Discuss the impact of attending a bidder’s conference. What types of insights are gained from attending these meetings?
In: Computer Science
(C++) D.Va's Mech System
D.Va is a former professional gamer who now uses her skills to pilot a state-of-the-art mech in defense of her homeland. Her real name is Hana and you can read more about her story here (Links to an external site.).
We are writing a program for D.Va's mech to load up before combat. D.Va's mech has two main systems, the micro missile system and the damage matrix system. The micro missile system is used to give damage to the enemies while the damage matrix system is used to absorb damage from enemies. You've seen how D.Va combats on the field during class and we are writing a short program to help D.Va prepare her mech systematically. The link of the video "Shooting Star" is here (Links to an external site.) in case you missed class.
D.Va will be fighting many enemy bots and one enemy boss for each combat. Each enemy bots may have different power values. D.Va would need a damage matrix system strong enough to take all damages from enemies and enough micro missiles to destroy all enemies. D.Va's mech has default power for both the damage matrix system and the micro missile system. If the default power isn't enough, our system would need to load more power to either or both of the systems for D.Va to win the combat.
System Detail
Our system will first have some variables with initial values indicating enemy information and some default value for D.Va’s mech. It will then run three steps to analyze and prepare the mech for combat. First step is to calculate how much power D.Va needs given the number of enemies she's facing in combat. The second step is to load D.Va's mech with required power to fight the combat. Finally, the system will write the combat report into a file that D.Va can review before she goes into combat.
1. Initialization
Your system should start with variables initialization as following:
//Enemy Information
const int enemy_bots = 5;
int enemy_bot_power[enemy_bots] = {2, 5, 3, 7, 1};
float enemy_boss_power = 27.24;
//D.Va Default Spec
int micro_missiles = 10;
float defense_matrix_power = 100.0;
This would give you some enemy information including the number of enemy bots, their corresponding power(int), and enemy boss's power(float). This will also give you the default power of D.Va's mech including the number of micro missiles are loaded and how much power can the defense matrix absorb by default.
2. Calculate Power Needed
Then your system needs to calculate power needed for both the defense matrix system and the micro missile system. Please write two functions here, one to calculate the power needed by the defense matrix system and another to calculate the power needed by the micro missile system.
3. Load D.Va
Now that we know how much power is needed for both D.Va's systems, let's load the power to D.Va's mech. You would want to write two functions here with the same name load_dva. Both load_dva() functions should have type void and take in two parameters. Their behaviors are slightly different. This is where we would use function overloading.
Now in your main function you would have these two lines to load D.Va's mech:
//Load D.Va load_dva(defense_matrix_power, matrix_power_needed); load_dva(micro_missiles, missile_power_needed);
These two lines would update the value of defense_matrix_power and the micro_missiles.
4. Report
Finally, let's write a summary report for D.Va to read before she heads into the combat. Write a file name "report.txt" into the current directory. The content of the report should look likes this:
D.Va's Combat Report Combat with 5 enemy bots and one enemy boss with power 27.24. Loaded mech with 10 micro missiles and the defense matrix with power 144.96. Ready for combat!
Note that the number of enemy bots, the boss power, the number of missiles, and the defense matrix power in the file are all results calculated from your program and inserted into the file. Please don't hard code the output file. I may change the value from step1 to test your code to see whether the report makes sense. Take the results from your previous calculation to write into the report file.
Please make sure you have logic to check file open in your code and close the file after you finish the file operations.
In: Computer Science
Project Management Standards and Project Management Methodologies
In: Computer Science
Discuss the processes involved with security assessments. What types of analysis is performed with this assessment?
In: Computer Science
int A[10]; // assume initialized elsewhere
int sum = 0;
int I = 0;
while (i<0) { sum += A[i++]; sum+= 2 ;}
plz do not copy from other answer, thx.
In: Computer Science
What are the major technical reviews and audits affecting software and system, the System Engineering team is responsible? Discuss any two
No screenshot
In: Computer Science
----------------
Exercise 2: String Permutations
----------------
Create a program that takes a string from the command line and prints every permutation of that string. You may assume the string will contain all unique characters. You may print the permutations in any order, as long as you print them all.
----------------
Output:
----------------
$>./prog dog d do dog dg dgo o od odg og ogd g gd gdo go god
----------------
I need help on this exercise that requires recursion only. I need main.cpp, makefile, Executive.cpp, and Executive.h files for this exercise, and I have no idea how to code this recursive exercise. So, will someone help me on this exercise?
In: Computer Science
What potential security problems do you see in the increasing use of e-banking in business? What might be done to solve such problems? provide examples. *
In: Computer Science
Assembly language - please post with output
Question:
Using the AddTwo program from class lecture as a reference, write a
program that calculates the following expression, using registers:
A = (A + B) - (C + D). Assign integer values to the EAX, EBX, ECX,
and EDX registers.
In: Computer Science
2. Write a description of Senior Management in an Organization. What are the different roles and responsibilities of senior management?
In: Computer Science
Visual Basic
Make a directory and copy some files from desktop to the created directory
In: Computer Science
How do you make a prediction from a decision tree using confusionMatrix function in rstudio?
In: Computer Science
In python and comments your code :
Exercise 1
1.Write a function waiting for two matrices and returning their
addition, −1 if it is not not possible.
2. Write a function associated with a matrix and a scalar and
returning the produced matrix.
3. Write a function accompanying an n × m matrix and a vector n and
returning the vector produced by each other, −1 if this is not
possible.
4. Write a function accompanying two n × m and m × k matrices and
returning the product matrix, −1 if this is not possible.
5.Write a function waiting for a vector (column or row) and
returning its transpose.
Exercise 2
1.Write a function waiting for a 2 × 2 matrix and calculating
its determinant.
2. Write a function waiting for a matrix A of size n × m and two
integers i and j and rendering a matrix (n − 1) × (m − 1), copy the
matrix A without row i and column j .
3. Write a determining function of a square matrix by expanding on
a line.
In: Computer Science
I need a paragraph on what the Gherkin language is. What is it used for? How do we use it? What are the good and bad things about it?
In: Computer Science
A friend of yours is new to computing, and he has learned that you are pursuing a CIS degree. He asked you about the meaning of a program, the key differences between the generations of programming, and how the open-source software (OSS) comes into play. How would you answer these questions?
In: Computer Science