...Programming Logic and Design, 6th Edition Chapter 6 Exercises 1. a. Design the logic for a program that allows a user to enter 10 numbers, then displays them in the reverse order of their entry. Answer: A sample solution follows Flowchart: Pseudocode: start Declarations num index num SIZE = 10 num numbers[SIZE] = 0,0,0,0,0,0,0,0,0,0 getReady() while index < SIZE getNumbers() endwhile finishUp() stop getReady() index = 0 return getNumbers() output “Enter a number for position ”, index input numbers[index] index = index + 1 return finishUp() output “The numbers in reverse order are: ” while index > 0 index = index – 1 output numbers[index] endwhile return b. Modify the reverse-display program so that the user can enter up to 10 numbers until a sentinel value is entered. Answer: A sample solution follows Flowchart: Pseudocode: start Declarations num index num SIZE = 10 num numbers[SIZE] = 0,0,0,0,0,0,0,0,0,0 string CONTINUE = “Y” string moreNumbers = CONTINUE getReady() while index < SIZE AND moreNumbers equal to CONTINUE getNumbers() endwhile finishUp() stop getReady() index = 0 output “Do you want to enter a number? (Y/N)” input moreNumbers return getNumbers() output “Enter a number for position ”, index input numbers[index] index = index...
Words: 4366 - Pages: 18
...Assignment 2: Logical Design, Part 1 Due Week 2 and worth 50 points You have been hired by ACME Global Consulting to procure requirements for a large database. In developing database management systems, E-R models are used to graphically depict complex relationships between entities. In this assignment, you are to convince a set of clients of the benefits of using an E-R model in developing a database. Write a two to three (2-3) page paper in which you: 1. List the advantages of a relational model specific to ACME Global Consulting. 2. Summarize in your own words the purpose of an E-R model specific to ACME Global Consulting. 3. List and describe essential components of the model such as entities, attributes, keys, relationships, roles, and dependencies specific to ACME Global Consulting. 4. Describe the need for the enhanced E-R model and how we can create sophisticated models to help us in complex environments. 5. Outline and describe the advantage of using the relational model. 6. Create an E-R diagram using graphical depicting software that could theoretically be used in a restaurant application. Note: The graphically depicted solution is not included in the required page length. Acceptable software used to depict the solution includes any drawing tool, such as Microsoft Visio, Microsoft Paint, open source alternatives or similar drawing tools. You are free to formulate constraints, entities, attributes, etc. Potential entities may include but are not limited to customers...
Words: 449 - Pages: 2
...Austin Jones Ch. 2 Multiple Choice 1. A 2. A 3. D 4. B 5. A 6. C 7. C 8. A 9. B 10. D 11. B 12. A 13. C 14. A 15. D 16. B 17. B 18. C 19. D 20. A True or False 1. FALSE 2. TRUE 3. FALSE 4. TRUE 5. FALSE 6. TRUE 7. TRUE 8. TRUE 9. FALSE 10. FALSE Short Answer 1. Figure out what the user wants and how it can be mathematically solved. 2. pseudocode is "fake" code, or code without syntax 3. Sequence, Decision and Iteration 4. The program is easy for the user to navigate through and use. 5. the name and what kind of data type it will hold 6. nothing. Algorithim Workbench 1. Display “Height” Input Height Display “here is the height that you entered:” , height 2. Display “Favorite color” Input favorite color Display “Here is your favorite color you entered:” , color 3. b = a + 2 a = b * 4 b = a/3.14 a = b - 8 4. a. Set result = x + y b. Set result = z * 2 c. Set result = y / x d. Set result = y – z result = x++ - y; Answer -4 result = 4 – 8 = -4 result = ++w + y; Answer w = w + 1 = 5 + 1 = 6 result = 6 + 8 = 14 5. Declare Real price= 0.00 Display "the original price." Input item original price Display "price" 6. Declare Real price= 0.00 Display "the original price." Input item original price Display "price" 7. count := 27...
Words: 253 - Pages: 2
...12/11/2013 Digital Logic Design CSE-241 Unit 21 4-bit Asynchronous Counter: 2 Muhammad Usman Arif 12/11/2013 1 12/11/2013 MODULUS OF A COUNTER: The modulus of a counter is the number of unique states that the counter will sequence through. The maximum possible number of states (maximum modulus) of a counter is 2n. Where n is the number of flip-flops in the counter. TRUNCATED SEQUENCES: Counters can also be designed that have a number of states in their sequence that is less than the maximum of 2n.the resulting sequence is called a truncated sequence. Muhammad Usman Arif 3 12/11/2013 ASYNCHRONOUS DECADE COUNTER: To obtain a truncated sequence, it is necessary to force the counter to recycle before going through all of its possible states. For example, the BCD decade counter must recycle back to the 0000 state after the 1001 state. One way to make the counter recycle after the count of nine (1001) is to decode count ten (1010) with a NAND gate and connect the output the clear (CLR) input. 4 Muhammad Usman Arif 12/11/2013 2 12/11/2013 ASYNCHRONOUS DECADE COUNTER: 5 Muhammad Usman Arif 12/11/2013 PARTIAL DECODING: Notice in the figure that only Q1 and Q3 are connected to the NAND gate inputs. This arrangement is an example of partial decoding; in which the two unique states (Q1 = 1 and Q3 =1 ) are sufficient to decode the count of ten because none of the other states (zero through nine) have...
Words: 492 - Pages: 2
...Discussion Responses: My Teaching Philosophy My teaching philosophy is to make sure that each child gets a quality education. To what end: My objective as a teacher is to make sure that all students are focus and on task, so that they can learn. Also, it is important to instill in them the importance of getting an education. I would like to teach them their academic and much more. By what mean: In order to teach someone you have to be taught, I do not know of anyone that was born knowing everything. Therefore, my goal is to teach them to the best of my ability and know my job and know what I am doing. To what degree: After teaching an individual there will come a time that they will have to show what they know. A good way to find out that they are learning is to give an assessment or a test. In that instance I will start evaluating them by grading. Once I am done with the grading process, I will then know where I stand as their teacher and know where they stand as the student. Why: I feel that there need to be quality and educated trained teachers to work hard and get the job done. I have worked in the school system now for three years and I know it takes a good hearted person to be a teacher. Also, I feel that one should have love and compassion for which they are reliable for. When I do become a teacher I plan to make a difference in the education world. Zero Tolerance Policy The zero tolerance policy is definitely a great thing to have. I feel that...
Words: 388 - Pages: 2
...Programming Logic and Design, 6th Edition Chapter 2 Exercises 1. Explain why each of the following names does or does not seem like a good variable name to you. Answer: Answers will vary. A possible solution: a. | c | – | Valid, but probably too short to be descriptive | b. | cost | – | Good | c. | costAmount | – | Good, but redundant | d. | cost amount | – | Invalid, spaces aren’t allowed | e. | cstofdngbsns | – | Valid, but difficult to read | f. | costOfDoingBusinessThisFiscalYear | – | Valid, but long and awkward | g. | costYear2012 | – | Good | h. | 2012YearCost | – | Invalid, cannot start with a digit | 17 2. If myAge and yourRate are numeric variables, and departmentName is a string variable, which of the following statements are valid assignments? If a statement is not valid, explain why not. Answer: a. | myAge = 23 | – | Valid | b. | myAge = yourRate | – | Valid | c. | myAge = departmentName | – | Invalid, cannot assign string to numeric | d. | myAge = “departmentName” | – | Invalid, cannot assign string to numeric | e. | 42 = myAge | – | Invalid, cannot assign a value to a literal constant | f. | yourRate = 3.5 | – | Valid | g. | yourRate = myAge | – | Valid | h. | yourRate = departmentName | – | Invalid, cannot assign string to numeric | i. | 6.91 = yourRate | – | Invalid, cannot assign a value to a literal...
Words: 1719 - Pages: 7
...Programming Logic and Design, 6th Edition Chapter 5 Exercises 1. What is output by each of the pseudocode segments in Figure 5-22? Answer: a. 5, 22, 5 b. 4, 6, 7 c. 5, 6 d. Goodbye Goodbye Goodbye Goodbye Goodbye Goodbye Goodbye Goodbye Goodbye e. Hello Hello Hello f. Adios Adios Adios Adios Adios Adios Adios Adios 2. Design the logic for a program that outputs every number from 1 through 10. Answer: A sample solution follows Flowchart: Pseudocode: start Declarations num number housekeeping() number = 1 while number 99999 output “Please enter a valid zip code” input custZip endwhile return validateCustAge() while custAge < 10 OR custAge > 110 output “Please enter a valid customer age” input custAge endwhile return validateNumItems() Declarations num attempts = 0 num LIMIT = 2 validNumItems = 1 while (numItems < 1 OR numItems > 12) AND attempts < LIMIT output “Please reenter the number of items” input numItems attempts = attempts + 1 endwhile if attempts = 2 AND numItems < 0 then output “An invalid number of items was entered” output “This order will not be counted” validNumItems = 0 endif return housekeeping() output ZIP_PROMPT input custZip return detailLoop() output AGE_PROMPT input custAge output ITEM_PROMPT input numItems validateZipCode() validateCustAge() validateNumItems() ...
Words: 1493 - Pages: 6
...PT1420 Wk 3 Unit 3 James W. Norris, II April 14, 2013 What is reverse engineering? Ans: Reverse Engineering is taking apart an abject to see how it works in order to duplicate or enhance the object. This practice is frequently used on computer hardware and software. What are the advantages and disadvantages of using reverse engineering to discover the logics of a software program? Ans: Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a “bug” or error in the program.Hardware reverse engineering involves taking apart a device to see how it works. If a processor manufacturer wants to see how a competitor’s processor works, they can purchase a competitor’s processor, disassemble it, and then make a processor similar to it. Find any one tool available to perform reverse engineering of software programs. What are at least five features of that tool? Ans: One tool used is a hexadecimal dumper, which prints and displays the binary numbers of a program in hexadecimal format(which is easier to read than a binary format. Short Answer Questions: 5. What two things must you normally specify in a variable declaration? Ans: The variable’s name and the variable’s data type 6. What value is stored in uninitialized variables? Ans: zero Algorithm Workbench 3. Write assignment statements...
Words: 266 - Pages: 2
...Purpose: Calculate the result of a number raised to the power of another number input by the user using iterative logic without overflow of 32-bit integers## //Program start// START //declare variables // declare unsigned int base, exp, answer, errorInput, errorOutput Declare var string exit Global var constant int multiply = 1, maxValue = 2147483647 Set answer = 1 Set base = 1 Set exp = 1 // determine if input fits in unsigned 32 bit int and set exit sentinel // //welcome message// Display “This program will determine the value of an integer (X) raised to the power of a second integer (N).” WHILE exit !=n //set repeat of input if error message is flagged and reset error flags// DO SET errorInput = 0 Set errorOutput = 0 //user input prompts// Display “Please Enter first integer: “ Input base Display “Please enter second integer: ” Input exp IF (base,exp) >= maxValue THEN //error message// Display “ Error! Value exceeds maximum available input. Please enter a value less than 2147483647” SET errorInput = 1 END IF WHILE errorInput = 1 //perform calculation with iterative multiplication// //check for error outputs & unneccessary execution of loop// IF exp != 0 THEN FOR (errorOutput ! =1 && multiply maxValue THEN SET errorOutput = 1 END IF END FOR //end calculation and check for maximum value overflow...
Words: 266 - Pages: 2
...engineering as a method is not confined to any particular purpose, but is often an important part of the scientific method and technological development. The process of taking something apart and revealing the way in which it works is often an effective way to learn how to build a technology or make improvements to it. When reverse engineering software, researchers are able to examine the strength of systems and identify their weaknesses in terms of performance, security, and interoperability. The reverse engineering process allows researchers to understand both how a program works and also what aspects of the program contribute to its not working. • What are the advantages and disadvantages of using reverse engineering to discover the logics of a software program? Reverse engineering in software is reversing a program's machine code back into it's original source code. The advantages to using this technique is that one can repair certain bugs, see how a program operates, and improve the operation of the program. The disadvantage is that certain other bugs may be introduced during this process. • Find any one tool available to perform reverse engineering of software programs. What are at least five features of that tool? REC Studio 4 - Reverse Engineering Compiler Multihost: Rec Studio runs on Windows XP/Vista/7, Ubuntu Linux, Mac OS X. Symbolic information support using Dwarf 2 and partial recognition of Microsoft's PDB format. C++...
Words: 301 - Pages: 2
...10) return userNum End Function Algorithm Workbench #1 - #7, pp. 115-6 (continued) – Write pseudocode (not Java) 2. def main(): showvalue() def showvalue(): print '12' main() 3. The value stored in ‘a’ will be: 3 The value stored in ‘b’ will be: 2 The value stored in ‘c’ will be: 1 4. Declare Integer age Declare Real income Declare String name Call Module1 (agem Real_Income, Name) 5. 6. 7. Debugging Exercises, p.117 (3 pts. Ea. / 12 pts. Total ) 1. 2. 3. 4. Programming Exercises, (#1 - p.117) (10 points total) #1. Kilometer Converter Design a modular program that asks the user to enter a distance in kilometers, and the converts that distance to miles. The conversion formula is as follows: Miles = Kilometers * 0.6214 Additional Instructions: 1. Design using pseudocode. 2. Use the following module names: getKilometers – read kilometers from user keyboard input and store in ‘kilometers’ variable showMiles – accepts ‘kilometers’ variable as input argument and displays the equivalent value in miles Module main () Declare...
Words: 645 - Pages: 3
...1.2.1.AK Combinational Logic Design Introduction Combinational and sequential logic are the fundamental building blocks of digital electronics. Combinational logic, which is sometimes referred to as "combinatorial logic”, is characterized by its output being a function of the current input value. A variety of different logic gates can be used to implement combinational logic circuits. Many of these gates will be studied in future units of this course. In this introductory unit, we will limit our designs to AND, OR, and INVERTER gates for the sake of simplicity. In this activity you will use the Circuit Design Software (CDS) to build and test your first combinational logic circuits. Equipment * Circuit Design Software (CDS) Procedure Now it’s time for you to implement your first AOI combinational logic circuit. The circuit that we will use for this purpose is a Car Safety Buzzer design.The design specifications are as follows: The buzzer is on whenever the door is open or when the key is in the ignition and the seat belt is not buckled. 1. Create a table that describes these design specification in terms of “highs” (1) and “lows” (0). This is when the sensor or indicator is active or not active. Seat Belt | 0 = SEAT BELT NOT BUCKLED | | 1 = SEAT BELT BUCKLED | Key | 0 = KEY NOT IN THE IGNITION | | 1 = KEY IN THE IGNITION | Door | 0 = DOOR IS NOT OPEN | | 1 = DOOR IS OPEN | Buzzer | 0 = BUZZER is OFF | | 1 = BUZZER is ON | 2. Using...
Words: 690 - Pages: 3
... |Course Syllabus | | |Information Systems & Technology | | |PRG/211 Version 4 | | |Algorithms and Logic for Computer Programming | Copyright © 2012, 2011, 2010 by University of Phoenix. All rights reserved. Course Description This course provides students with a basic understanding of programming development practices. Concepts covered include the application of algorithms and logic to the design and development of procedural and object oriented computer programs to address the problem solving requirements associated with business information systems. This course will cover procedural programming concepts including data types, controls structures, functional decomposition, arrays, and files, classes and objects. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document...
Words: 1735 - Pages: 7
...Abstract—This paper describes ihe design of a high-speed low-power I-bit full adder cell. The main design objectives for this adder circuit are low power consumption and higher speed at low supply voltage. Using pseudo-NMOS together with two inverters this adder cell has been designed in 0.18-11CMOS process. Considering transistor chaining, grouping, and signal sequencing in our proposed adder layout which all have noticeable impacts on the circuit performance, shows substantial power saving and speed improvement at no area penalty. Inverters act as drivers. Therefore, each stage will not suffer degradation in its deriving capabilities. This saves power, area, and time. Keywords-component; Full Adder, Low power, High-speed Introduction (Heading 1) To respond to the shifting high-performance digital signal processing (DSP) and central processing unit (CPU) chip to low-power demand high-speed and low-power arithmetic circuits such as adders and multipliers have been required. Adder as a main building block of the arithmetic logic unit (ALU) has been under extensive interest. Addition is also a crucial operation because it involves a carry propagation step. In order to achieve low-power performance for the adder structure with high-speed characteristic, different low-power techniques [I] and high-speed circuit design [2] have been introduced. Also high demand for smaller and more durable portable system has grown. This will add one more factor in design constraints, which is known...
Words: 1130 - Pages: 5
...Contents Phase 1: Design Concepts 2 Project Description 2 Use Cases 3 Data Dictionary 4 High Level Design Components 5 Detailed Design: Checkout 7 Diagrams 7 Design Analysis 8 Detailed Design: Product Research 9 Diagrams 9 Design – Using Pseudocode 10 Product Profit 10 Phase 2: Sequential Logic Structures 11 Design 11 Product Profit 11 Phase 3: Problem Solving with Decisions 12 Safe Discount 12 Return Customer Bonus 13 Applying Discounts 14 Phase 4: Problem Solving with Loops 15 Total order 15 Problems to Solve 16 Calculate Profits 16 Rock, Paper, Scissors 18 Number Guessing Game 20 Phase 5: Using Abstractions in Design 22 Seeing Abstractions 22 Refactoring 22 Phase 1: Design Concepts Project Description Although we may be late to the game, we will nevertheless join the world of e-commerce to sell our fantastic product on the Internet. To do so, we need a Web site that will allow for commerce and sales. To be quick about it, we require the following: * Searchable inventory and shopping pages * A shopping cart * A place for customers to register when they make purchases * A checkout process to make the purchase Within this main process, there are a bunch of other needs that must be met, as follows: * We want to track the date of the last purchase a customer make so we can offer incentives and discounts based on the last time they shopped. * We will offer sales based on the number of different items that a person purchases. * We...
Words: 2845 - Pages: 12