Solved

Graduation a columm?

Posted on 1997-11-16
2
295 Views
Last Modified: 2010-04-16
Student in panic!
I need a program which simulates licquid in a tank. The user is supposed to write down a value and after that it´s supposed to be written a vertical line whith (I) and the column will be graduated 10, 20, 30 and 40. All this will be centered on the screen. I need two FOR loops, one for the column and one for the graduation.
Sincerely,
Erika
0
Comment
Question by:gelotte
2 Comments
 
LVL 2

Accepted Solution

by:
mitchell042997 earned 50 total points
ID: 1216791
If I am not mistaken, first the user needs to enter the water depth, so something like this will do the trick:

uses crt;
var WaterDepth,loop1,loop2:byte;
begin
  repeat
    writeln('Enter Water Depth (10, 20, 30, 40):  ');
    readln(WaterDepth);
    {Check to make sure WaterDepth within valid range}
  until WaterDepth in [10,20,30,40];

  clrscr;

  {Loop to draw flask}
  for loop1:=1 to 9 do
    if (loop1 mod 2 = 0) then begin
      gotoxy(36,loop1+7);
      case loop1 of
        2:write('40 | |');
        4:write('30 | |');
        6:write('20 | |');
        8:write('10 | |');
      end;
    end else begin
      gotoxy(39,loop1+7);
      write('| |');
    end;

  gotoxy(39,8+loop1);
  write('___');


  {For the water, just make another case statement and in the case blocks (i.e. case WaterDepth of ... 10:begin for ... do) do a for loop to draw the water depth using gotoxy like I showed above.  Hope this all helps.  BTW, no guarentee on the code, never tested it out...}
0
 

Author Comment

by:gelotte
ID: 1216792
thanks mitchell it´s works
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
In  today’s increasingly digital world, managed service providers (MSPs) fight for their customers’ attention, looking for ways to make them stay and purchase more services. One way to encourage that behavior is to develop a dependable brand of prod…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now