...Home Page » Computers and Technology Pt1420 Unit 1 In: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An operating...
Words: 393 - Pages: 2
... Student Name:__________________ Introduction to Programming Winter 2014/2015 Instructor: Martin Remmele Unit 7 Homework Assignment Due by end of first break February 10, 2015 Learning Objectives and Outcomes NOTE: This section lists concepts and techniques to be understood from this unit. The actual assignment that you are to complete is found in the next section: “Assignment Requirements”. * Be able to Use pseudocode/flowcharts to represent repetition structures. * Be able to Create While, Do-While, and Do-Until conditional loops. * Be able to Describe the implications of an infinite loop. Assignment Requirements Complete the following exercises. An exercise that calls for an algorithm may be written in English as a series of steps. An exercise that calls for program statements may be written in a) the text’s pseudocode, b) your own preferred pseudocode notation or c) Visual Basic. (VB code can simply be typed into your Word document; it does not have to be created in the development environment.) The logic of the statements will be more important to the grade than the syntax. * Short Answer Review Questions 1-5, starting on page 213 (5 pts each) * Algorithm Workbench Review Questions 1, 2, 7, and 8, starting on page 213 (10 pts each) * Programming Exercises 1, 3, and 4, starting on page 214 (10 points each) Required Resources * Textbook Submission Requirements ...
Words: 310 - Pages: 2
...David Camacho PT1420 Programming Lab 2.1 Display Welcome to the Fiber Optic Calculator Program. Enter company name. Enter the number of fiber optic cable needed. Multiply .87 times the feet needed for the total cost. Display the total cost of the fiber optic cable and the company name. Purpose of Variable | Variable Name | Stores cost of fiber | fiberCost | Stores the company name | firstChoice | Stores the number of feet to be installed | 50 | Stores the calculated cost of installed fiber | .87 | Display “Welcome to the Fiber Optic Calculator Program” Set fiberCost = .87 Display “What is the company name?” Input companyName Display “How many feet of fiber will be installed” Input feetInstalled Set totalCost = fiberCost * feetInstalled Display “For the company” , companyName, “the total cost will be $” , totalCost David Camacho PT1420 Lab 2.2 Flowchart David Camacho PT1420 Programming Lab 2.3 Visual Studios Program David Camacho Unit 2 HW Assignment 1 Short Answer 1.What does a professional programmer usually do first to gain an understanding of a problem? The programmer creates a design for the program, which starts by asking the customer what they need the program to accomplish. 2.What is pseudocode? Pseudocode is an informal language that has no syntax rules, and is not meant to be compiled or executed. 3.Computer programs typically perform what three steps? Step 1: Input is received. Step 2: Some...
Words: 718 - Pages: 3
...Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...
Words: 1834 - Pages: 8
...Objects with Visio In-Class Activity Ungraded Course Support Tools/Resources required for this activity: Visio Description: Demonstrate creating an object in Visio. Create a UML diagram and show how to define attributes (properties) and operations (methods). Create the UML for the Card object used in the example. The result should look like this: [pic] Estimated Time: 10 minutes PRACTICE Activity 1: Designing Objects In-Class Activity Ungraded Course Support Tools/Resources required for this activity: None Description: Divide the class into groups of three or four students. Assign each group one of the following objects: Product MusicDownload User TakeoutItem ElectronicBook Video Ask each group to identify at least three properties and one method for each object and write the JavaScript code they would use to define the object. Have a member of each group write their code on the whiteboard. Built-In Objects EXPLORE ACTIVITY 4: BUILT-IN OBJECTS In-Class Activity Ungraded Course Support Tools/Resources required for this activity: Unit 5 PowerPoint Presentation (SD1340.U5.PP1) Unit5Sample2.html (SD1340.U5.AF2) Description: Use Slides 22 through 32 to discuss built-in objects. Students have already been introduced to the Array, String, and Math built-in objects. Use Slides 22 and 23 to show how a built-in object can be extended. Use Slides 24-26 to explore the Math object. Unit5Sample2.html (SD1340.U5.AF2) illustrates how random numbers are...
Words: 1297 - Pages: 6
...Unit 1 Assignment 1: Homework Ronald Pennix PT1420 1. Why is the CPU the most important component in a computer? A. The CPU is the most important component in a computer is because without it you would not be able to run any type of software on the computer. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A. The number a bit that is turned on represents the number 1. The number a bit that is turned off represents the number 0. 3. What would you call a device that works with binary data? A. The device that works with binary data is called Digital device. 4. What are the words that make up a high-level programming language called? A. The word that make up a high-level programming language are called Keywords or reserved words. 5. What are the short words that are used in assembly language called? A. The short words that are used in assembly language is called Mnemonics. 6. What is the difference between a compiler and an interpreter? A. A complier is a program that translates a high-level language program into a separate machine language. An interpreter is a program that both translate and executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? A. The Operating systems is the software that controls the internal operations of the computer’s...
Words: 253 - Pages: 2
...Mitchell Collier PT1420 Unit 5 Research Assignment 1 Mr. O’Leary Research Assignment All the shell I’m about to list share some common features, and the major difference in syntax generally only affect scripts writers. It is not unusual to use one shell for interactive use, but another for writing scripts. There are many other programs which read a file of commands and carry out a sequence of actions, the convention allows any of them to be used as a scripting language to create new commands. There is never only one way to perform a function, and often the choice comes down to factors like the combined lengthy and repetitive sequence of commands into a single, simple command. Generalize a sequence of operations on one set of data, into a procedure that can be applied to any similar set of data. Create new commands using combinations of utilities in ways the original authors never thought of simple shell scripts might be written as shell aliases. Create customized datasets on the fly and call applications to work on them or create customized application commands/procedures like wrapping programs over which you have no control inside an environment that you can control. You have to learn what kind what kind of problems are suited to shell scripts and review the most commonly used Unix commands that are useful in shell scripts. In general the newer shells run a little faster and scripts are often more readable because logic can be expressed more cleanly user...
Words: 264 - Pages: 2
...Denietra Franklin PT1420 Juan Hernandez 4/13/2015 Unit 4 Research Assignment 1. List 5 advantages and 5 disadvantages of using global variables. Advantages: 1.It is accessible to all the modules in a program. 2.You only have to declare it once outside the modules. 3.It is good to use it for constants you want to keep consistant. 4. It simplifies maintenance, avoids duplication of local constants. 5. It can make a program easier to read in reference to constants. Disadvantages: 1.It makes debugging difficult. 2.Any statement in a program can change the value. 3.If modules use global variables it is dependent upon the module and if other modules are presented you have to redesign all over each time. 4.It makes a program hard to understand since it can be modified and have to be aware of all other parts of the program that access it. 5.Global variables are not writing direct into flowcharts. 2. How can you declare global and local variables in flowcharts? Global variables are displayed in pseudocode but not in flowcharts directly. 3. How can you declare global and local variables in pseudocode? You can declare variables using the Global, Local, or Component statements, or you can use local variables without declaring them. Here are some examples: Local Number &AGE; Global String &OPER_NICKNAME; Component Rowset &MY_ROWSET; Local Any &SOME_FIELD; Local ApiObject &MYTREE; Local Boolean &Compare = True; Variable declarations...
Words: 314 - Pages: 2
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10
...Bradley Griffin Keith Warren PT1420 Unit 2 Assignment 1: Homework Short Answer: 1. If the problem is program assignment of some sort, than the first step would be to design the basis of the program in pseudocode to gain a clear picture of what kind of commands will work where, then move into flowcharting to start putting together the logic. b. If the problem is an issue in the code that is preventing it from executing, than the first thing that should be done is to look over the program for syntax errors and logic errors. 2. Pseudocode is fake code. This is where a programmer writes out the code without worry of syntax or logic errors to get a visual feel of how the program should unfold. 3. Input, Process, and Output 4. User-Friendly is a term used to describe programs that are easy to use. Algorithm Workbench: 1. A. Display “Height” B. Input height C. Display “Here is the height you entered:”, height 2. A. Display “Favorite Color” B. Input Favorite Color C. Display “Here is your favorite color you entered:”, color Programming Exercises: 1. Personal Information 1 Display “Name” 2 Input Name 3 Display “Here is the name you have entered:”, name 4 Display “Address with city, state, and ZIP” 5 Input address with city, state, and ZIP 6 Display “This is the address you have entered:”, address with city, state, and ZIP 7 Display “Telephone number” 8 Input telephone number 9 Display “This is the telephone number you have entered:”, telephone ...
Words: 277 - Pages: 2
...degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...
Words: 2573 - Pages: 11
...PT1420 Introduction to Programming Week-2 Lesson Plan TUE 6:00 PM to 10:30 PM Instructor: Tushar Patel (tspatel02@yahoo.com, tpatel@itt-tech.edu) CLASS: Topic: Unit 2: Software Program Design I Course Objectives Covered by This Unit CO2: Design programs by using flowcharts and pseudo code. CO3: Write programs that perform input, processing, and output. Unit Learning Outcomes LO8: Determine program input, processing, and output stages. LO9: Create the necessary flowcharts to describe a program’s structure. LO10: Use pseudocode to define a program’s structure. LO11: Formulate solution algorithms for calculations by properly following the order of operations. Key Concepts ▪ Determining input, process, and output ▪ Creating flowcharts and pseudocode ▪ Formulating algorithms Reading ▪ Gaddis, Chapter 2: “Introduction to Computers and Programming,” pages 29-55 Resources: • Data Projector • ITT Virtual Library • Text Books • Visual Studio • Lab Computers • Student Removable Hard Drive • VM Ware Player Methods: • Lecture • Group Discussion • Lab Work • Review exercise / Research Papers • Quiz Brief Lesson Overview: Today’s lecture we would be discussing the following topics. • Discuss how all programs basically consist of a three-step process: input, process, and output. Use the payroll calculation program...
Words: 895 - Pages: 4
...Delvon Frye 7/26/2016 PT1420 Unit 6 Assignment Algorithm Workbench pg. 159 6-10 6. Select number Case 1: Display “You selected A.” Case 2: Display “You selected 2.” Case 3: Display “You selected 3.” Case 4: Display “You selected 4.” Default: Display “Not good with numbers, eh?” End Select 7. If Speed 24 > and Speed < 56 Display “Speed is normal.” Else Display “Speed is abnormal.” 8. If points are < 9 and >51 Display “Invalid points.” Else 9. Display “Valid points.” Select testMonth Case value_1: Display “January has 31 days.” Case value_2: Display “February has 28 days.” Case value_3: Display “March has 31 days.” Default: Display “Invalid selection.” End select 10. If hours==10 THEN Programming Exercises 5 and 8 pg. 160 5. Dim color1 as string Dim color2 as string Display (“Please enter two primary colors.”) Display (“The color you made is Purple”) Else Display (“The color you made is Purple”) Else Display (“The color you made is Orange”) Else Display (“The color you made is Orange”) Else Display (“The color you made is Green”) Else Display (“The color you made is Green”) Else If color1 = else or color2 = else then Display (“You failed to enter a valid color!”) End if 8. //This is a program asks the user to enter the number of coins required to make exactly one dollar. //Declare the variables Declare Real pennies Declare Real nickels Declare Real dimes Declare...
Words: 533 - Pages: 3
...Unit 5 Research Assignment 1 PT1420 * A shell script is a computer program designed to be run by the Unix shell, a command line interpreter. The various dialects of shell scripts are considered to be scripting languages. * Advantages of using shell script is that the commands and syntax are exactly the same as those directly entered at the command line. The programmer does not have to switch to a totally different syntax, as they would if the script were written in a different language, or if a compiled language was used. Often, writing a shell script is much quicker than writing the equivalent code in other programming languages. The many advantages include easy program or file selection, quick start, and interactive debugging. A shell script can be used to provide a sequencing and decision-making linkage around existing programs, and for moderately sized scripts the absence of a compilation step is an advantage. Interpretive running makes it easy to write debugging code into a script and re-run it to detect and fix bugs. Non-expert users can use scripting to tailor the behavior of programs, and shell scripting provides some limited scope for multiprocessing. * Most common usage methods of PowerShell is interactive console (powershell.exe) and script files (with extension of .ps1, that is also usually executed by powershell.exe). Main features of PowerShell are: .Net integration, object pipeline, easy access to many management domains (WMI, ADSI, COM, .NET etc...
Words: 388 - Pages: 2
...Dr. Davis PT1420 26 June 2014 Unit 3 Assignment 1: Homework 5. Write a pseudo code statement that declares the variable cost so that so that it can hold real numbers. a. declare real cost 6. Write a pseudo code statement that declares the variable total so that it can hold integers. Initialize the variable with value zero. a. Declare real price = 0.00 display “the original price” input items original price display “price” 3. Write assignment statements that perform the following operations with variables a, b and c. a. set b = a+2 b. set a = b*4 c. set b = a/3.14 d. set a= b-8 7. Write a pseudo code statement that assigns the value 27 to the variable count. A count: = 27 8. Write pseudo code statement that assigns the sum of 10 and 14 to the variable total. a. declare integer total set total = 10+14 display total 9. Write a pseudo code statement that subtracts the variable down payment from the variable total and assigns the result for the variable due. a. declare integer down payment declare integer total declare integer due set due = total – down payment display “down payment “ input down payment 10. Write a pseudo code statement that multiplies the variable subtotal by 0.15 and assigns the result to the variable total fee a. declare real subtotal declare real totalfee set totalfee subtotal * 0.15 display “subtotal” input subtotal display totalfee 4. Assume the variable result,...
Words: 550 - Pages: 3