Questions
Discuss the impact of attending a bidder’s conference. What types of insights are gained from attending...

Discuss the impact of attending a bidder’s conference. What types of insights are gained from attending these meetings?

In: Computer Science

(C++) D.Va's Mech System D.Va is a former professional gamer who now uses her skills to...

(C++) D.Va's Mech System

D.Va is a former professional gamer who now uses her skills to pilot a state-of-the-art mech in defense of her homeland. Her real name is Hana and you can read more about her story here (Links to an external site.).

We are writing a program for D.Va's mech to load up before combat. D.Va's mech has two main systems, the micro missile system and the damage matrix system. The micro missile system is used to give damage to the enemies while the damage matrix system is used to absorb damage from enemies. You've seen how D.Va combats on the field during class and we are writing a short program to help D.Va prepare her mech systematically. The link of the video "Shooting Star" is here (Links to an external site.) in case you missed class.

D.Va will be fighting many enemy bots and one enemy boss for each combat. Each enemy bots may have different power values. D.Va would need a damage matrix system strong enough to take all damages from enemies and enough micro missiles to destroy all enemies. D.Va's mech has default power for both the damage matrix system and the micro missile system. If the default power isn't enough, our system would need to load more power to either or both of the systems for D.Va to win the combat.

System Detail

Our system will first have some variables with initial values indicating enemy information and some default value for D.Va’s mech. It will then run three steps to analyze and prepare the mech for combat. First step is to calculate how much power D.Va needs given the number of enemies she's facing in combat. The second step is to load D.Va's mech with required power to fight the combat. Finally, the system will write the combat report into a file that D.Va can review before she goes into combat.

1. Initialization

Your system should start with variables initialization as following:

//Enemy Information
const int enemy_bots = 5;
int enemy_bot_power[enemy_bots] = {2, 5, 3, 7, 1};
float enemy_boss_power = 27.24;

//D.Va Default Spec
int micro_missiles = 10;
float defense_matrix_power = 100.0;

This would give you some enemy information including the number of enemy bots, their corresponding power(int), and enemy boss's power(float). This will also give you the default power of D.Va's mech including the number of micro missiles are loaded and how much power can the defense matrix absorb by default.

2. Calculate Power Needed

Then your system needs to calculate power needed for both the defense matrix system and the micro missile system. Please write two functions here, one to calculate the power needed by the defense matrix system and another to calculate the power needed by the micro missile system.

  1. Matrix Power: D.Va's matrix power would need to take all damage from bots and the boss. The damage of a bot is twice as strong as its power and the damage of a boss is four times stronger than its power. For example, if you have two bots with power 3 and 8 and a boss with power 13.2, the total damage would be  3*2 + 8*2 + 13.2*4 = 74.8. We will make a function named total_damage which takes in an array of ints indicating bots' power, an int indicating number of enemy bots we have, and a float indicating the boss's power. It would return a float telling us the total damage all enemies would give D.Va. That would then be how much power D.Va needs for her defense matrix system.
  2. Missile Power: D.Va's micro missile system would need to be five times stronger than the enemies' power. We will make a function named missile_power which takes in an int or a float as the parameter indicating the power of the enemy and return 5 times the parameter value as the power needed for the missile system. Note that this function would only take one number at a time, and the reason that the value could be an int or a float is that the power for the enemy bot is an int and for the enemy boss is a float. The return value would match the type of the parameter. For example, missile_power(5) would return 25, while missile_power(2.5) would return 12.5. Therefore you would want to use templates for this function. The total missile power needed for D.Va will then be the sum of all the returned values from the missile_power function. Make sure you calculate missile power for both the bots and the boss and add them all together in main.

3. Load D.Va

Now that we know how much power is needed for both D.Va's systems, let's load the power to D.Va's mech. You would want to write two functions here with the same name load_dva. Both load_dva() functions should have type void and take in two parameters. Their behaviors are slightly different. This is where we would use function overloading.

  1. Load Defense Matrix: To load the damage matrix, you want to change the value of the defense_matrix_power. If the power needed is less than the default defense_matrix_power value then we don't change it, if it's larger, we update the defense_matrix_power value with the power needed. Therefore this function would take in two parameters, the defense_matrix_power and the matrix power needed we calculated from step 2. Given that the function would update the value of one of its parameters, defense_matrix_power, please make sure you use pass by reference to update the value that's passed in.
  2. Load Micro Missiles: To load the micro missile system, you want to update the number of micro_missiles value, which indicates how many micro missiles we need in the mech. If the number of missiles needed is less than the default missiles then we don't need to change it, but if it's larger, we update the micro_missiles value. The number of micro missiles we need is equal to missile power needed(from step 2) divided by 100. Make sure you round this up to an integer, you can use ceil() from <cmath> to round up the float. For example, ceil(23.6) would return integer 24. Make sure you include <cmath> to use the function ceil. Similar to the other load_dva function, this load_dva function will also take two parameters, micro_missiles and the missile power needed that we calculated from step 2. Again, this function would modify the value of micro_missiles so make sure you pass in by reference instead of pass in by value.

Now in your main function you would have these two lines to load D.Va's mech:

//Load D.Va
load_dva(defense_matrix_power, matrix_power_needed);
load_dva(micro_missiles, missile_power_needed);

These two lines would update the value of defense_matrix_power and the micro_missiles.

4. Report

Finally, let's write a summary report for D.Va to read before she heads into the combat. Write a file name "report.txt" into the current directory. The content of the report should look likes this:

D.Va's Combat Report
Combat with 5 enemy bots and one enemy boss with power 27.24.
Loaded mech with 10 micro missiles and the defense matrix with power 144.96.
Ready for combat!

Note that the number of enemy bots, the boss power, the number of missiles, and the defense matrix power in the file are all results calculated from your program and inserted into the file. Please don't hard code the output file. I may change the value from step1 to test your code to see whether the report makes sense. Take the results from your previous calculation to write into the report file.

Please make sure you have logic to check file open in your code and close the file after you finish the file operations.

In: Computer Science

Project Management Standards and Project Management Methodologies Select two project management methodologies. Describe the type of...

Project Management Standards and Project Management Methodologies

  1. Select two project management methodologies. Describe the type of methodology (for example, sequential or iterative), benefits, features, type of organization, and best types of projects to implement using each of the methodologies.
  2. Choose the project management methodologies you like the best and describe why you like that methodology better than the other. Provide supporting evidence for your stance.

In: Computer Science

Discuss the processes involved with security assessments. What types of analysis is performed with this assessment?

Discuss the processes involved with security assessments. What types of analysis is performed with this assessment?

In: Computer Science

Translate the following C program into MIPS assembly language, allocate registers as you need, but document...

  1. Translate the following C program into MIPS assembly language, allocate registers as you need, but document the allocation.

int A[10]; // assume initialized elsewhere

int sum = 0;

int I = 0;

while (i<0) { sum += A[i++]; sum+= 2 ;}

plz do not copy from other answer, thx.

In: Computer Science

What are the major technical reviews and audits affecting software and system, the System Engineering team...

What are the major technical reviews and audits affecting software and system, the System Engineering team is responsible? Discuss any two

No screenshot

In: Computer Science

---------------- Exercise 2: String Permutations ---------------- Create a program that takes a string from the command...

----------------

Exercise 2: String Permutations

----------------

Create a program that takes a string from the command line and prints every permutation of that string. You may assume the string will contain all unique characters. You may print the permutations in any order, as long as you print them all.

----------------

Output:

----------------

$>./prog dog
d
do
dog
dg
dgo
o
od
odg
og
ogd
g
gd
gdo
go
god

----------------

I need help on this exercise that requires recursion only. I need main.cpp, makefile, Executive.cpp, and Executive.h files for this exercise, and I have no idea how to code this recursive exercise. So, will someone help me on this exercise?

In: Computer Science

What potential security problems do you see in the increasing use of e-banking in business? What...

What potential security problems do you see in the increasing use of e-banking in business? What might be done to solve such problems? provide examples. *

In: Computer Science

Assembly language - please post with output Question: Using the AddTwo program from class lecture as...

Assembly language - please post with output

Question:
Using the AddTwo program from class lecture as a reference, write a program that calculates the following expression, using registers: A = (A + B) - (C + D). Assign integer values to the EAX, EBX, ECX, and EDX registers.

In: Computer Science

2. Write a description of Senior Management in an Organization. What are the different roles and...

2. Write a description of Senior Management in an Organization. What are the different roles and responsibilities of senior management?

In: Computer Science

Visual Basic Make a directory and copy some files from desktop to the created directory

Visual Basic

Make a directory and copy some files from desktop to the created directory

In: Computer Science

How do you make a prediction from a decision tree using confusionMatrix function in rstudio?

How do you make a prediction from a decision tree using confusionMatrix function in rstudio?

In: Computer Science

In python and comments your code : Exercise 1 1.Write a function waiting for two matrices...

In python and comments your code :

Exercise 1

1.Write a function waiting for two matrices and returning their addition, −1 if it is not not possible.
2. Write a function associated with a matrix and a scalar and returning the produced matrix.
3. Write a function accompanying an n × m matrix and a vector n and returning the vector produced by each other, −1 if this is not possible.
4. Write a function accompanying two n × m and m × k matrices and returning the product matrix, −1 if this is not possible.
5.Write a function waiting for a vector (column or row) and returning its transpose.

Exercise 2

1.Write a function waiting for a 2 × 2 matrix and calculating its determinant.
2. Write a function waiting for a matrix A of size n × m and two integers i and j and rendering a matrix (n − 1) × (m − 1), copy the matrix A without row i and column j .
3. Write a determining function of a square matrix by expanding on a line.

In: Computer Science

I need a paragraph on what the Gherkin language is. What is it used for? How...

I need a paragraph on what the Gherkin language is. What is it used for? How do we use it? What are the good and bad things about it?

In: Computer Science

A friend of yours is new to computing, and he has learned that you are pursuing...

A friend of yours is new to computing, and he has learned that you are pursuing a CIS degree. He asked you about the meaning of a program, the key differences between the generations of programming, and how the open-source software (OSS) comes into play. How would you answer these questions?

In: Computer Science