Write down a program which prompts the user to enter the

Assignment Help Computer Engineering
Reference no: EM13466747

Write a program that prompts the user to enter the year and displays the Chinese Zodiac for the year. The Chinese Zodiac is based on a twelve year cycle, each year being represented by an animal: rat, ox, tiger, rabbit, dragon, snake, horse, sheep, monkey, rooster, dog, and pig, in this order. Note 1900 is the year of rat. Here are some sample runs:

Here are sample runs of the program:

Sample 1:
Enter a year: 1963
rabbit

Sample 2:
Enter a year: 1877
ox

Reference no: EM13466747

Questions Cloud

Recognize four leadership styles related with path-goal : recognize four leadership styles associated with path-goal theory. explain each style and relate it to styles described
Cmpare cash-balance defined benefit and defined : compare and contrast cash-balance defined benefit and defined contribution plans. discuss the advantages and
Compare the statistics reported here from 1997 to the : in a 1-2 page paper summarize your findings and decisions on the following case studies. be sure to explain your
Describe whathow situational variables influence task : explain whathow situational variables affect task motivated and relationship-motivated leaders. apply these factors to
Write down a program which prompts the user to enter the : write a program that prompts the user to enter the year and displays the chinese zodiac for the year. the chinese
Explain the major components of executive compensation plan : describe the major components of an executive compensation plan and discuss the effect reverse descrimination has had
Write a paper not including the title and reference pages : write a three to four page paper not including the title and reference pages about a contemporary leadership situation
Small projects dont usually need the same level of analysis : do you think that a supportive stakeholder will have more influence on the project than a nonsupportive one? why?is
The company cso has asked you to draft a memo which gives : you are a security engineer for a hospital group based in cincinnati oh. your group has just acquired a small hospital

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many different normal forms to choose from

how many different normal forms to choose from.

  Make a program which simulates a slot machine when the

create a program that simulates a slot machine. when the program runs it should do the following1. asks the user to

  Problem definitionrural areas do not have proper internet

problem definitionrural areas do not have proper internet access and are unable to manage downloading anything. certain

  Early in 1999 hotel managers simon andrews and sybil jones

early in 1999 hotel managers simon andrews and sybil jones decided to leave one of the europes largest hotel chains and

  Explain the z-transform of the following system transfer

Discrete Time Systems, 1. a) Find the z-transform of the following system transfer function assuming the input is a unit staircase (i.e. zero order held). The sampling rate is T=0.2.

  Cache simulator lab

Find a way to simulate different cache architectures through premade address accessing files and this task includes modifying the associativity

  Part-11 how can you perform a oating point comparison you

part-11. how can you perform a ?oating point comparison? you should include two examples one in c-shell and one in

  Design formulas or use the autosum function

You do not require to put in personal information or actual values if you do not wish, but you must include some data for each of the various categories and income and expense line items.

  Program that prints to screen results of dividing 23 by 5

create a program, using C++ that prints to screen the results of dividing 23 by 5, where 23 and 5 are ints. Provide the results of what was printed to screen via comments in the program ; need in hardcopy.

  Describe and explain the types of control procedures that

in this assignment you will apply the knowledge gained about ethics and security to evaluate security risks and control

  Design e-r tables for keeping track of the exploits

Design E-R tables for keeping track of the exploits of your favorite sports team. You should store the matches played, the scores in each match, the players in each match, and individual player statistics for each match.

  What are the private keys

Public Key Encryption: If you have access to the public keys n and e, it is possible to reverse the public keys from them. One approach is to factor the value of n to discover p and q, then to find d by finding a value k such that k(p-1)(q-1) + 1 ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd