Create the game battleship online

Assignment Help Computer Engineering
Reference no: EM133626598

Question: You are going to create the game Battleship Online, something similar to this game but without the graphs (character mode). For it you will leverage everything you learned in class, in other words, you will use at least one of the following:

Classes

Functions

Flow control structures

Arrays You will be playing against the computer, the computer will select the position of the ships randomly. Your array will be a matrix of 14x14, and all your ships will take up to 3 blocks in the array, either vertical or horizontal, but not diagonal Every player will have 6 ships to position as desired inside the matrix. The game ends when you either sunk all the computer ships or the computer sunk all your ships, the winner must be announced at the end. Use of color and sound is encouraged but not required, it is part of the creativity/enhancements rubric below, you are welcome to compensate with other resources.

Reference no: EM133626598

Questions Cloud

Write out to a binary file the three balance amounts : Write out to a binary file the three balance amounts for each of the account variables and The file will be in the same directory as your .vcxproj file
Are there other frameworks mentioned has been discussed : Are there other frameworks mentioned has been discussed in article that be more effective? Has any other research you uncover suggest there are better framework
Which strategy should the institution primarily employ : Which strategy should the institution primarily employ to ensure the data on these servers stays irretrievable
Calculate the total gain and character of the gain under : Briefly describe the three steps to calculate the total gain and character of the gain under 751(a)
Create the game battleship online : Create the game Battleship Online, something similar to this game but without the graphs (character mode). For it you will leverage everything you learned
Explain one that seem the most critical or most demanding : List and explain one that seem the most critical or the most demanding or the most complex as it relates to project management.
What is used to provide authentication of the website : What is used to provide authentication of the website and can also be used to successfully authenticate keys used for data encryption?
What do you call the long, digital pattern sent by gps : What do you call the long, digital pattern sent by GPS satellites at a fixed interval?
Potential threat actor and tools used in this activity : Which data sources would provide the MOST relevant information for the analyst to investigate and identify the potential threat actor and tools used

Reviews

Write a Review

Computer Engineering Questions & Answers

  Draw a map to illustrate the above data structure

A 68020-based single-board microprocessor system is to be used to keep track of items in a shop. The shop sells up to N items.

  Discuss how the business requirements drove the systems

write a 700- to 1050-word paper identifying and describing how specific system used in an organization has transformed

  Calculate expenses for payroll and rent for years

Calculate expenses for payroll and rent for Years 2-5. She knows the starting amount for each expense, and estimates the rent in Year 5 will be $64,000

  Calculate routing table by using dijkstras algorithm

Write a program to calculate Routing table by using Dijkstra's Algorithm. Ask user to enter the starting node and calculate the routing table for that node.

  Find the total cost of the first hundred units

A company's marginal cost function is MC(x)(given below), where x is the number of units. Find the total cost of the first hundred units (x = 0to x = 100).(Round your answer to the nearest cent.) MC(x) = 4e-0.02x

  How are functions of hubs repeaters and switches different

How are domain names related to IP addresses on the internet? How do we make sure that no two computers in the Internet have the same address?

  Draw typical hierarchy chart for paycheck-producing program

Draw a typical hierarchy chart for a paycheck-producing program. Try to think of at least 10 separate modules that might be included.

  Develop the requirements and design specifications

SOFTWARE ENGINEERING MINI PROJECT-Level 3-National Council for Higher Education- BACHELOR OF SCIENCE IN SOFTWARE ENGINEERING.

  Describe a situation in which useful information

SECU 322 New Jersey City University Describe a situation in which useful information is conveyed to an attacker through a characteristic of encrypted

  Does permitting access to risky sites pose a risk

Does permitting access to risky sites pose a risk to the organization - The organization will strictly restrict web access by employees in order to promote

  Evaluate the network statistics

7COM1076 Wireless Mobile and Multimedia Networking, University of Hertfordshire - Evaluate the network statistics (packet loss, delay, and throughput) of UDP

  Write a paragraph describing why the product is stupid

Write another paragraph describing why this product is stupid, and what potential security risks it poses (i.e., data exposure, presenting a platform for attack

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd