Ask Question, Ask an Expert


Ask Computer Engineering Expert

In an advanced country, a point system is maintained to keep track of erring drivers, and vehicle owners. The objective for this lab is to come up with software to keep track of penalties incurred by the drivers, and help decide those drivers whose driving license should be revoked.

Each driver is assigned an initial score of ten. Every minor offense (parking ticket, over speeding, under speeding, etc.) will be awarded a penalty of -1. Every major offense (drunk driving, reckless driving, and accidents) will be awarded a penalty of -5.  If a driver's score becomes 0 or negative, his/her license will be revoked.

For this problem, it is assumed that the owner of the car is always going to be driving the car. The list of offenses is provided as a text file containing the vehicle number and the nature of offense (Minor, Major). The list of drivers along with their UID and license number is available as input in a file named drivers.txt. A file named owners.txt maps the vehicle number to the UID of the owner. For the sake of simplicity, license number is a 10-digit integer, and vehicle number contains 3 characters followed by 4 digits. UID is a unique identifier provided to every citizen in the country, and it contains 12 digits.

The data structures to be used, the file format for various files and the general step-by-step process for this lab’s task are being stated in the remainder of this document.

 Data structures to be used:

A) Vehicle: This contains the list of all vehicles along with the vehicle number and UID of owners, with UID as the key.  Vehicle is maintained as a dynamic list.

B) Drivers: This represents the dynamic list of the tuples (license number, UID, score).

C) RevokeList: This list contains the current list of revoked drivers in the form of tuple (license number, vehicle number, UID).

File Formats:

The file format for the input files is as follows:



For ex:


 The file format for owner.txt is as follows:

Note: There is no space between number of items and item name. End Note.

For ex:


 The file format for offenses.txt is as follows


For ex:

DNA1423 1

KAS1002 0

BEL1923 0

KAS1002 1

Note that 0 indicates Minor offense here, and 1 indicates a major offense.

Step 1: Identify appropriate data structures relevant for the problem and prepare them in Offense.h

Step 2: Design Offense ADT with the following operations (OffenseOps.h). The relevant operations are:

i) populateVehicles: This function reads input from file and populates its content in the Vehicles list in lexicographic order of vehicle numbers. It then returns the populated list.

ii) populateDrivers: This function reads input from file  and populates its content in the Drivers list in non-decreasing order of UIDs. It then returns the populated list.

iii) updateOffenses: This function reads the contents of the file containing offenses. It looks up the Vehicle list to find the UID of owner. Using the UID, it looks up the license number of the driver. It then updates the score in the corresponding tuple in the drivers list.

iv) markRevokedDrivers: This function identifies all drivers whose license needs to be revoked, and puts them in the file named revoke.txt

v) Add prototypes in OffensesOps.h

You might need the following support functions:

a)  insertVehicle: this function inserts a row of vehicle details in order

b)  insertDriver: this function inserts a row of driver details in order

c) lookupUID: search for a UID from the Vehicles list given the vehicle number, and return it.

d)  lookupVehicle: search  for  a vehicle number from the  Vehicle List given the  UID of the owner and return it.

e)  lookupDriverDetails: search  the Drivers list based on UID,   and return the index of the entry containing that UID.


Step 3: Implement the above operations in the corresponding c files

·         All relevant code must go to OffensesOps.c

·         All list creations must have filename as a parameter.

 Step 4:  driver file.

Create a simple driver file (revoke.c) that can read multiple input files corresponding to the various input files. The names of input files are passed as command line parameters.  Note that if no input file is passed, the program should attempt to run with drivers.txt, owners.txt and offenses.txt for the relevant input set.

The executable revoke generates output files revoke.txt that will contain the list of drivers (license number, UID, vehicle number) whose license is to be revoked.

For the purposes of testing, you may implement some functions to print the data structures or other test data.

But all such functions must be commented before submission to server.

Deliverables: All relevant header files, OffenseOps.c, revoke.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M986

Have any Question? 

Related Questions in Computer Engineering

Read the raygen company slumcase study and write an essay

Read the " Raygen Company Slum "case study and write an essay that describes how you would handle the situation. You essay should incorporate the leadership skills learned this week as well as challenges that many leader ...

Compare electric car telsa semi electric hybrid car toyota

Compare electric car Telsa, semi electric (hybrid car) Toyota Prius, and regular fuel efficient cars Toyota Corolla / Honda Civics How long does it take to re charge a Telsa, how long can Telsa travel, where can you rech ...

1 discuss two lan technologies that are not ethernet or

1. Discuss two LAN technologies that are NOT Ethernet or token ring. 2. Why is Ethernet technology more appealing to users than the rest of the LAN technologies? 3. What do you think are the weak points of TCP/IP? 4. Dis ...

Write a program lotteryprinter that picks a combination in

Write a program LotteryPrinter that picks a combination in a lottery. In this lottery, players can choose 6 numbers (possibly repeated) between 1 and 49. (In a real lottery, repetitions aren't allowed, but we haven't yet ...

Zonealarm is a pc-based firewall and idps tool visit the

ZoneAlarm is a PC-based firewall and IDPS tool. Visit the product manufacturer at, and find the product specification for the IDPS features of ZoneAlarm. Which of the ZoneAlarm products offer these featu ...

1 using the window method and a nonkaiser window design a

1. Using the window method and a nonKaiser window, design a digital highpass filter with Ω s = 0.45π, Ω p = 0.5π, and α s = 60 dB 2. Using the window method with a Blackman window, design a length Lh = 11 digital bandpas ...

A read hit occurs in way2 of set 17 within an 8-way set

A read hit occurs in way2 of set 17 within an 8-way set associative cache that uses a line size of 128 bytes. The total number of lines in the cache is 32768. The system employs 32-bit addresses and the tag for way2 with ...

1 what are the primary objectives of the internal

1. What are the primary objectives of the internal monitoring domain? 2. What is the objective of the planning and risk assessment domain of the maintenance model? Why is this important?

Repeat exercise p27 but apply the darker method twice to

Repeat Exercise P2.7, but apply the darker method twice to the object Color.RED. Call your class DarkerDemo. Exercise P2.7 In the Java library, a color is specified by its red, green, and blue components between 0 and 25 ...

Describe the importance of information security for an

Describe the importance of information security for an organization, supporting with evidence. How could a lack of security affect not only consumers,but a company as well? Summarize two key information security practice ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro