Gralands robots, Computer Engineering

You have been contacted by Jean-Luc Picard commanding officer of Star Trek: The Next Generation. The Commander needs your support to develop a software routine to simulate the Robots that were built at planet Graland. The planet Graland sent these robots last year under a secret project for the planet Earth, to know more about earth and its habitant. Lately, the commanding officer came to know about this fact, that they have successfully recorded their presence on some surveillance systems. Now, the commanding officer wants you to write a software routine to know the exact tour of these robots had made on the planet Earth. It is recorded that there were three kinds of robots, each one with the functionality that they can move from one point to another point. They can communicate in an encrypted language. One type of robot can collect the sample of physical things of any matter it like to get. The other type of robot collects photographs of the things it sees, the third type of robot. You need to provide the basic simulation of these robots in object oriented programming in c++.

Posted Date: 3/13/2013 6:55:37 AM | Location : United States







Related Discussions:- Gralands robots, Assignment Help, Ask Question on Gralands robots, Get Answer, Expert's Help, Gralands robots Discussions

Write discussion on Gralands robots
Your posts are moderated
Related Questions
It is not possible to use ABAP/4 Dictionary Structures without an underlying database using LDB. True.  You can use additionally related tables, along with the tables explaine

Define DMA. The transfer of data among a fast storage device such as magnetic disk and memory if often limited by the speed of the CPU. Removing the CPU from the path and letti

Illustrate about 8259 8259A adds 8 vectored priority encoded interrupts to the microprocessor. We can expand it to 64 interrupt requests by using one master 8259A and 8 slave

The Peripheral interface chip system requires the construction of the interface chip circuit, which is controlled by main micro-controller via the user interface. I also need set

Define the password methods and Biometric systems for implementing client server network security. In cyberspace, buyers and sellers cannot notice each other. Also within video

How to detect overflow condition An overflow condition can be notice by observing the carry into the sign bit position and the carry out of sign bit position. If this carries a

Determine the term- Security When using Internet, security can be enhanced using encryption. Debit and credit card transactions can also be protected by a specific type of pas

1) Identify the software needs of each PC and whether or not anything needs to change. a. State the changes that you would make (and why) b. If no "change" needs to be made b

SMLI firewalls are different from the conventional The SMLI firewalls are different from the conventional "stand in" proxies in a way that the stand-in proxies are used for th

SPC stands (A)   Standard Protocol Control (B)   Stored Program Control (C)  Signaling and switching Centre (D)  Signaling Process Center Ans: SPC repres