Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

One-way to solidify the concepts of the client/server calculating and inter process communication is to develop the requirements for a computer game which plays “Rock, Paper, Scissors” using these methods.  The requirements must specify which elements of gaming task are performed by client and those performed by the server, which inter process communication method you are going to employ, and comprise a discussion of how information is exchanged.  An actual program is not needed just the design specifications.

The game is normally played by two people (more are possible), and the rules are quite simple.  Each player decides on one of three items, then on the count of three shows them to other player(s) (i.e., each player pumps their first three times, then having out their hand in an appropriate gesture.)  The items might be rock (closed fist), paper (palm open), or scissors (two finger “peace” sign), and the winner is determined by:

- Paper beats rock – paper wraps rock
- Rock beats scissors – rock dulls scissors
- Scissors beats paper – scissors cut paper

Assignment is as follows:

- Make a set of programs

- No coding, just design

- Rules for Rock, Paper, Scissors

- If the two people select the same symbol (rock, paper, scissors), it is a draw and they play again

- If the two people select dissimilar symbols, the winner is determined as follows:

- Rock beats scissors

- Scissors beats paper

- Paper beats rock

- Use at least two processes

- Specify the inter process communication technique used to exchange messages between the client(s) and server

- You will need to answer the problems

- How do you get the server’s attention (how does the process start)?

- What commands will be accepted (how do you send messages)?

- How are the answer provided (what is the response)?

- In addition you will need to deal with the subsequent:

- Content of the message

- How the messages are exchanged

- How does the server respond to the message?

- What occurs if timeout

- How is the game terminated?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91550

Have any Question? 


Related Questions in Computer Engineering

1 in extension 1 of the fire simple model there are two

1. In extension 1 of the Fire Simple model, there are two parameters governed by sliders, DENSITY and PROBABILITY-OF-SPREAD. How do these two interact with regard to a critical spread of the fire? 2. The original Fire Si ...

Create a linked list structure music that contains the data

Create a linked list structure Music that contains the data fields Name, Artist, Number_of _Songs, and a pointer to the list. Create the structure with 3 members and fill in data for each member. Create a function that w ...

1 write a regular expression that finds all the words in a

1. Write a regular expression that finds all the words in a string that contain double letters, such as "deep" and "book". 2. Write a regular expression that finds all the header tags (, , etc.) in a Web page. 3. Write a ...

In practice the short exponents e 3 17 and 216 1 are

In practice the short exponents e = 3, 17 and 216 +1 are widely used. 1. Why can't we use these three short exponents as values for the exponent d in applications where we want to accelerate decryption? 2. Suggest a mini ...

Assume you need to write and test a client-server

Assume you need to write and test a client-server application program on two hosts you have at home. a. What is the range of port numbers you would choose for the client program? b. What is the range of port numbers you ...

1 assume we want to connect two isolated hosts together to

1. Assume we want to connect two isolated hosts together to let each host communicate with the other. Do we need a link-layer switch between the two? Explain. 2. If there is a single path between the source host and the ...

Imagine a peer-to-peer network where 1000 users want to

Imagine a peer-to-peer network where 1000 users want to communicate in an authenticated and confidential way without a central Trusted Third Party (TTP). ] 1. How many keys are collectively needed, if symmetric algorithm ...

1 what is a false reject rate what is a false accept rate

1. What is a false reject rate? What is a false accept rate? What is their relationship to the crossover error rate? 2. What is the most widely accepted biometric authorization technology? Why do you think this technolog ...

Design and implement an algorithm that accepts as input an

Design and implement an algorithm that accepts as input an ordered list of search names. The task required is to establish and report the absence or presence of these search names in a second much longer ordered list.

1 draw the recursive call tree for the printrev function

1. Draw the recursive call tree for the printRev() function from Section 10.1 when called with a value of 5. 2. Determine the worst case run time of the recursive factorial function. 3. Determine the worst case run time ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro