Write program to simulate conversation with an old and deaf, Computer Engineering

You are going to write a program to simulate a conversation with an old, deaf relative. You can type your statements, and whatever you say, the relative will reply randomly with one of "WHAT'S THAT YOU SAY?", or "NOT SINCE 1957!", or "WHY YOU YOUNG WHIPPERSNAPPER!". The program will terminate when you type "BYE" three times in a row (not in total, all in a row). Describe a plan for writing the program, including all variables, loops, and the step by step procedure the program will follow.

 

Posted Date: 3/20/2013 5:15:22 AM | Location : United States







Related Discussions:- Write program to simulate conversation with an old and deaf, Assignment Help, Ask Question on Write program to simulate conversation with an old and deaf, Get Answer, Expert's Help, Write program to simulate conversation with an old and deaf Discussions

Write discussion on Write program to simulate conversation with an old and deaf
Your posts are moderated
Related Questions

Explain the mechanisms of propagation of radio communication. Radio communication deals along with electronic radiation of electromagnetic energy from one point to other by the

why we use void main in c progrmeing

Organisational Inertia - Obstacle To Information System This is most easily understood as problems of change and culture. Like any change process technology led change will be

Blue Sky events is an organisation that devices and runs large outdoor events. They have been commissioned to organise and run an event for four months over the summer period in a

What are virtual Functions

A Network uses a star topology if? A Network utilizes a star topology if all computers attach to a single central point.

Maximum channel utilization in a LAN is defined by frame time (t f ) and propagation time (t p ). It is defined by (A) t p /t f (B) t f /t p  (C) 1 + (t f /t p )

Describe the properties of Attributesand operations Attributes are named slots for data values that belong to the class. Previously we have studied in MCS-024, different o

What is the File-system security Most commercial servers use a powerful operating system as base that provides good methods of file-system security. Some servers require additi