer

 

Reference no: EM1379673

Questions Cloud

How the specific volume of each liquid varies with temp : Using the information in the above table to show how the specific volume of each liquid varies with temperature.   You should plot a graph for each liquid and use this graph to estimate the exact value of a at 50°C for each liquid.
Processor bound programs : Suppose if run through itself, an I/O bound program spends more time waiting for I/O than using the processor and vice versa for the processor-bound.
Testing a motherboard : Assume you wish to test a motherboard used in an installation before you proceed too far into the installation. From the devices listed below, choose the minimum devices
Potential management plans for monitoring network activities : Discussion on potential management plans for monitoring network activities and maintaining security of the network.
Creating c+ programing : Create a program to display the initial values held through the structure on the screen.
Explain the role of ram and clock speed : Describe the role of each of the following in determining the speed of a personal computer, RAM, Clock speed, Data on hard disk
Provide reasons for a slow lan : Provide possible reasons for a slow LAN, fill in why each reason causes a slow LAN and provide your solution. Each reason will take a minimum of 150 words to address thoroughly.
Determine the value of flags : Suppose if the last operation performed on a computer with an 8-bit word was an addition in which 2-operands were 00000010 and 00000011, determine the value of the following flags?
Question about spam : Discuss your personal experience with Spam and how is spam affecting the Internet as a whole also find the best way to prevent it

Reviews

Write a Review

Operating System Questions & Answers

  Define cache and its purpose

Describe what a cache is and what its purpose is. Also explain what data gets placed into the cache, and when it is put there.

  Requirement for routers to support ipv4 and 6 protocol stack

The answer describes the requirement for routers to support both IPv4 and IPv6 protocol stacks and describes the several types of connections a dual stack router can support, and why such connections are necessary.

  Difference from a firewall to border security

Discuss why is it important for a firm to have firewalls and border security in place? I know that a firewall is to stop intruders from entering your network but when read on it seems border security is very similar.

  Discuss technology related ethical issue

Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?

  Advantages of home networking

Discuss the advantages of home networking? Do you find that most of the documents are actually stored on a single computer.

  Point to point and end to end security models

Argue differences in point to point and end to end security models and security problems they address. Are they redundant?

  Creating a boardroom quality microsoft

Construct a plan to set up a local area network based on the scenario given in Appendix A. Prepare a boardroom-quality Microsoft?

  Creating the source code and flowchart

Construct a C program that displays a title, "Hello World." Insert comments in the event to document the program internally. Attach a design flow chart.

  Implementing a data warehouse project

Assume you are implementing a data warehouse project for a consumer and require to evaluate the many tools available for extracting, transforming, and loading data into the data warehouse from several sources.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Network security principles

Explain a recent high profile computer security issue that you have heard of. Based on basic network security principles, how might the issue have been avoided?

  Finding server side software

Find the Internet to search server side software that is needed to be installed on the hospital's servers to support access by your local hospital doctors to patients' data using their cellular phones or PDAs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd