Draw a circle that is one inch in diameter

Assignment Help Basic Computer Science
Reference no: EM131096552

Assume you have created a mechanical arm that can hold a pen. Th e arm can perform the following tasks:

• Lower the pen to a piece of paper.

• Raise the pen from the paper.

• Move the pen one inch along a straight line. (If the pen is lowered, this action draws a one-inch line from left to right; if the pen is raised, this action just repositions the
pen one inch to the right.)

• Turn 90 degrees to the right.

• Draw a circle that is one inch in diameter.

Draw a structured flowchart or write structured pseudo code describing the logic that would cause the arm to draw the following:

a. a one-inch square

b. a 21-inch by one-inch rectangle

c. a string of three beads

d. a short word (for example, "cat")

Have a fellow student act as the mechanical arm and carry out your instructions. Do not tell your mechanical arm partner what he or she will be drawing (or writing) before the partner attempts to carry out your instructions.

Reference no: EM131096552

Questions Cloud

View of leadership in organization : What is different about ethical leadership (theory)? How do you practice it? How do you know if you are an ethical leader? What is "leading from the middle," and how does that influence your view of leadership in organization?
What is the current inflation rate and nominal interest rate : Suppose real GDP is growing 5 percent, the money supply is growing at 5 percent, the velocity of money is growing at 5 percent, and the real interest rate is 2 percent. a. What is the current inflation rate and nominal interest rate? b. If the money ..
Return on assets and what is its return on equity : Suppose First National Bank has $200 million of assets and $20 million of equity capital. If First National has a 2% return on assets (ROA), what is its return on equity (ROE)? Suppose First National's equity capital declines to $10 million, while it..
Modify a lex scanner specification to produce : Most compilers can produce a source listing of the program being compiled. This listing is usually just a copy of the source file, perhaps embellished with line numbers and page breaks. Assume you are to produce a pretty printed listing.
Draw a circle that is one inch in diameter : Have a fellow student act as the mechanical arm and carry out your instructions. Do not tell your mechanical arm partner what he or she will be drawing (or writing) before the partner attempts to carry out your instructions.
Financial reporting and managerial accounting information : Outline the differences between financial reporting and managerial accounting information and explain the benefits and potential problems associated with cost-volume-profit (CVP) analysis. How might the technique that you have discussed assist you..
According to the keynesian-cross analysis : Write down the IS and the LM equation. Explain why the IS curve is downward sloping and the LM curve is upward sloping. According to the Keynesian-cross analysis, if the marginal propensity to consume is 0.8, and government expenditures and autonomou..
Concentrate on correctness and simplicity of design : When a compiler is first designed and implemented, it is wise to concentrate on correctness and simplicity of design. After the compiler is fully implemented and tested, you may need to increase compilation speed.
Complete wide variety of moving and normal look options : So, we need you to touch us now and collect our complete wide variety of moving and normal look options. We are as a substitute smooth to use and within the equal way comfortable to get aid with.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  General area of network security is obviously of enormous

The general area of network security is obviously of enormous corporate and national importance. And there's no doubt that intrusion detection and prevention is a principal concern. Lately there have been a number of concerted security attacks on maj..

  What are the transport protocols

What mechanism is used to detect/avoid/correct data transmission collision in Layer 2, such as Ethernet and WiFi? Describe the mechanism in sufficient details.

  Write java method takes integer array and fills the array

Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000.

  Using sequential logic, counters and shift registers propose

using sequential logic, counters and shift registers propose a more complex system utilizing some of the more complex sub systems. example a motion acitavated light. Needs to be somthing other then a light example like motors or somthing

  Operator overloading

Operator Overloading

  Describe the types of information available to a program

Describe the types of information available to a program when using the KeyListener interface.

  Growth in global business activity affects

Growth in global business activity affects how employees and associates from different organizations and within the same organization network with each other. Use the internet to research how you might successfully network with peers in other countri..

  Create the logic for the dice game pig

In this version of the game, when the computer does not roll a 1 and can choose whether to roll again, generate a new random value of 1 or 2. Use this value to decide whether the computer will continue to play or to pass the turn to the player.

  Let the predicate

11. Let the predicate ">" be defined as follows: Let a and b be integers. "a > b" if and only if a = b + k where k is an integer > 0. Using only this definition, prove that ">" is transitive, i.e., if x, y, and z are integers and x > y and y >..

  Identify tactical

Conduct research to find examples of the differences between I.T. security controls and countermeasure gap analysis, and identify tactical, strategic, risk mitigation, threats, and vulnerability dimensions and gaps associated with compliance recom..

  Prepare a context diagram for the new system using ms visio

The current registration system is done using Microsoft Excel. Michelle Madrid, the administrative assistant, sets up a new workbook for each academic year. Each month Michelle creates a new worksheet in the workbook.

  How many concurrent channels are allowed

What kind of multiplexing is used with these radios? How many concurrent channels are allowed? Is there a technology newer than family radio service? If so, describe its characteristics as well as provide business application examples.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd