Description
- Traditional methods of systems development life cycle (SDLC) planning may or may not include prototyping. If you have either worked on project like that or had to operate the end product of such share your experiences (it's okay to ask a friend for his or her experiences and report on those). Do you believe prototyping might have made the product better? Why or why not? If you were in charge of a new project would you recommend prototyping? Why or why not?
Note : No plagarism and need original content in APA format.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Great! Studypool always delivers quality work.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of Texas Card Based Battle Game Between Two Computers Project
Overview
The project is to create a card-based battle game between two (computer) players in which they battle each other ...
University of Texas Card Based Battle Game Between Two Computers Project
Overview
The project is to create a card-based battle game between two (computer) players in which they battle each other with action cards.
Game Play
In each turn, there is a battle in which the outcome is determined by the card types and values. After each turn, the current cards are discarded into the abyss. In some outcomes, one player may gain one card from the other or both may lose their cards into the abyss. The game continues until one player has lost all their cards. The player with any remaining cards wins.
Cards
Each player has a deck of cards, implemented with a linked list. Each card is a node in a linked list. There are three types of cards: ATTACK, DEFEND, and RUN. Here are the scenarios for each battle showdown between the two players.
ATTACKDEFENDRUNATTACKIf both players ATTACK, the player with the higher value wins. The winning player gets a new card, which will be added to their card list in the descending order of the card value. The losing player will lose their next card into the abyss. In a tie, nothing happens.If one player ATTACKs and the other player DEFENDs, the player with the higher value wins. If the ATTACKing player wins, they get a new card added to their card list in the descending order of the card value and nothing happens to the DEFENDing player. If the DEFENDing player wins or ties, then the ATTACKing player loses their next card into the abyss.If one player ATTACKs and the other player RUNs, the RUNning player loses their next card into the abyss.DEFENDIf both players DEFEND, nothing happens.If one player DEFENDs and the other player RUNs, the DEFENDING player gets a new card added to their card list in the descending order of the card value. The RUNning player loses their next card into the abyssRUNIf both players RUN, they both lose their next card and those cards disappear into the abyss.
Task 1 - cards.h
Declare a struct that will represent a Card, which will also be a node in a linked list. It will contain a CardType (see enum below) and an integer value.
Declare all prototypes for the required functions (see Task 2)
Include header guards
Include this enum for the CardType.
typedef enum CardType { ATTACK, DEFEND, RUN } CardType;
Task 2 - cards.c
Write the following functions. These functions are typical linked list functions, but adapted for the game play.
Card* createCard() - This function dynamically allocates a new Card struct object and returns a pointer to that struct object which will later be used to insert into a linked list. There are three types of cards ATTACK, DEFEND, and RUN. ATTACK and DEFEND cards also have a value. You will assign a card type based on these random chances:
40% - ATTACK: the value is a random number between 1 and 5 inclusive.
50% - DEFEND: the value is a random number between 3 and 8 inclusive.
10% - RUN: the value is a random number between 1 and 8 inclusive. The value of a RUN card is only used for sorting purposes.
Card* removeCard( Card* head ) - This function removes and deallocates the first node in the linked list that head is pointing at. It returns the new head of the linked list.
Card* addCard( Card* head, Card* c ) - This function adds a new Card struct object to the the linked list that head is pointing at. It is assumed that a new Card struct object, that is being passed into this function as parameter c. This function will add the new node in descending order of its value regardless of the action. This essentially puts the "stronger" cards in front of the deck.
int getLength( Card* head ) - This function returns the length of the linked list that head is pointing at.
void printCard( Card* head ) - This function prints a single card with abbreviations: A for ATTACK, D for DEFEND, and R for RUN and their corresponding values. Example: A5 means an ATTACK worth 5 points.
void printCards( Card* head ) - This function traverses the linked list that head is pointing at. It will call printCard(). It should print out from front to back. Example: R6 D5 D4 A4 D3
Card* buildDeck( int n ) - This function builds a deck of cards using a linked list. The parameter n determines how many cards are created. It will use createCard() and addCard(). It returns the head of the new linked list.
Card* destroyCards( Card* head ) - This function is the destructor for a linked list that head is pointing at. It should return NULL.
Task 3 - project3-main.c
Write the main() to do the following.
Print the game header
Ask the user how many cards they want in the deck. If it is not a valid number or it is zero, print an error and end the program.
If the user enters a valid number greater than zero, you can start the game:
Build each player’s Card linked list based on the size that the user inputted. Print out each player's cards using printCards().
Start the game loop. The game continues so long as both players have cards to play with. In each turn (iteration of the loop):
Print the player name and the number of cards currently remaining in brackets. Also print each player’s first card that is being played currently, along with its value. For example, Player 1 (12): D7 & Player-2 (12): R8.
Implement the outcomes for each permutations of player actions. There are 9 permutations of ATTACK, DEFEND, and RUN (AA, AD, AR, DA, DD, DR, RA, RD, RR). You can have an if-statement for each of these permutations. Print out descriptive information about what is happening, who wins, and assess the reward/punishment on both players as determined by the rules above. This involves creating/adding a new card to a player’s linked list if they win and/or removing another card from a player’s linked list. There are also cases when there are no rewards nor punishment. You will use your functions to assess these outcomes.
At the end of each turn, remove the front of the linked list from each player. This discards the cards that the players used in this round. Remember to do remove this current card before applying the reward/punishment for each of the above cases. i.e. the current card should be discarded first before removing the next card as penalty or adding a new card as reward.
Determine the winner and print out the outcomes. There is also the case in which both players lose.
Task 4: Create a makefile
Create a makefile to compile .
NTC326 University of Phoenix Power Shell CMDLET Paper
Respond to the following in a minimum of 175 words: You are the network administrator for your organization. Your DHCP ser ...
NTC326 University of Phoenix Power Shell CMDLET Paper
Respond to the following in a minimum of 175 words: You are the network administrator for your organization. Your DHCP server (Server1) has a scope of 10.10.16.0 to 10.10.16.254 with a subnet mask of /20. You need to ensure that all of the client computers obtain an IP address from Server1. Which PowerShell cmdlet would you use?
AU Databases Online Food Ordering System Essay
Online Food Ordering Database – Task 1Prior to beginning work on this assignment, read Chapter 1: Database Systems and C ...
AU Databases Online Food Ordering System Essay
Online Food Ordering Database – Task 1Prior to beginning work on this assignment, read Chapter 1: Database Systems and Chapter 2: Data Models from the course text. In each week of this course, you will build a component of your Online Food Ordering Database, which is your Final Project for the course, due in Week 5. For this assignment, you will complete the first task of designing the Online Food Ordering Database.You are hired by a software company to design and implement a database for a new online food ordering website. As an expert in MySQL, you suggest building the new database using MySQL. Your project manager has agreed and requested an initial list of at least three to four types of stakeholders (entities) and their related initial list of at least four to five attributes to be included in your design of the database. To assist you, the project manager shared with you the following list of similar information (that was previously generated for a clinic management system) to help you compile and organize your list of defined stakeholders and their attributes:Doctor (d_id, d_username, d_password, d_firstName, d_lastName, d_email, d_phone)Nurse (n_id, n_username, n_password, n_firstName, n_lastName, n_email, n_phone)Patient (PID, PFirstName, p_lastName, p_email, a_phone, p_adddress)Diagnostic (DiagID, NID, NurseComment, DID, Diagnostic, Medicine, DiagDate)In your paper,Create a completed list of stakeholders and attributes for your Online Food Ordering database in a Word document.Justify why MySQL is the best choice over other database management systems (DBMS) for your Online Food Ordering database on a separate page. (Your justification should be a minimum of 300 words.)The Online Food Ordering Database – Task 1 paperMust include a completed stakeholders and attributes list.Must include justification for using MySQL that is a minimum of 300 words and be formatted according to APA style as outlined in UAGC's The Writing Center.Must include a separate title page with the following:Title of paperStudent’s nameCourse name and numberInstructor’s nameDate submittedMust document all sources in APA style as outlined in the UAGC Writing Center.Must use at least one scholarly, peer-reviewed, and/or credible sources in addition to the course text.The Scholarly, Peer Reviewed, and Other Credible Sources table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.Must document all sources in APA style as outlined in the UAGC Writing Center.Must include a separate references page that is formatted according to APA style as outlined in the UAGC Writing Center.Note: In preparation for next week’s assignment, it is recommended that you start reviewing the following tools that you will be using to design and develop your database.Microsoft Visio or any other Chen Entity Relationship (ER) Diagram toolThese tools will allow you to graphically design schemas for databases and show the relationships between information tables stored in the database. Diagrams help to ensure that the database you are designing is accurate, complete, and efficient.The latest version of PHPMyAdmin.PHPMyAdmin is a free open source application that is designed to administer the database management system (DBMS) - MySQL. PHPMyAdmin is a web-based interface with which you can administer your server MySQL, run commands, and view the contents of tables and databases through a browser.
Excelsior College Agile Model Presentation
I already have the powerpoint done I just need to be narratedIn Module 7, you learned skills to create a PowerPoint presen ...
Excelsior College Agile Model Presentation
I already have the powerpoint done I just need to be narratedIn Module 7, you learned skills to create a PowerPoint presentation, and submitted your draft presentation on the Systems Development Life Cycle (SDLC) alternative (M7A1). In this activity, you will finalize your presentation content based on instructor’s feedback, record your presentation and capture your voice narrations.Before you start, read the following resources:Record your slide show in PowerPoint (Links to an external site.). (n.d.). Retrieved from https://support.office.com/en-us/article/Record-yo...Best practices and tips for developing your presentation for online delivery [PDF file size 315 KB]. (n.d.). Retrieved from http://ext.wsu.edu/pd/documents/BestPracticesandti...Rios, A. (2013, August 12). PowerPoint 2013 - Recording voice and automatic transitions (Links to an external site.)[Video file] [5 min 58 sec]. Retrieved from The Narrated PowerPoint Presentation Assignment for this course consists of two parts:Part I (M7A1): Draft a PowerPoint presentation on an assigned topic. Draft submission for instructor feedback. Ungraded.Part II (M8A3): Finalize your PowerPoint presentation, based on feedback from the instructor, with recorded narration.This is the Part II of the PowerPoint Presentation Assignment. Your task is to:Revise and finalize your M7A1 SDLC Alternative presentation based on the M8A3 Rubric and the feedback from your instructor.Record your presentation and capture your voice narrations. The total presentation time needs to be at least 5 minutes long.Submit your narrated SDLC Alternative presentation to M8A3 dropbox.
11 pages
United Parcel Service
United Parcel Service, Inc. (UPS) is a package delivery company that also specializes in a number of supply chain manageme ...
United Parcel Service
United Parcel Service, Inc. (UPS) is a package delivery company that also specializes in a number of supply chain management solutions. Delivering ...
Powerpoint presentation about Best Practices in Collecting Digital Evidence
In this assignment, you assume the role of an employee of the DigiFirm Investigation Company. You must research best pract ...
Powerpoint presentation about Best Practices in Collecting Digital Evidence
In this assignment, you assume the role of an employee of the DigiFirm Investigation Company. You must research best practices in collecting digital evidence and create an electronic presentation which highlights your findings to the CEO of DigiFirm, in which you recommend those best practices for adoption by your organization.Deliverable:For this assignment, you are to:Select a recent reputable source for Best Practices in Collecting Digital Evidence (NIST, FBI, SANS, NCJRS, etc. - cited on the reference page), analyze the source recommendations, and create PowerPoint presentation to share your findings.Your presentation should be at least 7-8 slides in length, not including title and reference slides. Be sure your presentation adheres to the academic writing standards and APA style guidelines, citing references as appropriate.it is strongly encouraged that you submit all assignments to the TurnItIn Originality Check
Similar Content
WRTG 393 UMGC Advantages of Therapy Animals Executive Summary
Writing Assignment #5
White Paper for an External Audience
Summary of the Assignment:
•
Task: In this paper, you will w...
Bellevue University Risk Management Discussion
In 2014, the Heartbleed security bug in the OpenSSL cryptographic library was announced, affecting all systems that used t...
Campbellsville University Data Visualization Using Tableau Tool Discussion
For Week 11 Discussion Question the assignment is as follows:-You may recall that we started using visualization tools bac...
subject - web analytics, computer science homework help
subject - web analyticsMandatory - min of 600 words and 4 references in apa format with no plagiarism very very imp pleas...
poster presentation
Poster AssignmentAlan Turing- From your assigned topic, develop a poster-sized graphic in any application that you wish to...
software engineering, capstone, computer science homework help
Capstone Project
Scenario:
You have been asked to develop
an ordering application for a restaurant that serves Americ...
Evaluation 3
Being a team leader involves managing a group of employees within an organization. It involves coordinating them in their ...
Contingency Planning Discussion
Contingency planning is the creation of a recovery plan under the scenario that an unexpected event arises. This plan incl...
Identity And Access Management
The policy is up-to-date, and I would not consider changing anything. However, I would like to add facial recognition unde...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of Texas Card Based Battle Game Between Two Computers Project
Overview
The project is to create a card-based battle game between two (computer) players in which they battle each other ...
University of Texas Card Based Battle Game Between Two Computers Project
Overview
The project is to create a card-based battle game between two (computer) players in which they battle each other with action cards.
Game Play
In each turn, there is a battle in which the outcome is determined by the card types and values. After each turn, the current cards are discarded into the abyss. In some outcomes, one player may gain one card from the other or both may lose their cards into the abyss. The game continues until one player has lost all their cards. The player with any remaining cards wins.
Cards
Each player has a deck of cards, implemented with a linked list. Each card is a node in a linked list. There are three types of cards: ATTACK, DEFEND, and RUN. Here are the scenarios for each battle showdown between the two players.
ATTACKDEFENDRUNATTACKIf both players ATTACK, the player with the higher value wins. The winning player gets a new card, which will be added to their card list in the descending order of the card value. The losing player will lose their next card into the abyss. In a tie, nothing happens.If one player ATTACKs and the other player DEFENDs, the player with the higher value wins. If the ATTACKing player wins, they get a new card added to their card list in the descending order of the card value and nothing happens to the DEFENDing player. If the DEFENDing player wins or ties, then the ATTACKing player loses their next card into the abyss.If one player ATTACKs and the other player RUNs, the RUNning player loses their next card into the abyss.DEFENDIf both players DEFEND, nothing happens.If one player DEFENDs and the other player RUNs, the DEFENDING player gets a new card added to their card list in the descending order of the card value. The RUNning player loses their next card into the abyssRUNIf both players RUN, they both lose their next card and those cards disappear into the abyss.
Task 1 - cards.h
Declare a struct that will represent a Card, which will also be a node in a linked list. It will contain a CardType (see enum below) and an integer value.
Declare all prototypes for the required functions (see Task 2)
Include header guards
Include this enum for the CardType.
typedef enum CardType { ATTACK, DEFEND, RUN } CardType;
Task 2 - cards.c
Write the following functions. These functions are typical linked list functions, but adapted for the game play.
Card* createCard() - This function dynamically allocates a new Card struct object and returns a pointer to that struct object which will later be used to insert into a linked list. There are three types of cards ATTACK, DEFEND, and RUN. ATTACK and DEFEND cards also have a value. You will assign a card type based on these random chances:
40% - ATTACK: the value is a random number between 1 and 5 inclusive.
50% - DEFEND: the value is a random number between 3 and 8 inclusive.
10% - RUN: the value is a random number between 1 and 8 inclusive. The value of a RUN card is only used for sorting purposes.
Card* removeCard( Card* head ) - This function removes and deallocates the first node in the linked list that head is pointing at. It returns the new head of the linked list.
Card* addCard( Card* head, Card* c ) - This function adds a new Card struct object to the the linked list that head is pointing at. It is assumed that a new Card struct object, that is being passed into this function as parameter c. This function will add the new node in descending order of its value regardless of the action. This essentially puts the "stronger" cards in front of the deck.
int getLength( Card* head ) - This function returns the length of the linked list that head is pointing at.
void printCard( Card* head ) - This function prints a single card with abbreviations: A for ATTACK, D for DEFEND, and R for RUN and their corresponding values. Example: A5 means an ATTACK worth 5 points.
void printCards( Card* head ) - This function traverses the linked list that head is pointing at. It will call printCard(). It should print out from front to back. Example: R6 D5 D4 A4 D3
Card* buildDeck( int n ) - This function builds a deck of cards using a linked list. The parameter n determines how many cards are created. It will use createCard() and addCard(). It returns the head of the new linked list.
Card* destroyCards( Card* head ) - This function is the destructor for a linked list that head is pointing at. It should return NULL.
Task 3 - project3-main.c
Write the main() to do the following.
Print the game header
Ask the user how many cards they want in the deck. If it is not a valid number or it is zero, print an error and end the program.
If the user enters a valid number greater than zero, you can start the game:
Build each player’s Card linked list based on the size that the user inputted. Print out each player's cards using printCards().
Start the game loop. The game continues so long as both players have cards to play with. In each turn (iteration of the loop):
Print the player name and the number of cards currently remaining in brackets. Also print each player’s first card that is being played currently, along with its value. For example, Player 1 (12): D7 & Player-2 (12): R8.
Implement the outcomes for each permutations of player actions. There are 9 permutations of ATTACK, DEFEND, and RUN (AA, AD, AR, DA, DD, DR, RA, RD, RR). You can have an if-statement for each of these permutations. Print out descriptive information about what is happening, who wins, and assess the reward/punishment on both players as determined by the rules above. This involves creating/adding a new card to a player’s linked list if they win and/or removing another card from a player’s linked list. There are also cases when there are no rewards nor punishment. You will use your functions to assess these outcomes.
At the end of each turn, remove the front of the linked list from each player. This discards the cards that the players used in this round. Remember to do remove this current card before applying the reward/punishment for each of the above cases. i.e. the current card should be discarded first before removing the next card as penalty or adding a new card as reward.
Determine the winner and print out the outcomes. There is also the case in which both players lose.
Task 4: Create a makefile
Create a makefile to compile .
NTC326 University of Phoenix Power Shell CMDLET Paper
Respond to the following in a minimum of 175 words: You are the network administrator for your organization. Your DHCP ser ...
NTC326 University of Phoenix Power Shell CMDLET Paper
Respond to the following in a minimum of 175 words: You are the network administrator for your organization. Your DHCP server (Server1) has a scope of 10.10.16.0 to 10.10.16.254 with a subnet mask of /20. You need to ensure that all of the client computers obtain an IP address from Server1. Which PowerShell cmdlet would you use?
AU Databases Online Food Ordering System Essay
Online Food Ordering Database – Task 1Prior to beginning work on this assignment, read Chapter 1: Database Systems and C ...
AU Databases Online Food Ordering System Essay
Online Food Ordering Database – Task 1Prior to beginning work on this assignment, read Chapter 1: Database Systems and Chapter 2: Data Models from the course text. In each week of this course, you will build a component of your Online Food Ordering Database, which is your Final Project for the course, due in Week 5. For this assignment, you will complete the first task of designing the Online Food Ordering Database.You are hired by a software company to design and implement a database for a new online food ordering website. As an expert in MySQL, you suggest building the new database using MySQL. Your project manager has agreed and requested an initial list of at least three to four types of stakeholders (entities) and their related initial list of at least four to five attributes to be included in your design of the database. To assist you, the project manager shared with you the following list of similar information (that was previously generated for a clinic management system) to help you compile and organize your list of defined stakeholders and their attributes:Doctor (d_id, d_username, d_password, d_firstName, d_lastName, d_email, d_phone)Nurse (n_id, n_username, n_password, n_firstName, n_lastName, n_email, n_phone)Patient (PID, PFirstName, p_lastName, p_email, a_phone, p_adddress)Diagnostic (DiagID, NID, NurseComment, DID, Diagnostic, Medicine, DiagDate)In your paper,Create a completed list of stakeholders and attributes for your Online Food Ordering database in a Word document.Justify why MySQL is the best choice over other database management systems (DBMS) for your Online Food Ordering database on a separate page. (Your justification should be a minimum of 300 words.)The Online Food Ordering Database – Task 1 paperMust include a completed stakeholders and attributes list.Must include justification for using MySQL that is a minimum of 300 words and be formatted according to APA style as outlined in UAGC's The Writing Center.Must include a separate title page with the following:Title of paperStudent’s nameCourse name and numberInstructor’s nameDate submittedMust document all sources in APA style as outlined in the UAGC Writing Center.Must use at least one scholarly, peer-reviewed, and/or credible sources in addition to the course text.The Scholarly, Peer Reviewed, and Other Credible Sources table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.Must document all sources in APA style as outlined in the UAGC Writing Center.Must include a separate references page that is formatted according to APA style as outlined in the UAGC Writing Center.Note: In preparation for next week’s assignment, it is recommended that you start reviewing the following tools that you will be using to design and develop your database.Microsoft Visio or any other Chen Entity Relationship (ER) Diagram toolThese tools will allow you to graphically design schemas for databases and show the relationships between information tables stored in the database. Diagrams help to ensure that the database you are designing is accurate, complete, and efficient.The latest version of PHPMyAdmin.PHPMyAdmin is a free open source application that is designed to administer the database management system (DBMS) - MySQL. PHPMyAdmin is a web-based interface with which you can administer your server MySQL, run commands, and view the contents of tables and databases through a browser.
Excelsior College Agile Model Presentation
I already have the powerpoint done I just need to be narratedIn Module 7, you learned skills to create a PowerPoint presen ...
Excelsior College Agile Model Presentation
I already have the powerpoint done I just need to be narratedIn Module 7, you learned skills to create a PowerPoint presentation, and submitted your draft presentation on the Systems Development Life Cycle (SDLC) alternative (M7A1). In this activity, you will finalize your presentation content based on instructor’s feedback, record your presentation and capture your voice narrations.Before you start, read the following resources:Record your slide show in PowerPoint (Links to an external site.). (n.d.). Retrieved from https://support.office.com/en-us/article/Record-yo...Best practices and tips for developing your presentation for online delivery [PDF file size 315 KB]. (n.d.). Retrieved from http://ext.wsu.edu/pd/documents/BestPracticesandti...Rios, A. (2013, August 12). PowerPoint 2013 - Recording voice and automatic transitions (Links to an external site.)[Video file] [5 min 58 sec]. Retrieved from The Narrated PowerPoint Presentation Assignment for this course consists of two parts:Part I (M7A1): Draft a PowerPoint presentation on an assigned topic. Draft submission for instructor feedback. Ungraded.Part II (M8A3): Finalize your PowerPoint presentation, based on feedback from the instructor, with recorded narration.This is the Part II of the PowerPoint Presentation Assignment. Your task is to:Revise and finalize your M7A1 SDLC Alternative presentation based on the M8A3 Rubric and the feedback from your instructor.Record your presentation and capture your voice narrations. The total presentation time needs to be at least 5 minutes long.Submit your narrated SDLC Alternative presentation to M8A3 dropbox.
11 pages
United Parcel Service
United Parcel Service, Inc. (UPS) is a package delivery company that also specializes in a number of supply chain manageme ...
United Parcel Service
United Parcel Service, Inc. (UPS) is a package delivery company that also specializes in a number of supply chain management solutions. Delivering ...
Powerpoint presentation about Best Practices in Collecting Digital Evidence
In this assignment, you assume the role of an employee of the DigiFirm Investigation Company. You must research best pract ...
Powerpoint presentation about Best Practices in Collecting Digital Evidence
In this assignment, you assume the role of an employee of the DigiFirm Investigation Company. You must research best practices in collecting digital evidence and create an electronic presentation which highlights your findings to the CEO of DigiFirm, in which you recommend those best practices for adoption by your organization.Deliverable:For this assignment, you are to:Select a recent reputable source for Best Practices in Collecting Digital Evidence (NIST, FBI, SANS, NCJRS, etc. - cited on the reference page), analyze the source recommendations, and create PowerPoint presentation to share your findings.Your presentation should be at least 7-8 slides in length, not including title and reference slides. Be sure your presentation adheres to the academic writing standards and APA style guidelines, citing references as appropriate.it is strongly encouraged that you submit all assignments to the TurnItIn Originality Check
Earn money selling
your Study Documents