...Department of Information Technology ENDT200: Introduction to Programming Credit Hours: 3 Length of Course: 8 Weeks Prerequisite(s): None | Table of Contents | Instructor Information | Evaluation Procedures | Course Description | Grading Scale | Course Scope | Course Outline | Course Objectives | Policies | Course Delivery Method | Academic Services | Course Resources | Selected Bibliography | Instructor Information | Instructor: Jason T. Black, PhD (also called “Dr. B”) Email: Use the Messages feature in the classroom to email me. Table of Contents Course Description (Catalog) | This course introduces students to writing computer programs. The class presents the principles of structured programming using the BASIC language, perhaps the most common language for personal computers. Because of its ease of use it is ideal as a first programming language and runs on both the PC and Macintosh platforms. The course is designed for people without previous programming experience who do not necessarily plan on becoming professional programmers. However, the knowledge gained in the class can be applied later to other languages such as C and Java. Participants learn to solve problems logically by breaking them into smaller pieces, which can then be solved. Topics include: introduction to computing - how does a computer work?; input and output - getting information to and from the user; variables and expressions - performing arithmetic; data...
Words: 2708 - Pages: 11
...hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750...
Words: 4400 - Pages: 18
...hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750...
Words: 4400 - Pages: 18
...goals, overall structure, and approach of this tenth edition of Concepts of Programming Languages remain the same as those of the nine earlier editions. The principal goals are to introduce the main constructs of contemporary programming languages and to provide the reader with the tools necessary for the critical evaluation of existing and future programming languages. A secondary goal is to prepare the reader for the study of compiler design, by providing an indepth discussion of programming language structures, presenting a formal method of describing syntax and introducing approaches to lexical and syntatic analysis. The tenth edition evolved from the ninth through several different kinds of changes. To maintain the currency of the material, some of the discussion of older programming languages has been removed. For example, the description of COBOL’s record operations was removed from Chapter 6 and that of Fortran’s Do statement was removed from Chapter 8. Likewise, the description of Ada’s generic subprograms was removed from Chapter 9 and the discussion of Ada’s asynchronous message passing was removed from Chapter 13. On the other hand, a section on closures, a section on calling subprograms indirectly, and a section on generic functions in F# were added to Chapter 9; sections on Objective-C were added to Chapters 11 and 12; a section on concurrency in functional programming languages was added to Chapter 13; a section on C# event handling was added to Chapter 14;. a section...
Words: 7025 - Pages: 29
...[pic] |Leadership and Organizational Behavior – BUS 520 | |Student Course Guide | |Prerequisite: None | |Quarter |Fall 2010 | |Meeting Days/Time |Wednesday 6pm-10pm | |Instructor |Karmetria Burton | |Instructor Phone |678 362 0842 | |Instructor E-mail |Karmetria.burton@strayer.edu | |Instructor Office Hours/Location |5-6 pm Wednesdays or by appointment | |Academic Office Phone Number | | |INSTRUCTIONAL MATERIAL - Required ...
Words: 7940 - Pages: 32
...Review for Exam 1 Chapters 1-4 Chapter 1 |1. |An information system can be defined as: | |A) |An organized combination of people, hardware, software, communications networks, and database resources. | |B) |As a system that collects, transforms, and disseminates information in an organization. | |C) |Is composed of hardware, software, networks, and data resources. | |D) |All of the above would apply to the definition of an information system. | | |Ans: D | |2. |In the internetworked E-business enterprise, an extranet refers to: | |A) |A network inside the enterprise. | |B) |A network between an enterprise and its trading partners. | |C) |A local area network within the enterprise. | |D) |A wide area network within the enterprise. ...
Words: 1030 - Pages: 5
...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...
Words: 5050 - Pages: 21
...Act 359 final exams Chapter 9 Introduction to internal control systems Internal controls: the controls established to protect the assets of an organization. Internal control: describes the policies, plans, and procedures implemented by the management of an organization to protect its assets, to ensure accuracy and completeness of its financial information, and to meet its business objectives. Four objectives of internal control system: 1. Safeguard assets, 2. Check the accuracy and reliability of accounting data, 3. Promote operational efficiency, 4. Enforce prescribed managerial policies. Sarbanes Oxley Act of 2002 piece of legislation with respect to internal controls Section 404: reaffirms management is responsible for establishing and maintaining an adequate internal control structure. 1992 Coso report: established common definition of internal control for assessing control system, as well as determined how to improve controls. An internal control system should consist of the five components: 1. The control environment 2. Risk assessment 3. Control activities 4. Information and communication 5. Monitoring Control environment: foundation for all other internal control components and provides discipline and structure. Top management oversight, integrity, and ethical principles that guide the organization Risk assessment: identify organizational risks, analyze their potential in terms of costs and likelihood of occurrence, and implement only those...
Words: 1409 - Pages: 6
...DESIGN PROJECT 1 : MINOR PROJECT TRS3242 : VISUAL COMMUNICATION PROJECT I TRS3152 : PROJECT I Introduction Project is a compulsory part of the program structure in Bachelor in Information and Communication Technology, Bachelor in Creative Multimedia, Bachelor in Graphic Design, Bachelor in Game Design and Animation, Bachelor in Media Science and Bachelor in Visual Communication. It builds on the skills and knowledge learned in the first two and half years; to enable students to use these to demonstrate competence in the theory and practice based on their respective programs. Aims of Project The main aims of this project are: 1. To provide students with a realistic group experience in designing, implementing and documenting computer, multimedia, and graphics products in the form of applications, systems, design, etc. based on the needs of clients/stakeholders. 2. To let students apply their knowledge and skills in handling tasks with appropriate tools. 3. To provide a learning environment for students to independently manage their projects under supervision. 4. To build students’ ability to present and rationalize their work with confidence and logics. 5. To enable the students to delegate tasks and work as a team, and manage their project time and budget accordingly. General proposal format: 1. Paper Size Type Color 2. Type Face Font Size Title Font Spacing : : : A4 80 gm papers White : : : : Arial, or Times New Roman 12 pt Capital Letter Double spacing 3. Page Numbering...
Words: 1888 - Pages: 8
...COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE EIGHTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 Library of Congress Cataloging-in-Publication Data On File Vice President and Editorial Director: Marcia J. Horton Editor-in-Chief: Michael Hirsch Executive Editor: Tracy Dunkelberger Associate Editor: Melinda Haggerty Marketing Manager: Erin Davis Senior Managing Editor: Scott Disanno Production Editor: Rose Kernan Operations Specialist: Lisa McDowell Art Director: Kenny Beck Cover Design: Kristine Carney Director, Image Resource Center: Melinda Patelli Manager, Rights and Permissions: Zina Arabia Manager, Visual Research: Beth Brenzel Manager, Cover Visual Research & Permissions: Karen Sanatar Composition: Rakesh Poddar, Aptara®, Inc. Cover Image: Picturegarden /Image Bank /Getty Images, Inc. Copyright © 2010, 2006 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of...
Words: 239771 - Pages: 960
...Selection and Repetition Control Structures PRG 210 March 30, 2011 John Rogers Selection and Repetition Control Structures Introduction This paper reviews and explains selection control structure and repetition control structure. Selection and repetition control structures increase the ability and power of a computer programs. Selection control structure allows statement execution if a condition is true and another statement execution if a condition is false. Repetition control structure or looping is the process of repeating execution of one or more steps of an algorithm or computer program. Essentially in programming, many performed calculations have repetitious tasks. Examples of both a selection control structure statement and a repetition control structure statement identifies and helps understand the importance of available computer operations to the programmer to compare variables, select one of two actions and repeat tasks as necessary. Selection Control Structure Statement executions in programming are under the control of one statement at a time. When statements execute, control is turned over to the next statement similar to running a relay race; one runner passes the baton to the next runner until the result of the baton across the finish line. When one statement finishes executing, control passes to the next statement until the desired output calculates. Computer programs use selection control structures to choose between alternative actions...
Words: 1277 - Pages: 6
...1 2 Acknowledgements p.1 tr ©iStockphoto.com/Dennys Bisogno, etc t = top, b = bottom, l = left, r = right, c = centre Computer hardware and software brand names mentioned in this book are protected by their respective trademarks and are acknowledged. Scratch is developed by the Lifelong Kindergarten Group at the MIT Media Lab. See http://scratch.mit.edu Every effort has been made to trace all copyright holders, but if any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity. Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web page by typing in the address of the home page for a website in the URL window of your browser. Photo credits p.1 © peno – Fotolia; p.15 © Dmitrydesigner/Fotolia; p.16 ©iStockphoto.com/Karl Yamashita; p.57 © Romanchuck – Fotolia; p.58 t © C Squared Studios/Photodisc/Getty Images, m ©Dmitriy Melnikov - Fotolia.com, b © Popova Olga/Fotolia; p.59 © picsfive – Fotolia; p.65 © Manfred Schmidt – Fotolia.com; p.67 © dja65 – Fotolia; p.68 © Konstantin Shevtsov – Fotolia; p.69 t © Miguel Navarro/Stone/Getty Images, b © Piero Cruciatti/Alamy; p.73 © Jamdesign/Fotolia; p.78 and 79 © adisa – Fotolia; p.81 © Mykola Mazuryk – Fotolia; p.82 t © Mauro Rodrigues/Fotolia...
Words: 49691 - Pages: 199
...RESEARCH INSTITUTE FOR DECISION AND INFORMATION SYSTEMS Schematic Evaluation of Internal Accounting Control Systems by Kuo-Tay Chen and Ronald M. Lee Monograph No. RM-1992-08-1 (August 11, 1992) EURIDIS Research Monograph Erasmus University Rotterdam, The Netherlands © Kuo-Tay Chen and Ronald M. Lee Permission to copy this monograph without fee is granted provided that (1) the copies are not distributed for the direct commercial purpose and (2) this copyright page including the copyright notice, the EURIDIS monograph number, and date appear. TABLE OF CONTENTS CHAPTER 1. INTRODUCTION ...................................... 1 1.1 BACKGROUND .......................................... 1 1.2 MOTIVATION ............................................. 3 1.3 OBJECTIVE OF THE STUDY .......................... 4 1.4 ISSUES OF INTEREST .................................. 6 1.5 SCOPE OF THE STUDY................................. 7 1.6 CONTRIBUTIONS OF THE STUDY .................. 8 CHAPTER 2. DECISION AIDS RESEARCH FOR INTERNAL CONTROL EVALUATION ............................................ 9 2.1 A REVIEW OF PAST APPROACHES................. 9 2.1.1 MATHEMATICAL MODELING ............ 9 2.1.2 SIMULATION ................................. 12 2.1.3 EXPERT SYSTEMS .......................... 14 2.1.4 OTHER COMPUTER DECISION AIDS . . . 15 2.2 SCHEMATIC EVALUATION - THE PROPOSED APPROACH .................................................... 16 2.2.1 SCHEMA-BASED REASONING .......... 16...
Words: 32893 - Pages: 132
...STARTING OUT WITH Python ® Second Edition This page intentionally left blank STARTING OUT WITH Python ® Second Edition Tony Gaddis Haywood Community College Addison-Wesley Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Editor-in-Chief: Editorial Assistant: Vice President, Marketing: Marketing Manager: Marketing Coordinator: Vice President, Production: Managing Editor: Production Project Manager: Manufacturing Buyer: Art Director: Cover Designer: Cover Image: Media Editor: Project Management: Composition and Illustration: Printer/Binder: Cover Printer: Marcia Horton Michael Hirsch Stephanie Sellinger Patrice Jones Yezan Alayan Kathryn Ferranti Vince O’Brien Jeff Holcomb Kayla Smith-Tarbox Lisa McDowell Linda Knowles Joyce Cosentino Wells/JWells Design © Digital Vision Dan Sandin/Wanda Rockwell Sherill Redd, Aptara®, Inc. Aptara®, Inc. Edwards Brothers LeHigh-Phoenix Color/Hagerstown Credits and acknowledgments borrowed from other sources and reproduced, with permission, appear on the Credits page in the endmatter of this textbook. Copyright © 2012, 2009 Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication...
Words: 76897 - Pages: 308
...Chapter 10 Review Questions 1. System architecture is the conceptual model that defines the structure and/or behavior of a system. It translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security. Scalability is a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems. 2. Before selecting the system architecture, the analyst must consider the following issues: Enterprise resource planning (ERP) Initial cost and (TCO) Scalability Web integration Legacy system interface requirements Processing options Security issues 3. Enterprise resource planning (ERP) defines a specific architecture, including standards for data, processing, network, and user interface design. It is important because it describes a specific hardware and software environment that ensures hardware connectivity and easy integration of future applications, including in-house software and commercial packages. ERP also can extend to suppliers and customers in a process called supply chain management. In a totally integrated supply chain, a customer order could cause a production planning system to schedule a work order, which in turn triggers a call for certain parts from one or more suppliers. 4. A server is a computer...
Words: 644 - Pages: 3