Problem releated to relationship-inheritance

Assignment Help Basic Computer Science
Reference no: EM13924350

Assignment #3 More OOP - "Is A" Relationship/Inheritance

Grading: For each programming assignment, you are graded by explaining and demoing your code to a TA. You must demo your program BEFORE the next assignment is due, and if you fail to do so, you will automatically lose. Your job is to convince the TA that your program works correctly, i.e. show your TA how to use/break your program Problem Statement (Idea from the MIT OpenCourseWare): You will implement a class called Tool. It should have an int field called strength and a char field called type. You may make them either private or protected. The Tool class should also contain the function void setStrength(int), which sets the strength for the Tool. Create 3 more classes called Rock, Paper, and Scissors, which inherit from Tool. Each of these classes will need a default constructor that sets the strength to 1 and a non-default constructor which will take in an int used to initialize the strength field. The constructor should also initialize the type field using 'r' for Rock, 'p' for Paper, and 's' for Scissors. These classes will also need a public function bool fight(Tool) that compares their strengths in the following way:  Rock's strength is doubled (temporarily) when fighting scissors, but halved (temporarily) when fighting paper. 

In the same way, paper has the advantage against rock, and scissors against paper.  The strength field shouldn't change in the function, which returns true if the original class wins in strength and false otherwise. You may also include any extra auxiliary functions and/or fields in any of these classes.

In addition, you will create a class called RPSGame, which allows a human to play the rock, paper, scissors game against the computer. Your RPSGame must have two Tool for the human and computer tool because you don't know the new tool they'll select with each round. The RPSGame should also have three int fields to keep track of the number of human_wins, computer_wins, and ties.

You can choose the strategy for the computer guesses, but it cannot be based on what the human selected for a tool in the current game!!! Example of a novice and veteran computer AI: https://www.nytimes.com/interactive/science/rock-paper-scissors.html?_r=0
After the human selects the tool for the current game, display the computer's tool, a message describing who won, the current stats for the wins and ties, and then ask the user if he/she wants to play again. Example Play of Game: Welcome to Rock, Paper, Scissors! Do you want to choose different strengths for the tools? (y-yes, n-no) n Choose your tool (r-rock, p-paper, s-scissor, e-exit): r Computer chose scissor.

Reference no: EM13924350

Questions Cloud

Methods of evaluating marketing programs : Question 1: Three commonly used methods of evaluating marketing programs are marketing metrics, marketing dashboards, and marginal analysis.
What two components are involved in valuation procedure : What two components are involved in the two-part valuation procedure? Given the two components in the valuation procedure, which is more volatile?
How normal distribution can be used in operations enviroment : The normal distribution is a family of distributions that is often used to model operational processes. Based on your readings for this module, give one example, different from those supplied in the overview, of how the normal distribution can be ..
What variables affect the aggregate operating profit margin : What variables affect the aggregate operating profit margin, and how do they affect it? What variables determine the level and changes in the market earnings multiplier?
Problem releated to relationship-inheritance : Grading: For each programming assignment, you are graded by explaining and demoing your code to a TA. You must demo your program BEFORE the next assignment is due, and if you fail to do so, you will automatically lose 50 points! Your job is to con..
What is the big-oh complexity for a push : Suppose that a dynamic array stack doubles its capacity when it is full, and shrinks (on Pop only) its capacity by half when the array is half full or less.
Perpetual inventory method : what are the steps to recording and adjusting the lifo Fifo and weighted average. Also what do we record and what don't we record on the perpetual inventory method.
Solve the problem in matlab to find the slowness map : Calculate the maximum and minimum oil in place (STOOIP) for this field -  Use the generalized linear least square formulation to solve the problem in MATLAB to find the slowness map. Can you identify the location and extend of oil spill?
Defined pension plan : Data are available for Joey CO's defined pension plan

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Compare and contrast magnetic tapes

Realize business and organizational data storage and fast access times are much more important than they have ever been.

  Determine prompts for two positive integer inputs

Prompts for two positive Integer inputs (numerrator, denominator) from user, Displays Quotient and Remainder of above two inputs

  Explaining security risks for computing infrastructure

In your new position at XYZ Corporation, you have been asked to lead risk assessment team. As part of project to assess security risks for computing infrastructure.

  Which interarrival time gives the maximum throughput

Which interarrival time gives the maximum throughput?

  Optimum administrative

Exchange 2010 offers three options for managing the Exchange Application server. Exchange Management Console (GUI), Exchange Management Shell (Command Line Interface) and Exchange Control Panel(Web interface).

  Why we need to pay attention to numerical issues

Give five reasons why we need to pay attention to numerical issues in our engineering activities, which include design, analysis, and optimization.

  Create statechart to balanced four parentheses

Create Statechart to balanced four parentheses.

  Allocate new memory and release unneeded old memory

During an exec call in Minix, it tests for an adequate hole before releasing the current process memory. Reprogram this algorithm to do better.

  Implement a binary search or avl tree

You are to implement a Binary Search or AVL tree containing the details of known criminals.  The criminal object must minimally contain the following information.

  The size of 2k bytes goes through a wan.

A packet with the size of 2K bytes goes through a WAN. If the packet goes through 10 store-and-forward switching/routing devices, all of which have the transmitting rate of 2Mbit/s, what is the total delay the packet experiences in this WAN? Please i..

  What is a predefined control event

What is a predefined control event? Discuss its usage in programming.

  Convert the number as started decimal

Convert the following number as started (a)decimal 2459 to hexadecimal (b)Character X and x to ASCII and Unicode

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd