COMP 220 Devry Course Tutorial / comp220dotcom

providing accessible, easy to understand

COMP 220 Entire Course (Devry)

For more course tutorials visit

www.comp220.com

COMP 220 iLab 1 Two-Dimensional Arrays Lab Report and Source Code

COMP 220 iLab 2 Resistor Lab Report and Source Code

COMP 220 iLab 3 Bank Account Lab Report and Source Code

COMP 220 iLab 4 Composition Lab Report and Source Code

COMP 220 iLab 5 Lab Report and Source Code

COMP 220 iLab 6 Overloaded Operators Lab Report and Source Code

COMP 220 iLab 7 Polymorphism Lab Report and Source Code

..............................................................................................................................................

COMP 220 iLab 1 Two-Dimensional Arrays Lab Report and Source Code (Devry)

For more course tutorials visit

www.comp220.com

BlackJack Table

Specification: Include a brief description of what the program accomplishes, including its input, key processes, and output.

There is always a dealer in the game. At the start of the game, the dealer’s first card will not be shown or displayed. The second card will be displayed. The dealer may draw additional cards. The dealer must use a random-number generator to determine the maximum number of cards the dealer will draw--a value between 0 and 3. In other words, the dealer is a computer player. The dealer does not show all the cards or the total until all the players have either gone bust (over 21) or hold (no more cards drawn). There must be at least one other player (you) and up to a maximum of four other players (all played by you).

. On a player’s turn, that player may either draw a card or hold. Once a player holds, he or she should not be asked to draw another card during this game.

All the cards for each player, including the first card dealt, are displayed, along with the suit symbol: spades , clubs , hearts , or diamonds . Each game will start with a new, 52-card deck, which is modeled on a real deck of cards.

..............................................................................................................................................

COMP 220 iLab 2 Resistor Lab Report and Source Code (Devry)

For more course tutorials visit

www.comp220.com

Scenario and Summary


This lab requires you to create a multifile C++ project in order to design and implement an object-oriented program using a class to model the characteristics and function of a resistor.

Deliverables

Submit a single Notepad file containing the source code for Exercise 1 to the Dropbox for Week 2. Your source code should use proper indentation and be error free. Be sure that your last name and the lab number are part of the file name; see the following example: YourLastName_Lab1.txt.

Each program should include a comment section that includes (at a minimum) your name, the lab and exercise number, and a description of what the program accomplishes. Submit a lab report (a Word document) containing the following information to the Dropbox for Week 2. Include your name and the exercise number. Specification: Include a brief description of what the program accomplishes, including its input, key processes, and output. Test Plan: Include a brief description of the method you used to confirm that your program worked properly. If necessary, include a clearly labeled table with test cases, predicted results, and actual results. Summary and Conclusions: Include a summary of what the lab demonstrated and any conclusions drawn from the testing of the lab program. Answers to Lab Questions: Answer any and all lab questions included in the lab steps.

..............................................................................................................................................

COMP 220 iLab 3 Bank Account Lab Report and Source Code (Devry)

For more course tutorials visit

www.comp220.com

This lab introduces you to writing a C++ program to implement the concept of class inheritance using different types of bank accounts as a model. In this lab, you will create a base class, called CBankAccount, and two additional classes (each derived from CBankAccount), called CSavingsAccount and CCheckingAccount. You will then test the operations of each class in function main() to simulate the transactions of both a checking account and a savings account.

Deliverables

Submit a single Notepad file containing the source code for all the files of the lab to the Dropbox for Week 3. Your source code should use proper indentation and be error free. Be sure that your last name and the lab number are part of the file name: for example, YourLastName_Lab3.txt.

..............................................................................................................................................

COMP 220 iLab 4 Composition Lab Report and Source Code (Devry)

For more course tutorials visit

www.comp220.com

This lab requires you to use C++ class composition to implement a single pole-filter design program. The program will allow the user to specify resistor and capacitor values and filter type.

Once all the user parameters are specified, the program will return the cutoff frequency values for the filter. Composition may be thought of as a has-a relationship for objects, as compared to inheritance, which may be described as an is-a relationship for objects.

You are required to use two component classes: one for a resistor object and one for a capacitor object. You are then to define and implement a filter class that will contain one object of each the resistor and the capacitor classes in order to create the filter and its characteristics.

..............................................................................................................................................

COMP 220 iLab 5 Lab Report and Source Code (Devry)

For more course tutorials visit

www.comp220.com

Assignment: Lab 5 Pointers and Pointer Operators

Description: This lab will explore the use of pointers in several ways. Pointers will be used to dynamically allocate memory for new class objects on demand from the user, and they will be used to access class-member functions. Pointer arithmetic will be used to access and sort class objects according to criteria explained in the lab.

Pointers are, essentially, address variables, or variables that hold as their value the address of other variables. In terms of memory management, they are very powerful devices, and they more closely and efficiently use the actual internal hardware registers of the microprocessor that the program operates on.

Pointers also have the requirement that the pointer type must be of the same data type as the variable, or the data that it points to or holds the address of. The power of pointers also hints at the potential complexity of their use, which is why this lab is focused almost entirely on several different aspects and uses of pointers. The lab also introduces pointer arrays and pointers to pointers.

..............................................................................................................................................

COMP 220 iLab 7 Polymorphism Lab Report and Source Code (Devry)

For more course tutorials visit

www.comp220.com

Assignment: Lab 7 Polymorphism

Description: This lab introduces students to the concepts of polymorphism, early binding, late binding, abstract classes, and virtual class functions. This will be done in the context of performing calculations on basic geometrical shapes. Polymorphism is a very powerful extension of inheritance, and by using pointers to the base class, it allows access to derived class objects and their functions based on the context that they are called in.

The lab will require the creation of a base geometric class, called Shape, and two sub classes, Circle and Rectangle, that are derived public from the class Shape. From there, objects of both the Circle and the Rectangle classes will be created, as will an array of pointers to the base class Shape. By using the instantiated objects and the object pointers, both static and dynamic binding will be demonstrated.

..............................................................................................................................................

Comment Stream