subject

Project: Programming a Math Algorithm the BMI scale
Writing a program to calculate a person's BMI is an example of using a math algorithm. In the BMI case, you used a formula to find a person's BMI and assigned the result to a category. Your program handled possible errors. This man needs to be concerned about his potential errors. (Imagery supplied by bearsky23/iStock via Getty)

In this unit, you learned how to manipulate numbers and strings, acquire input from the user, perform data manipulations for various types, and make decisions. You displayed the results for the user. You are able to plan and write programs, using the input-process-output model. You can test the results. In this project, you will plan and write a program to solve a math algorithm. Unlike the man in the picture, you will identify possible errors and handle them in your program.
Choosing Your Math Algorithm

Think of a math question that takes several steps to solve. It should not be a math question already programmed in the unit. Some examples are below, or you might think of your own ideas. The question should require input from the user, process the information, and display the results. You can choose your own algorithm. It does not need to be one of these.
Find the surface area of a cylinder.
Find the surface area of a pyramid.
Find the hypotenuse of a right triangle.
Your Task

Write a pseudocode plan for your program.
Write the code for your program.
Test your program. Run it at least three times with different inputs.
Save your program as a .txt file for you cannot upload a .py file.
Evaluate your project using this rubric.
What to Submit

Submit the .txt file holding your program.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 17:20
Q-1 which of the following can exist as cloud-based it resources? a. physical serverb. virtual serverc. software programd. network device
Answers: 3
question
Computers and Technology, 22.06.2019 16:50
Consider a slotted aloha system, where the time slot equals the fixed duration of each packet. assume that there are 4 stations a,b,c,d sharing the medium. (a) stations a,b,c,d receive one packet each from higher layers at times 1.3, 1.5, 2.6,5.7 respectively. show which transmissions take place when, according to the slottedaloha protocol; describe all transmissions until all four packets have been successful.when needed, each station has access to the following sequence of random number, provided by a random number generator and drawn uniformly between 0 and 1: (1) station a draws numbers: 0.31, 0.27, 0.78, 0.9, 0.9, 0.11, 0. (2) station b draws numbers: 0.45, 0.28, 0.11, 0.83, 0.37, 0.22, 0. (3)station c draws numbers: 0.1, 0.2, 0.3, 0.4, 0. (4) station d draws numbers: 0.36, 0.77, 0.9, 0.1, 0.1, 0.1, 0.1, 0. (b) in slotted aloha, a station transmits in each time slot with a given probability. what probabilities would you assign to each of the four stations so as to: (i) maximize the efficiency of the protocol? (ii) maximize fairness among the four stations? (c) will the efficiency increase or decrease if we modify slotted aloha as follows: (i) get rid of slots and allow stations to transmit immediately? (ii) implement carrier sensing? (iii) implement collision detection? (iv) implement collision avoidance?
Answers: 3
question
Computers and Technology, 23.06.2019 00:20
The open systems interconnection (osi) reference model: defines standards for many aspects of computing and communications within a network. is a generic description for how computers use multiple layers of protocol rules to communicate across a network. defines standards for wireless local area network (wlan) communication protocols. details the advantages and disadvantages of various basic network cabling options.
Answers: 1
question
Computers and Technology, 23.06.2019 14:00
Select the correct answer. andre was recently hired by an organization to check for system vulnerabilities. he is supposed to exploit these vulnerabilities and create a report on the extent of damage to which the system was susceptible. what position does andre hold in this organization? a. information security analyst b. information assurance manager c. penetration tester d. network security engineer e. chief information security officer
Answers: 2
You know the right answer?
Project: Programming a Math Algorithm the BMI scale
Writing a program to calculate a person's...
Questions
question
Mathematics, 03.05.2020 14:17
question
Physics, 03.05.2020 14:17
question
Mathematics, 03.05.2020 14:17
question
Mathematics, 03.05.2020 14:17
question
Spanish, 03.05.2020 14:17
Questions on the website: 13722361