Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

One-way to solidify the concepts of the client/server calculating and inter process communication is to develop the requirements for a computer game which plays “Rock, Paper, Scissors” using these methods.  The requirements must specify which elements of gaming task are performed by client and those performed by the server, which inter process communication method you are going to employ, and comprise a discussion of how information is exchanged.  An actual program is not needed just the design specifications.

The game is normally played by two people (more are possible), and the rules are quite simple.  Each player decides on one of three items, then on the count of three shows them to other player(s) (i.e., each player pumps their first three times, then having out their hand in an appropriate gesture.)  The items might be rock (closed fist), paper (palm open), or scissors (two finger “peace” sign), and the winner is determined by:

- Paper beats rock – paper wraps rock
- Rock beats scissors – rock dulls scissors
- Scissors beats paper – scissors cut paper

Assignment is as follows:

- Make a set of programs

- No coding, just design

- Rules for Rock, Paper, Scissors

- If the two people select the same symbol (rock, paper, scissors), it is a draw and they play again

- If the two people select dissimilar symbols, the winner is determined as follows:

- Rock beats scissors

- Scissors beats paper

- Paper beats rock

- Use at least two processes

- Specify the inter process communication technique used to exchange messages between the client(s) and server

- You will need to answer the problems

- How do you get the server’s attention (how does the process start)?

- What commands will be accepted (how do you send messages)?

- How are the answer provided (what is the response)?

- In addition you will need to deal with the subsequent:

- Content of the message

- How the messages are exchanged

- How does the server respond to the message?

- What occurs if timeout

- How is the game terminated?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91550

Have any Question? 


Related Questions in Computer Engineering

1 discuss two security mechanisms applied at the

1. Discuss two security mechanisms applied at the application layer. Are they safer than those applied at the lower network layer? Support your response. 2. Are there security mechanisms applicable at transport layer? Is ...

Fisch white and pooch 353 define four levels of log

Fisch, White, and Pooch [353] define four levels of log sanitization. a. Simple sanitization, in which all information except the commands issued by an intruder are deleted b. Information-tracking sanitization, in which ...

Anyone who is involved in many activities typically uses a

Anyone who is involved in many activities typically uses a calendar to keep track of the various activities. Colleges commonly maintain several calendars such as an academic calendar, a school events calendar, and a spor ...

We have now spent several weeks learning about security

We have now spent several weeks learning about security policies and implantation. Discuss the importance of having security policies in place. Be sure to provide thorough, detailed and well supported answers.

1 how does a planner know when a task has been subdivided

1. How does a planner know when a task has been subdivided to an adequate degree and can be classified as an action step? 2. What is a deliverable? Name two uses for deliverables. 3. What is a resource? What are the two ...

1 implement the general priority queue adt using the

1. Implement the general Priority Queue ADT using the min-heap implemented as a vector. Instead of having the number of priority levels as an argument of the constructor, specify the maximum capacity of the queue. 2. Com ...

In sect 1013 we state that sender or message authentication

In Sect. 10.1.3 we state that sender (or message) authentication always implies data integrity. Why? Is the opposite true too, i.e., does data integrity imply sender authentication? Justify both answers. In this exercise ...

1 look at the methods in the integer class which are static

1. Look at the methods in the Integer class. Which are static? Why? 2. Look at the methods in the String class (but ignore the ones that take a parameter of type char[]). Which are static? Why? 3. The in and out variable ...

1 what is an architectural style2 what is a design pattern3

1. What is an architectural style? 2. What is a design pattern? 3. Explain the principle of separation of concerns, and the advantages it entails for software development. 4. What is the purpose of each component in a mo ...

1 compare and contrast distance-vector and link-state

1. Compare and contrast distance-vector and link-state routing. If you were designing a new routing protocol, which would you use and why? 2. Analyze the routing table on your computer. In Windows you can view it with a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen