pseudo code, Programming Languages

Assignment Help:
I need help putting this into a flowchart constant c as Integer = 3500 Constant CALORIESTOOUNCE as Integer = 219 Declare Sex as Character Declare Age as Integer Declare Weight as Integer Declare Height as Integer Declare Calories as Integer Declare Exercise as Integer Declare Duration as Integer Declare CaloriesBurnedByExercise as Float Declare TotalCaloriesBurned as Float Declare CalorieDifference as Float Declare bmr as Float //Declare an array of MET values. We will have 9 common activities Declare met [10] as Float Declare HarrisBMR as Float Declare Choice as Integer Declare M as Integer //for counter CONSTANT Pound to Calories as Integer = 3500//Let’s go ahead and initialize our array of METs met[0] = 4.3 //Walking for exercise met[1] = 7 //Jogging met[2] = 9.8 //Running 6.0/10 min mile met[3] = 11 //Running 7.0/8 min mile met[4] = 7.5 //Bicycling met[5] = 6.0 //Weight lifting met[6] = 6.5 //Basketball met[7] = 4.8 //Golf met[8] = 8.8 //Jump Rope met[9] = 0 //Nothing Write "********Learning Team A –Calorie Management Program****************" Write “This program computes calories based on caloric intake and caloric expenditure.” Call InputData module Call PerformCalculations module Call OutputResults module End Program

Related Discussions:- pseudo code

Modularity, Modularity, Abstraction, and Modelling Whether proving a t...

Modularity, Abstraction, and Modelling Whether proving a theorem by creating up from lemmas to simple basic theorems to more accurate results, or designing a circuit by creati

What is an authentication subsystem, Question: (i) Each time a securit...

Question: (i) Each time a security mechanism is installed or deleted in a Digital UNIX system, SIA is involved. Draw a Security Integration Architecture diagram. (ii) How

Miranda, Hi, Can you do exercises: D2, D3, D4, and D5 on page 230 of the fo...

Hi, Can you do exercises: D2, D3, D4, and D5 on page 230 of the following book: http://www.daimi.au.dk/~bra8130/Wiley_book/wiley.html . The book can be downloaded for free from t

Explain the use of sync and fsck, Problem 1 Define the architecture of ...

Problem 1 Define the architecture of UNIX operating system with appropriate diagram Problem 2 Define the term inter-process communication. What are several approaches t

Risk - controls and audit tests, Internal Audit has been asked by the State...

Internal Audit has been asked by the State to review the activities of  The Commission on Workforce Development. The Commission was established several years ago by the state legis

Implement a program that can draw graphs, 1. Implement a program where an e...

1. Implement a program where an ellipse follows the perimeter of the window. 2. Implement a program that can draw graphs, possibly following your plan from last week. Have it gr

Linear time algorithm to find longest repeat prefix, A non-empty string β i...

A non-empty string β is called a repeat pre x of a string s if ββ is a pre x of s. Give a linear time algorithm to find the longest repeat prefix of s. Hint: Think of using lca

A traveler wants to purchase a number of traveler''s checks, A traveler wan...

A traveler wants to purchase a number of traveler''s checks, each having a set amount for four different currencies: Mexican pesos, Euro dollars, Swiss francs, and US dollars. A t

Optimal solution, what is the optimal solution for this problem? Max 1...

what is the optimal solution for this problem? Max 1A + 1B s.t. 5A +3B 3A + 5B A,B >0

Shell script to print count & sum of digits of given number, Normal 0 ...

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd