Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Objectives:

  • Practice string, loop, and modular design with functions.

An alien species use 14-based numbering system. Their ten digits, 0 through 9, are the same as our decimal system. They use A, J, Q and K to represent decimal 10, 11, 12 and 13, respectively. They hire you to write a program to do the summation of their two numbers.

The program should prompt users for two 14-based numbers and then display the summation of those two numbers. The output should also be 14-based. (They are unwilling to learn our decimal systems!) For example, if inputs are 17 and 96, the output should be AK.

User interface specifications:

  • Input
    • The program prompts users fortwo 14-based numbers.
  • Output
    • A14-based numberthat is the sum of the two input 14-based numbers.

Code specifications:

  • The first comment line contains the name of the script file you submitted for grade.
  • The header comment lines at the top of the file contain a brief description of the program. The description should be one or 2 lines long describing the purpose of the program.
  • Partition the task into smaller subtasks and implement each subtask with function(s). Each function must have comment lines describing its functionality, inputs, and outputs, as applicable.
  • Your program must have a "main" function to aggregate the decomposed subtasks as shown in the loan example in class. You also have to include comment lines in your "main" function to describe the logic or flow of your solution to the whole problem.
  • Finally, don't forget to use the following idiom to call your "main" function within your program. 

            if __name__ == "__main__":

                    main()

  • Usedescriptive variable names.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91672032
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question search scholargooglecom for a company school or

Question: Search "scholar.google.com" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

Suppose you take out a loan for 9000 at 12 ordinary

Suppose you take out a loan for $9,000, at 12% ordinary interest. If the amount of interest is $762.00, what is the time period? (Round any fraction to the next higherday)

Suppose you would like to sort n music files using a

Suppose you would like to sort n music files using a comparison-based sorting algorithm (i.e. no bucket sort), but you only have an old, unreliable computer, which you have nicknamed "Rustbucket". Every time Rustbucket c ...

Questionsuppose we are comparing implementations of

Question Suppose we are comparing implementations of insertion sort and merge sort on the same machine. For inputs of size n, insertion sort runs in 8n2 steps, while merge sort runs in 64nlgn steps. For which values of n ...

The of the steering wheel is used to create a parallel

The _____ of the steering wheel is used to create a parallel plane in the Synchronous Part environment. The _____ option is used to apply the crown by defining its radius and take-off angle. 1-In the Ordered Part environ ...

Suppose circle is a class derived from the class point now

Suppose, Circle is a class derived from the class Point. Now consider the following statements: Point p[] = new Point[12]; P[0] = new Circle(); Now suppose Circle has a method Area() computing are of a circle, and Point ...

Question subject digital securitywhat do you think about

Question : Subject : Digital Security What do you think about how cloud makes DLP (Data Loss Prevention) more difficult? The response must be typed, single spaced, must be in times new roman font (size 12) and must follo ...

Question suppose we have a b-tree that holds keys and

Question : Suppose we have a B-Tree that holds keys and leaves. There are 100 million data records (N), and they are stored in the leaves (lowest level) of the B-Tree. Each leaf contains 100 data records. The leaves are ...

Run a c code to solve the following problemsuppose that you

Run a C code to solve the following problem: Suppose that you are planning to pay $14500 yearly for 4 years for a car which is $50000 now what would be the interest rate? You may follow the bellow formula: P=A((1+i)^n-1) ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As