...Paolo Mutia Sociology – Gordon 3 November 2015 Assignment 3 Social status is the position that someone occupies in society or in a social group, while roles are the behaviors, obligations, and privileges attached to a status. For example, a woman may have the status of mother in her family. Because of this status of a mother, she is expected to perform a role for her children. This role may be defined through actions such as nurturing, education, protecting, and guiding the children. Social structure, is the arrangement of institutions where human beings in a society interact and live together. The group collectively decides the set of statuses and roles. By creating a set of expectations of actions and behavior, people know what to expect...
Words: 1606 - Pages: 7
...This is a part to evaluate the storyboard produced in question 2a and question 2b according to Nielsens Heuristics. Question 2a is creating a new order record and stores it in the storage of order record. Question 2b is loop of the records to enable user to fill or skip the order record. Visibility of system status Users are well-informed after every step that they made. For instance, when users reached the graphical user interface to input some details such as order number and customer id, there are examples in the form of grey colour wording in the textbox to guide them how to fill in details in a more appropriate way. Besides that, users will be redirect to the next step after they clicked on the buttons. For example, the user will be direct to next page after fill in the details in the order number textbox. The users maybe prompt with a message to try again in the input session of the order number and there is a button to let them navigate back to previous page which is homepage. Meanwhile, if the user entered an order number which can be found in the database, they will be direct to view order record. There is two buttons in the creation of new customer and proceed buttons. The users will be having only two options, that are input the customer id and click the proceed button or the customer may register themselves with the new customer button to input their personal details. Match between system and the real world For both of the storyboards, the main language...
Words: 1311 - Pages: 6
...Problem Statement We hay bales in pairs to find equals of 80, 82, 83 ,84 ,85, 86, 87, 88, 90, and 91. Is there more than one answer to this problem. Process So far I was able to have bales like “bales 2 and 3” I was able to get 10 different kinds. Also since there are 10 different numbers two it would make sense. The different bales were 1 and 2, 1 and 3, 1 and 4, 1 and 5, 2 and 3, 2 and 4, 2 and 5, 3 and 4, 3 and 5, and for last 4 and 5. I was able to get this because at the beginning it showed the those numbers to 2 and 4. Then it said so on. I also wondered why they stopped at five in the second number. So I did keep going on and found ten groups of numbers. Which were going with the total numbers that were ten. The numbers were 80, 82, 83, 84, 85, 86, 87, 88, 90,91. In total there were ten...
Words: 367 - Pages: 2
...1. Explain what software you used to create your game To create my game, a software called “Scratch was used. Scratch is a software that is downloadable on most PC’s, people can use this program to share interactive media. This is includes self-made games as well as animations. 2. Explain what an algorithm is An algorithm is a process, or a set of rules to be followed in calculations or other problem-solving operations, especially by a computer. However, algorithms are used in our day to day life, whether you notice or not. For example; a daily routine, or a cooking recipe. 3. Explain what an if statement is An if statement is a “block” or a piece of code that when one thing happens, it will do that, but if another happens, it will do something else. For example, when...
Words: 653 - Pages: 3
...Home Page » Computers and Technology Pt1420 Unit 1 In: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An operating...
Words: 393 - Pages: 2
...David Camacho PT1420 Programming Lab 2.1 Display Welcome to the Fiber Optic Calculator Program. Enter company name. Enter the number of fiber optic cable needed. Multiply .87 times the feet needed for the total cost. Display the total cost of the fiber optic cable and the company name. Purpose of Variable | Variable Name | Stores cost of fiber | fiberCost | Stores the company name | firstChoice | Stores the number of feet to be installed | 50 | Stores the calculated cost of installed fiber | .87 | Display “Welcome to the Fiber Optic Calculator Program” Set fiberCost = .87 Display “What is the company name?” Input companyName Display “How many feet of fiber will be installed” Input feetInstalled Set totalCost = fiberCost * feetInstalled Display “For the company” , companyName, “the total cost will be $” , totalCost David Camacho PT1420 Lab 2.2 Flowchart David Camacho PT1420 Programming Lab 2.3 Visual Studios Program David Camacho Unit 2 HW Assignment 1 Short Answer 1.What does a professional programmer usually do first to gain an understanding of a problem? The programmer creates a design for the program, which starts by asking the customer what they need the program to accomplish. 2.What is pseudocode? Pseudocode is an informal language that has no syntax rules, and is not meant to be compiled or executed. 3.Computer programs typically perform what three steps? Step 1: Input is received. Step 2: Some...
Words: 718 - Pages: 3
... Student Name:__________________ Introduction to Programming Winter 2014/2015 Instructor: Martin Remmele Unit 7 Homework Assignment Due by end of first break February 10, 2015 Learning Objectives and Outcomes NOTE: This section lists concepts and techniques to be understood from this unit. The actual assignment that you are to complete is found in the next section: “Assignment Requirements”. * Be able to Use pseudocode/flowcharts to represent repetition structures. * Be able to Create While, Do-While, and Do-Until conditional loops. * Be able to Describe the implications of an infinite loop. Assignment Requirements Complete the following exercises. An exercise that calls for an algorithm may be written in English as a series of steps. An exercise that calls for program statements may be written in a) the text’s pseudocode, b) your own preferred pseudocode notation or c) Visual Basic. (VB code can simply be typed into your Word document; it does not have to be created in the development environment.) The logic of the statements will be more important to the grade than the syntax. * Short Answer Review Questions 1-5, starting on page 213 (5 pts each) * Algorithm Workbench Review Questions 1, 2, 7, and 8, starting on page 213 (10 pts each) * Programming Exercises 1, 3, and 4, starting on page 214 (10 points each) Required Resources * Textbook Submission Requirements ...
Words: 310 - Pages: 2
...Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...
Words: 1834 - Pages: 8
...Unit 1 Assignment 1: Homework Ronald Pennix PT1420 1. Why is the CPU the most important component in a computer? A. The CPU is the most important component in a computer is because without it you would not be able to run any type of software on the computer. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A. The number a bit that is turned on represents the number 1. The number a bit that is turned off represents the number 0. 3. What would you call a device that works with binary data? A. The device that works with binary data is called Digital device. 4. What are the words that make up a high-level programming language called? A. The word that make up a high-level programming language are called Keywords or reserved words. 5. What are the short words that are used in assembly language called? A. The short words that are used in assembly language is called Mnemonics. 6. What is the difference between a compiler and an interpreter? A. A complier is a program that translates a high-level language program into a separate machine language. An interpreter is a program that both translate and executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? A. The Operating systems is the software that controls the internal operations of the computer’s...
Words: 253 - Pages: 2
...EXPLORE Activity 3: Designing Objects with Visio In-Class Activity Ungraded Course Support Tools/Resources required for this activity: Visio Description: Demonstrate creating an object in Visio. Create a UML diagram and show how to define attributes (properties) and operations (methods). Create the UML for the Card object used in the example. The result should look like this: [pic] Estimated Time: 10 minutes PRACTICE Activity 1: Designing Objects In-Class Activity Ungraded Course Support Tools/Resources required for this activity: None Description: Divide the class into groups of three or four students. Assign each group one of the following objects: Product MusicDownload User TakeoutItem ElectronicBook Video Ask each group to identify at least three properties and one method for each object and write the JavaScript code they would use to define the object. Have a member of each group write their code on the whiteboard. Built-In Objects EXPLORE ACTIVITY 4: BUILT-IN OBJECTS In-Class Activity Ungraded Course Support Tools/Resources required for this activity: Unit 5 PowerPoint Presentation (SD1340.U5.PP1) Unit5Sample2.html (SD1340.U5.AF2) Description: Use Slides 22 through 32 to discuss built-in objects. Students have already been introduced to the Array, String, and Math built-in objects. Use Slides 22 and 23 to show how a built-in object can be extended. Use Slides 24-26 to explore the Math object. Unit5Sample2.html (SD1340.U5.AF2)...
Words: 1297 - Pages: 6
...Denietra Franklin PT1420 Juan Hernandez 4/13/2015 Unit 4 Research Assignment 1. List 5 advantages and 5 disadvantages of using global variables. Advantages: 1.It is accessible to all the modules in a program. 2.You only have to declare it once outside the modules. 3.It is good to use it for constants you want to keep consistant. 4. It simplifies maintenance, avoids duplication of local constants. 5. It can make a program easier to read in reference to constants. Disadvantages: 1.It makes debugging difficult. 2.Any statement in a program can change the value. 3.If modules use global variables it is dependent upon the module and if other modules are presented you have to redesign all over each time. 4.It makes a program hard to understand since it can be modified and have to be aware of all other parts of the program that access it. 5.Global variables are not writing direct into flowcharts. 2. How can you declare global and local variables in flowcharts? Global variables are displayed in pseudocode but not in flowcharts directly. 3. How can you declare global and local variables in pseudocode? You can declare variables using the Global, Local, or Component statements, or you can use local variables without declaring them. Here are some examples: Local Number &AGE; Global String &OPER_NICKNAME; Component Rowset &MY_ROWSET; Local Any &SOME_FIELD; Local ApiObject &MYTREE; Local Boolean &Compare = True; Variable declarations...
Words: 314 - Pages: 2
...Bradley Griffin Keith Warren PT1420 Unit 2 Assignment 1: Homework Short Answer: 1. If the problem is program assignment of some sort, than the first step would be to design the basis of the program in pseudocode to gain a clear picture of what kind of commands will work where, then move into flowcharting to start putting together the logic. b. If the problem is an issue in the code that is preventing it from executing, than the first thing that should be done is to look over the program for syntax errors and logic errors. 2. Pseudocode is fake code. This is where a programmer writes out the code without worry of syntax or logic errors to get a visual feel of how the program should unfold. 3. Input, Process, and Output 4. User-Friendly is a term used to describe programs that are easy to use. Algorithm Workbench: 1. A. Display “Height” B. Input height C. Display “Here is the height you entered:”, height 2. A. Display “Favorite Color” B. Input Favorite Color C. Display “Here is your favorite color you entered:”, color Programming Exercises: 1. Personal Information 1 Display “Name” 2 Input Name 3 Display “Here is the name you have entered:”, name 4 Display “Address with city, state, and ZIP” 5 Input address with city, state, and ZIP 6 Display “This is the address you have entered:”, address with city, state, and ZIP 7 Display “Telephone number” 8 Input telephone number 9 Display “This is the telephone number you have entered:”, telephone ...
Words: 277 - Pages: 2
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10
...degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...
Words: 2573 - Pages: 11
...PT1420 Introduction to Programming Week-2 Lesson Plan TUE 6:00 PM to 10:30 PM Instructor: Tushar Patel (tspatel02@yahoo.com, tpatel@itt-tech.edu) CLASS: Topic: Unit 2: Software Program Design I Course Objectives Covered by This Unit CO2: Design programs by using flowcharts and pseudo code. CO3: Write programs that perform input, processing, and output. Unit Learning Outcomes LO8: Determine program input, processing, and output stages. LO9: Create the necessary flowcharts to describe a program’s structure. LO10: Use pseudocode to define a program’s structure. LO11: Formulate solution algorithms for calculations by properly following the order of operations. Key Concepts ▪ Determining input, process, and output ▪ Creating flowcharts and pseudocode ▪ Formulating algorithms Reading ▪ Gaddis, Chapter 2: “Introduction to Computers and Programming,” pages 29-55 Resources: • Data Projector • ITT Virtual Library • Text Books • Visual Studio • Lab Computers • Student Removable Hard Drive • VM Ware Player Methods: • Lecture • Group Discussion • Lab Work • Review exercise / Research Papers • Quiz Brief Lesson Overview: Today’s lecture we would be discussing the following topics. • Discuss how all programs basically consist of a three-step process: input, process, and output. Use the payroll calculation program...
Words: 895 - Pages: 4