Ask Question, Ask an Expert


Ask Computer Engineering Expert

In an advanced country, a point system is maintained to keep track of erring drivers, and vehicle owners. The objective for this lab is to come up with software to keep track of penalties incurred by the drivers, and help decide those drivers whose driving license should be revoked.

Each driver is assigned an initial score of ten. Every minor offense (parking ticket, over speeding, under speeding, etc.) will be awarded a penalty of -1. Every major offense (drunk driving, reckless driving, and accidents) will be awarded a penalty of -5.  If a driver's score becomes 0 or negative, his/her license will be revoked.

For this problem, it is assumed that the owner of the car is always going to be driving the car. The list of offenses is provided as a text file containing the vehicle number and the nature of offense (Minor, Major). The list of drivers along with their UID and license number is available as input in a file named drivers.txt. A file named owners.txt maps the vehicle number to the UID of the owner. For the sake of simplicity, license number is a 10-digit integer, and vehicle number contains 3 characters followed by 4 digits. UID is a unique identifier provided to every citizen in the country, and it contains 12 digits.

The data structures to be used, the file format for various files and the general step-by-step process for this lab’s task are being stated in the remainder of this document.

 Data structures to be used:

A) Vehicle: This contains the list of all vehicles along with the vehicle number and UID of owners, with UID as the key.  Vehicle is maintained as a dynamic list.

B) Drivers: This represents the dynamic list of the tuples (license number, UID, score).

C) RevokeList: This list contains the current list of revoked drivers in the form of tuple (license number, vehicle number, UID).

File Formats:

The file format for the input files is as follows:



For ex:


 The file format for owner.txt is as follows:

Note: There is no space between number of items and item name. End Note.

For ex:


 The file format for offenses.txt is as follows


For ex:

DNA1423 1

KAS1002 0

BEL1923 0

KAS1002 1

Note that 0 indicates Minor offense here, and 1 indicates a major offense.

Step 1: Identify appropriate data structures relevant for the problem and prepare them in Offense.h

Step 2: Design Offense ADT with the following operations (OffenseOps.h). The relevant operations are:

i) populateVehicles: This function reads input from file and populates its content in the Vehicles list in lexicographic order of vehicle numbers. It then returns the populated list.

ii) populateDrivers: This function reads input from file  and populates its content in the Drivers list in non-decreasing order of UIDs. It then returns the populated list.

iii) updateOffenses: This function reads the contents of the file containing offenses. It looks up the Vehicle list to find the UID of owner. Using the UID, it looks up the license number of the driver. It then updates the score in the corresponding tuple in the drivers list.

iv) markRevokedDrivers: This function identifies all drivers whose license needs to be revoked, and puts them in the file named revoke.txt

v) Add prototypes in OffensesOps.h

You might need the following support functions:

a)  insertVehicle: this function inserts a row of vehicle details in order

b)  insertDriver: this function inserts a row of driver details in order

c) lookupUID: search for a UID from the Vehicles list given the vehicle number, and return it.

d)  lookupVehicle: search  for  a vehicle number from the  Vehicle List given the  UID of the owner and return it.

e)  lookupDriverDetails: search  the Drivers list based on UID,   and return the index of the entry containing that UID.


Step 3: Implement the above operations in the corresponding c files

·         All relevant code must go to OffensesOps.c

·         All list creations must have filename as a parameter.

 Step 4:  driver file.

Create a simple driver file (revoke.c) that can read multiple input files corresponding to the various input files. The names of input files are passed as command line parameters.  Note that if no input file is passed, the program should attempt to run with drivers.txt, owners.txt and offenses.txt for the relevant input set.

The executable revoke generates output files revoke.txt that will contain the list of drivers (license number, UID, vehicle number) whose license is to be revoked.

For the purposes of testing, you may implement some functions to print the data structures or other test data.

But all such functions must be commented before submission to server.

Deliverables: All relevant header files, OffenseOps.c, revoke.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M986

Have any Question? 

Related Questions in Computer Engineering

Define scope schedule cost and customer satisfaction why

Define scope, schedule, cost and customer satisfaction. Why are these considered to be constraints? Answer in 4-5 sentences.

1 discuss a good security auditing system2 compare or

1. Discuss a good security auditing system. 2. Compare or discuss the differences between any two security systems. 3. Discuss human error or human factors as a major security threat. 4. What is the best way to deal with ...

What factors should a firm consider when evaluating a move

What factors should a firm consider when evaluating a move from a client/server system to a cloud computing environment? Answer in about two paragraphs with reference. Must be 200-400 words and show an understanding and ...

Assignment 1system security certification and

Assignment 1 System Security Certification and Accreditation Becoming better acquainted with the history of accreditation and authorization has made you aware that you need to start planning tasks in order to complete a ...

1 in sctp a packet is carrying a cookie echo message and a

1. In SCTP, a packet is carrying a COOKIE ECHO message and a DATA chunk. If the size of the cookie is 200 bytes and that of the user data is 20 bytes, what is the size of the packet? 2. In SCTP, a packet is carrying a CO ...

A different approach to fast text searching is to step

A different approach to fast text searching is to step through the text in skips equal to the word length. As soon as we get a mismatch in trying to match the word sought we skip to the start of the next word. To do this ...

Describe two types of variables or methods that can be used

Describe two types of variables or methods that can be used to exchange data between web pages and give example code of both types.

1 why should salts be chosen at random2 does using

1. Why should salts be chosen at random? 2. Does using passwords with salts make attacking a specific account more difficult than using passwords without salts? Explain why or why not. 3. Show that a system using an EKE ...

Reorganize the bank account classes as follows in the bank

Reorganize the bank account classes as follows. In the Bank Account class, introduce an abstract method end Of Month with no implementation. Rename the add Interest and deduct Fees methods into end Of Month in the subcla ...

Assume router r2 in figure 1835 receives a packet with

Assume router R2 in Figure 18.35 receives a packet with destination address How is the packet routed to its final destination?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro