Premium Essay

Pt1420 Unit 2 Assignment 1: Homework

In: Computers and Technology

Submitted By monickie04
Words 251
Pages 2
Short Answer:

1.) The first thing a programmer usually does first in programming is design flowcharts and pseudocode which will help with process.
2.) Pseudocode code is a fake code used as a model for programs; it has no syntax rules and is well written making it easy to translate to actual codes.
3.) Computer programs typically perform a three step process 1 input is received, 2 some process is performed on the input, 3 output is produced.
4.) “User-friendly” is commonly used in the software business to describe programs that are easy to use.

Algorithm Workbench:

1.)

1 Display “Height”
2 Input height
3 Display “here is the height that you entered:”, height

2.)

1 Display “Favorite color”
2 Input favorite color
3 Display “Here is your favorite color you entered:”, color

Programming Exercises:
1.) Personal Information
1 Display “Name”
2 Input Name
3 Display “Here is the name you have entered:”, name
4 Display “Address with city, state, and ZIP”
5 Input address with city, state, and ZIP
6 Display “This is the address you have entered:”, address with city, state, and ZIP
7 Display “Telephone number”
8 Input telephone number
9 Display “This is the telephone number you have entered:”, telephone
10 Display “College Major”
11 Input college major
12 Display “This is the college major you have entered:”, college major

4.) Total Price
1 Display “enter the items original price”
2 Input originalPrice
3 Set SalePrice = OriginalPrice * 0.06
4 Display “the sale price is $”,…...

Similar Documents

Free Essay

Unit 1 Assignment 2

...Unit 1 Assignment 2 The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas closer and implement some......

Words: 275 - Pages: 2

Premium Essay

Pt1420 Unit 8 Assignment 1: Homework

...instructions in a computer program which loops endlessly. Example of an infinite loop: Set k = 1 While k < = 5 Display k End While 7. A FOR loop looks like what other loop in a flowchart? A For loop looks like a count-controlled loop. 8. Why is it critical that accumulator variables are properly initialized? An accumulator is used to keep a running total of numbers. In a loop, a value is usually added to the current value of the accumulator. If it is not properly initialized, it will not contain the correct total. 9. What is the advantage of using a sentinel? The advantage of using a sentinel is that when you are processing a long list of values with a loop a sentinel marks the end of a list of items. There is no limit to how many times a loop can execute. 10. Why must the value chosen for use as a sentinel be carefully selected? The value of a sentinel needs to be carefully selected because it can’t be mistaken as a regular value in the list. Algorithm Workbench: 3. // Declare a counter variable. Declare Integer // Constant for the maximum value Constant Integer MAX_VALUE = 100 //Display the multiples of 10 from 0 through 100 For counter = 0 to MAX_VALUE Display counter End For   4. //Declare Integer number Declare an accumulator variable Declare Integer total = 0 Declare Integer counter For counter = 1 to 10 Display “Enter a number.” Input number Set total = total + number End......

Words: 303 - Pages: 2

Free Essay

Unit 2 Assignment 1

...IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions (authorization) granted to each Security Group or Individual User. The permissions mentioned in the previous paragraph are rights that a user is allowed to access, create, modify, or delete the file(s) inside a file folder, or objects. These are all permissions (authorizations) controlled by the Authorized Windows Security Personnel of the file structure. We will list some examples of how this outlined and what the impact would be, but first understand that requirements for the permissions is controlled from the Group Level, other than by Individual User, because it is easier to control from a security standpoint when you want to modify these abilities. There are four folders created (D:\ERPdocuments, D:\ERPdocuments\HRfiles, D:\ERPdocuments\SFfiles, D:\ERPdocuments\MGRfiles) which we want to allow specific permissions for certain functions (tasks). For example; by modifying the permissions under the specific user account for HRmanager to include...

Words: 436 - Pages: 2

Premium Essay

Unit 2 Assignment 1 Pt1420

...Unit 2 Assignment 1: Homework Kenneth D. Davis Intro to Programming Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Interview the customer 2. What is pseudocode? Fake Code 3. Computer programs typically perform what three steps? 1. Input is received. 2. Some process is performed on the input. 3. Output is produced. 4. What does the term “user- friendly” mean? The term user- friendly is commonly used in the software business to describe pro-grams that are easy to use. Programs that do not display adequate or correct instruc-tions are frustrating to use, and are not considered user- friendly. One of the simplest things that you can do to increase a program’s user- friendliness is to make sure that it displays clear, understandable prompts prior to each statement that reads keyboard input. 5. What two things must you normally specify in a variable declaration? You must specify the variable type and an identifier 6. What value is stored in uninitialized variables? Some languages assign a default value as 0 to uninitialized variables. In many languages, however, uninitialized variables hold unpredictable values. Algorithm Workbench 1. Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height. Set height = 72” Display ‘Enter your Height at Age 21’ Input hEIGHT Display ‘Enter your Height at Age 22’ Input......

Words: 458 - Pages: 2

Premium Essay

Unit 3 Assignment 1: Homework

...Dr. Davis PT1420 26 June 2014 Unit 3 Assignment 1: Homework 5. Write a pseudo code statement that declares the variable cost so that so that it can hold real numbers. a. declare real cost 6. Write a pseudo code statement that declares the variable total so that it can hold integers. Initialize the variable with value zero. a. Declare real price = 0.00 display “the original price” input items original price display “price” 3. Write assignment statements that perform the following operations with variables a, b and c. a. set b = a+2 b. set a = b*4 c. set b = a/3.14 d. set a= b-8 7. Write a pseudo code statement that assigns the value 27 to the variable count. A count: = 27 8. Write pseudo code statement that assigns the sum of 10 and 14 to the variable total. a. declare integer total set total = 10+14 display total 9. Write a pseudo code statement that subtracts the variable down payment from the variable total and assigns the result for the variable due. a. declare integer down payment declare integer total declare integer due set due = total – down payment display “down payment “ input down payment 10. Write a pseudo code statement that multiplies the variable subtotal by 0.15 and assigns the result to the variable total fee a. declare real subtotal declare real totalfee set totalfee subtotal * 0.15 display “subtotal” input subtotal display totalfee 4. Assume the variable result,...

Words: 550 - Pages: 3

Premium Essay

Pt1420 Unit 1 Assignment 1 Homework

...Everything that a computer does is controlled by some kind of software. There are 2 general types of software that computers use, system software and application software. The typical hardware associated with a computer includes but are not limited to input devices such as mice, keyboards and webcams. Output devices like monitors, speakers and printers and your different types of memory (CPU, RAM, SSDs.) The computer’s data storage process consists of tiny electrical power charges in microscopic capacitors. When a computer is turned off the capacitors that your data is stored on lose their charge which is why computer memory goes blank when it is off. For data that is stored for longer periods of time, it is stored as a magnetic pattern on a spinning disk. A program is a set of instructions that a computer follows in order to perform a task. A program is run by the computer’s CPU or Central Processing Unit. Each instruction in a program tells the CPU to perform a specific operation. Machine Language: Language that CPU understands. It is always written in binary. Assembly Language: Language that consists of short words known as mnemonics. It was created because it was impractical for people to write programs in machine language. High-Level Language: Allows people to create powerful and complex programs without knowing how the CPU works, and without writing large numbers of low-level instructions. Compiler: Program that translates a high-level language into a......

Words: 287 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to......

Words: 414 - Pages: 2

Free Essay

Unit 2 Assignment 1 : Homework

...Short Answer 1. A professional programmer usually begins by creating a design of the program to gain an understanding of the problem. 2. Pseudocode is a fake code. 3. The three steps that the computer programs typically perform are input is received, some process is performed on the input, and output is produced. 4. “user friendly” means programs that are easy to use. Algorithm Workbench 1. Display “What is your height?” Input height Display “Here is the height you entered:” Display height 2. Display “What is your favorite color?” Input color Display “Here is the color you entered:” Display color Programming Exercise 1.Personal Information Display “What is your name?” Input name Display “What is your address, city, state, and zip?” Input address, city, state, zip Display “What is your telephone number?” Input telephoneNumber Display “What is your college major?” Input collegeMajor Display name,address,city,state,zip,telephoneNumber,collegeMajor 2. Sales Prediction Display “Enter the projected amount of total sales” Input totalSales Set dollars =0.23 Display totalSales*setdollars 3. Land Calculation Display “Enter total square feet of land” Input squareFeet Set 43,560 == one acre Declare / squareFeet by 43,560 to get acres 4 Total Purchase Display “What is the price of this item” Input price Display “What is the price of item 2” Input price 2 Display “What is the price of item 3” Input......

Words: 264 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...Introduction to Networking Unit 2: Assignment 1 Indentifying Network Topologies Identify the major needs and major stakeholders for computer networks and network applications. The major stakeholders for computer networks and network applications are the ones who use it or relay on it to do business. The main stakeholders are the ones who uses the network or applications to get their work done for their company. The next stakeholder is the company or people who rely on the first company to get what they need. The ones who design the applications or the network are stakeholders in the fact they need to make sure their work is done properly so others can do their job. The owners are also stakeholders in the fact that others rely on their people and software to get their work done. Then there is the end-users who are also stakeholders because we need the network and applications to do our daily job. Identify the classifications of networks and how they are applied to various types of enterprises. PAN (Personal Area Network)—personal. You as an individual and the range is around that person LAN (Local Area Network)—network of interconnected computers within a small geographic area. Area of LAN’s are a room, building or group of buildings, offices, schools. The range is 10m – 1km MAN (Metropolitan Area Network)—a network design for a town or a city. The range is about 10km.Examples would be London, England or Geneva, Switzerland, WAN (Wide Area Network—a network that......

Words: 289 - Pages: 2

Free Essay

Unit 2 Assignment 1

...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is......

Words: 274 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to......

Words: 413 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...10/ 1/ 2014 NT2580 Unit 2 assignment 1 The workgroup consists of three primary workgroups, which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch. To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation: First it is important to understand the variables considered in this timeline formula. The WoV is the period within which defensive measures are reduced, compromised, or lacking. The WoV covers a timeline from the moment vulnerability is discovered and identified by the vendor. It also includes the time taken to create, publish, and finally apply a fix to the vulnerability. It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within...

Words: 286 - Pages: 2

Premium Essay

Unit 2 Assignment 1: Homework

...Short Answers Page 71 1. What does a professional programmer usually do first to gain an understanding of a problem? They begin by creating a design of the program. 2. What is pseudocode? Programs used during the design process 3. Computer programs typically perform what three steps? Input process output 4. What does the term “user-friendly” mean? Programs that are easy to use Algorithm Workbench 1. Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height. 1. Dim Height As Double 2. Console.writeline(“Enter your Height:”) Save height as 3. Height = Console.readline() 4. Console.writeline(“Your Height Is: “ & Height) 5. Console.writeline(“Press Enter To Close.”) 6. Console.writeline() 2. Design an algorithm that prompts the user to enter his or her favorite color and stores the user’s input in a variable named color. 1. Dim Color As Double 2. Console.write(“Enter Your Favorite Color:”) Save color as 3. color = Console.readline() 4. Console.writeline(“Your Favorite Color Is: “&color) 5. Console.writeline(“Press Enter To Close.”) 6. Console.readline() Programming Exercises 1. Personal Information Design a program that displays the following information: Your name Your address, with city, state, and ZIP Your telephone number Your college major Dim Color As Double Console.write(“Enter Your Name:”) Name = Console.readline() Console.write (“Enter your......

Words: 441 - Pages: 2

Free Essay

Unit 2 Assignment 1

...NT1310 Week 2 – Unit 2 Assignment 1 Service Provider Types There are five different types of telecommunication types to date. First of which is RBOC – (regional bell operating company) which was a telephone company created as a result of the breakup of AT&T. The seven original regional Bell companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. The reason why this was so important was because these companies are what provided local telephone service while AT&T provided the long distance phone service. These are what made up the Local Exchanges or the LEC’s. ILEC or incumbent local exchange carrier was a telephone provider that provided local service prior to the telecommunications act of 1996. These play a major role because these carriers are what own the local loops/exchange and facilities in that area. CLEC’s are the exact same thing except they are the competitor to the ILEC’s but provided their own networking and switches for local service. MSO or Multi system Operator – is owner of multiple cable and satellite television systems. This ties into what an ISP is. An ISP is simply and Internet service provider that provides a mean for accessing the internet. MSO is majorly known for being cable companies, because of this cable companies are providing internet to cable customers (usually as bundles with their plan). They work within each other because......

Words: 314 - Pages: 2

Free Essay

Pt1420 Unit 6 Assignment 1

...Week 06 Assignments Textbook Reading * Chapter 4 * Chapter 5 sections 5.1, 5.2, and 5.3 (pages 196-201) Week 06 Homework From the Gaddis textbook: * Programming Exercises 2, 6 and 9, on pages 160-161 For the Programming Exercises, design a program means write the pseudocode for the program. Except for Programming Exercise 2, your design should include multiple modules, not just main(). Upload a Microsoft Word document with the pseudocode to your shared PT1420 community website or submit a paper copy to your instructor by the beginning of the Week 7 class. Programing Exercises pg. 160-161 2. Areas of rectangles Module Main() Declare width1 integer = 0 Declare length1 integer = 0 Declare width2 integer = 0 Declare length2 integer = 0 Declare area1 integer = 0 Declare area2 integer = 0 Call rectangle1 (width1, length1, area1) Call rectangle2 (width2, length2, area2) Call comparison (rectangle1, rectangle2) Display “press enter to continue” End module Module rectangle1 (value width1 as integer, value length1 as integer, value area1 as integer) Display "Enter the width of rectangle 1” Input width1 Display "Enter the length of rectangle 1" Input length1 area1 = width1 * length1 End module Module rectangle2 (value width2 as integer, value length2 as integer, value area2 as integer) Display "Enter the width of rectangle 2” Input width2 Display "Enter the length of rectangle 2" Input length2 area2 = width2 * length2 End......

Words: 764 - Pages: 4