![Computer Networking: A Top-Down Approach (7th Edition)](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Don't you dare give me AI generated answer or plagiarised answer. If I see these things I'll give you multiple downvotes and will report immediately.
![Create a C++ program that helps users track their fitness progress. The program
should allow users to input their daily workout details, such as exercise type, duration,
and intensity. It will then calculate the total duration and average intensity of their
workouts and provide feedback on their fitness routine. Follow these specific program
details:
Begin the program by prompting the user to input the number of days they want to
track.
Ask the user to input workout details for each day, including exercise type (e.g., cardio,
strength training), duration (in minutes), and intensity (on a scale of 1 to 10).
Calculate the total workout duration and average intensity over the specified number
of days.
Display the total workout duration and average intensity to the user.
Provide feedback on their fitness routine based on the average intensity:
Average intensity below 5: Low intensity, consider increasing workout intensity.
Average intensity 5 to 7: Moderate intensity, maintain the current routine for general
fitness.
Average intensity above 7: High intensity, great job on maintaining a challenging
workout routine!
Ensure that your code is readable and self-documented:
Include multiple-line comments to identify the owners, explain the purpose, and
specify the input and output of the code.
Use single-line comments to explain complicated or confusing statements and justify
your reasoning (at least 3).
Format your code with proper indentation and white spaces for better readability.
Use self-documenting variable names.](https://content.bartleby.com/qna-images/question/72792cf8-bcb0-46b3-969b-72e33305f3dd/e7d59e4b-24c8-4ba4-a1b6-1b940739a4e8/6wqznqa_thumbnail.png)
Transcribed Image Text:Create a C++ program that helps users track their fitness progress. The program
should allow users to input their daily workout details, such as exercise type, duration,
and intensity. It will then calculate the total duration and average intensity of their
workouts and provide feedback on their fitness routine. Follow these specific program
details:
Begin the program by prompting the user to input the number of days they want to
track.
Ask the user to input workout details for each day, including exercise type (e.g., cardio,
strength training), duration (in minutes), and intensity (on a scale of 1 to 10).
Calculate the total workout duration and average intensity over the specified number
of days.
Display the total workout duration and average intensity to the user.
Provide feedback on their fitness routine based on the average intensity:
Average intensity below 5: Low intensity, consider increasing workout intensity.
Average intensity 5 to 7: Moderate intensity, maintain the current routine for general
fitness.
Average intensity above 7: High intensity, great job on maintaining a challenging
workout routine!
Ensure that your code is readable and self-documented:
Include multiple-line comments to identify the owners, explain the purpose, and
specify the input and output of the code.
Use single-line comments to explain complicated or confusing statements and justify
your reasoning (at least 3).
Format your code with proper indentation and white spaces for better readability.
Use self-documenting variable names.
Expert Solution
![Check Mark](/static/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 4 steps with 3 images
![Blurred answer](/static/blurred-answer.jpg)
Knowledge Booster
Similar questions
- 1. You've just been hired as a Chief Information Security Officer for a small startup. They've written four applications and just got funding to go live. Before they do so, they realized they've never had a cybersecurity professional, so they've hired you. While there are hundreds of things to do, you are asked to come up with a list of your top TEN (10) items, in a bulleted list, to focus on in the first day or two. These can be questions to ask or actions to take, and aren't meant to be the full solution, but the initial things you'll do to get control of the situation. Provide a NUMBERED LIST of TEN (10) items that is your initial list of priority areas to focus on and potential actions to take. Do not use more than one line per item. Many aswers are correct, so credit is given for coming up with ten good and comprehensive focus areas based on what we've covered in class, in the labs, and in our readings.arrow_forwardDo you believe it is feasible for you to explain why authentication is still such an issue in today's information culture? If so, please share your thoughts below.arrow_forwardAlert dont submit AI generated answer.arrow_forward
- Casual Observer Software’s main product is a program that monitors and analyzes user keystrokes and mouse clicks to learn more about the way employees use their computer systems. The problem is that some users feel this is an unwarranted intrusion into their privacy, and they prefer not to be observed. Some even fear that the data would be used for other reasons, including performance appraisal. You are a consultant who has been hired by a client firm that is trying to decide whether or not to use this software. Before you advise the client, go back to Chapter 4 and consider the Hawthorne Effect, which suggests that employees might behave differently when they know they are being observed. Finally, think about the ethical issues that might be involved in this situation. What will you advise your client, and why?arrow_forwardYou are going to get an email from the mail server at work informing you that your password has been changed and that you need to confirm this information. There is a strong likelihood that you haven't changed the password in a while. What caused the password to be different? Malware that was installed on the computers that successfully changed the password may have been utilized by an attacker.arrow_forwardPlease explain what a challenge–response system is and how it works so that users can be verified. It's not clear at first glance what about this system makes it safer than an old-fashioned method that uses passwords.arrow_forward
- If we live in a free and open society, what purpose do barriers serve? Please include at least two instances of such restrictions in your response.arrow_forwardPlease specify in the company's privacy policy how Personal Operating Solutions plans to disclose user information to third parties (law enforcement, public, other vendors, etc.).arrow_forwardLet's say you check your work email and see a message telling you that your password has been changed and prompting you to verify the change. Yet as far as you know, you haven't altered the password. Why do you think the password was changed? Which malware, and on what machines, may have provided an attacker with the means to successfully reset the password?arrow_forward
- Let's say your company's mail server sends you a message reminding you that you need to confirm the password change for your account. However, as far as you're aware, you didn't change the password! What may have caused the password to change? What kind of malware, and on what kinds of devices, may have given an attacker the details they required to change their password?arrow_forwardThe following are some examples of potential data confidentiality breaches: Afterwards, we'll talk about the many precautions that may be done.arrow_forwardIdentity theft, in which people steal other people's personal information, is still a big source of worry for both individuals and businesses. Let's pretend you're a database administrator for a large company with extensive online databases. What do you do? Are there any measures you'd take to prevent unauthorised access to a company's database?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337093422/9781337093422_smallCoverImage.gif)
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133750423/9780133750423_smallCoverImage.jpg)
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9781119368830/9781119368830_smallCoverImage.gif)
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY