Game and rpg theme-write code to simulate battle with enemy

Assignment Help Basic Computer Science
Reference no: EM133220552

PLEASE ANSWER USING C++

We are going to continue the game and RPG theme. In many RPG games, a player will choose a type of character to play. This may be types like a Fighter, a Healer, or a Mage. If you think about these types of characters, they share some characteristics [such as name, categories of statistics such as health, attack, etc) but they will typically do different things. For this exercise, you are to create a character class, as well as a number of other classes that inherit from this base class. You should create: Character class - this should have a name, base attack, current health, and maximum health. This should also have a function to attack (that returns their base attack value) as well as be hit (i.e subtract an amount from their current health and check if they are still alive) and also to display the current state of the player. E Fighter class - this will inherit from Character but add another data member for strength as well have an overloaded attack function that adds the value of strength to their base attack function E Healer class - this will inherit from Character but add another data member for Divine Power as well have an overloaded attack function that multiplies half of the value of divinePower by their base attack function E Mage class - this will inherit from Character but add another data member for Arcane Power as well have an overloaded attack function that multiplies the value of arcanePower by their base attack function Each class should have constructors as appropriate. These constructors can generate random values forthe initial values of data members. Create a main game program that has one of each character. Create an enemy based off the Fighter class and write code to simulate a battle with the enemy.

Reference no: EM133220552

Questions Cloud

Simulate realization of bernoulli population : Simulate a realization of a Bernoulli population with n=10, n=50, n=300 and plot the empirical distribution in each case and the F distribution in R studio.
Project idea-outline proposed plan : Looking for tutors who can help me with the project idea. The proposal presentation should outline the proposed plan, the resources needed, a feasible timeline
Create function ?le to deduce : Create a function ?le to deduce the maximum length of the side of a triangle ABC formed between position vectors
Layered architecture : Develop a layered architecture diagram to illustrate all sub-system or component involved when deploying the proposed system.
Game and rpg theme-write code to simulate battle with enemy : We are going to continue the game and RPG theme. Create an enemy based off the Fighter class and write code to simulate a battle with the enemy.
Coding-valid parentheses : Submit test cases to ensure your code is working correctly. Open brackets must be closed by the same type of brackets.
Representing boolean test : Write a BNF grammar for if-statements in Java. You may use the non-terminals representing a Boolean test
Network devices together on internal network : The purpose of ........ is to connect all of the network devices together on an internal network. Improve security ,a server should be decentralized.
How is it related to digital evidence : What does hearsay mean and how is it related to digital evidence?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create high-level information security management plan

you have been asked to create a high-level information security management plan to be presented to the senior management of your latest client.

  Requirements and restrictions of project must be identified

Kirk (2016) tells us that all requirements and restrictions of a project must be identified.

  Provide a substantive response

This writing assignment calls for you to provide a substantive response 1400 words on the subject of managing databases. This paper should follow a logical progression (e.g. introduction, analysis & discussion, and summary & conclusion(s)), be dev..

  What are the differences between ospf and is is

For this Discussion Board, you need to really understand what a link-state protocol is. In a previous assignment, you were asked to describe them. In your own words, answer the following questions:

  Internally performing business

They were mainly concentrated on how they were internally performing business and how the finances were documented,

  2-level mixed cache with a level-0 hit rate

Calculate the local hit and miss rates for each level, followed by the global hit and miss rates for the entire cache.

  Research interests in area of information technology

What are your research interests in the area of information technology? How did you become interested in this area of research?

  Describes basic components of business network

The author describes basic components of a business network.

  What is the worst-case running time of program

Write a program to determine whether a positive integer N is prime. In terms of N, what is the worst-case running time of your program?

  Different recommendations for dietary intake

There are lots of different recommendations for dietary intake. Do they discuss the impact on various digestive organs?

  Identity being compromised

Kevin awakens one morning in Raleigh and his phone is dead. His cover was blown. What mistake leads to his identity being compromised?

  Implement security measures

Many business environments have both visible and invisible physical security controls. you think it would be necessary to implement security measures for both?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd