...David Camacho PT1420 Programming Lab 2.1 Display Welcome to the Fiber Optic Calculator Program. Enter company name. Enter the number of fiber optic cable needed. Multiply .87 times the feet needed for the total cost. Display the total cost of the fiber optic cable and the company name. Purpose of Variable | Variable Name | Stores cost of fiber | fiberCost | Stores the company name | firstChoice | Stores the number of feet to be installed | 50 | Stores the calculated cost of installed fiber | .87 | Display “Welcome to the Fiber Optic Calculator Program” Set fiberCost = .87 Display “What is the company name?” Input companyName Display “How many feet of fiber will be installed” Input feetInstalled Set totalCost = fiberCost * feetInstalled Display “For the company” , companyName, “the total cost will be $” , totalCost David Camacho PT1420 Lab 2.2 Flowchart David Camacho PT1420 Programming Lab 2.3 Visual Studios Program David Camacho Unit 2 HW Assignment 1 Short Answer 1.What does a professional programmer usually do first to gain an understanding of a problem? The programmer creates a design for the program, which starts by asking the customer what they need the program to accomplish. 2.What is pseudocode? Pseudocode is an informal language that has no syntax rules, and is not meant to be compiled or executed. 3.Computer programs typically perform what three steps? Step 1: Input is received. Step 2: Some process...
Words: 718 - Pages: 3
...PT 1420 Student Name:__________________ Introduction to Programming Winter 2014/2015 Instructor: Martin Remmele Unit 7 Homework Assignment Due by end of first break February 10, 2015 Learning Objectives and Outcomes NOTE: This section lists concepts and techniques to be understood from this unit. The actual assignment that you are to complete is found in the next section: “Assignment Requirements”. * Be able to Use pseudocode/flowcharts to represent repetition structures. * Be able to Create While, Do-While, and Do-Until conditional loops. * Be able to Describe the implications of an infinite loop. Assignment Requirements Complete the following exercises. An exercise that calls for an algorithm may be written in English as a series of steps. An exercise that calls for program statements may be written in a) the text’s pseudocode, b) your own preferred pseudocode notation or c) Visual Basic. (VB code can simply be typed into your Word document; it does not have to be created in the development environment.) The logic of the statements will be more important to the grade than the syntax. * Short Answer Review Questions 1-5, starting on page 213 (5 pts each) * Algorithm Workbench Review Questions 1, 2, 7, and 8, starting on page 213 (10 pts each) * Programming Exercises 1, 3, and 4, starting on page 214 (10 points each) Required Resources *...
Words: 310 - Pages: 2
...Home Page » Computers and Technology Pt1420 Unit 1 In: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An operating...
Words: 393 - Pages: 2
...Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...
Words: 1834 - Pages: 8
...look like this: [pic] Estimated Time: 10 minutes PRACTICE Activity 1: Designing Objects In-Class Activity Ungraded Course Support Tools/Resources required for this activity: None Description: Divide the class into groups of three or four students. Assign each group one of the following objects: Product MusicDownload User TakeoutItem ElectronicBook Video Ask each group to identify at least three properties and one method for each object and write the JavaScript code they would use to define the object. Have a member of each group write their code on the whiteboard. Built-In Objects EXPLORE ACTIVITY 4: BUILT-IN OBJECTS In-Class Activity Ungraded Course Support Tools/Resources required for this activity: Unit 5 PowerPoint Presentation (SD1340.U5.PP1) Unit5Sample2.html (SD1340.U5.AF2) Description: Use Slides 22 through 32 to discuss built-in objects. Students have already been introduced to the Array, String, and Math built-in objects. Use Slides 22 and 23 to show how a built-in object can be extended. Use Slides 24-26 to explore the Math object. Unit5Sample2.html (SD1340.U5.AF2) illustrates how random numbers are chosen, by generating a group of numbers and then calculating their average. An average of 0.5 indicates a random distribution. You can run the code more than once to show how the results differ. Slide 27 explains how you can use the “with” keyword to reduce the amount of typing. Use Slides 28-32 to discuss the Date object. Estimated...
Words: 1297 - Pages: 6
...Unit 1 Assignment 1: Homework Ronald Pennix PT1420 1. Why is the CPU the most important component in a computer? A. The CPU is the most important component in a computer is because without it you would not be able to run any type of software on the computer. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A. The number a bit that is turned on represents the number 1. The number a bit that is turned off represents the number 0. 3. What would you call a device that works with binary data? A. The device that works with binary data is called Digital device. 4. What are the words that make up a high-level programming language called? A. The word that make up a high-level programming language are called Keywords or reserved words. 5. What are the short words that are used in assembly language called? A. The short words that are used in assembly language is called Mnemonics. 6. What is the difference between a compiler and an interpreter? A. A complier is a program that translates a high-level language program into a separate machine language. An interpreter is a program that both translate and executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? A. The Operating systems is the software that controls the internal operations of the computer’s...
Words: 253 - Pages: 2
...Denietra Franklin PT1420 Juan Hernandez 4/13/2015 Unit 4 Research Assignment 1. List 5 advantages and 5 disadvantages of using global variables. Advantages: 1.It is accessible to all the modules in a program. 2.You only have to declare it once outside the modules. 3.It is good to use it for constants you want to keep consistant. 4. It simplifies maintenance, avoids duplication of local constants. 5. It can make a program easier to read in reference to constants. Disadvantages: 1.It makes debugging difficult. 2.Any statement in a program can change the value. 3.If modules use global variables it is dependent upon the module and if other modules are presented you have to redesign all over each time. 4.It makes a program hard to understand since it can be modified and have to be aware of all other parts of the program that access it. 5.Global variables are not writing direct into flowcharts. 2. How can you declare global and local variables in flowcharts? Global variables are displayed in pseudocode but not in flowcharts directly. 3. How can you declare global and local variables in pseudocode? You can declare variables using the Global, Local, or Component statements, or you can use local variables without declaring them. Here are some examples: Local Number &AGE; Global String &OPER_NICKNAME; Component Rowset &MY_ROWSET; Local Any &SOME_FIELD; Local ApiObject &MYTREE; Local Boolean &Compare = True; Variable declarations...
Words: 314 - Pages: 2
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10
...Bradley Griffin Keith Warren PT1420 Unit 2 Assignment 1: Homework Short Answer: 1. If the problem is program assignment of some sort, than the first step would be to design the basis of the program in pseudocode to gain a clear picture of what kind of commands will work where, then move into flowcharting to start putting together the logic. b. If the problem is an issue in the code that is preventing it from executing, than the first thing that should be done is to look over the program for syntax errors and logic errors. 2. Pseudocode is fake code. This is where a programmer writes out the code without worry of syntax or logic errors to get a visual feel of how the program should unfold. 3. Input, Process, and Output 4. User-Friendly is a term used to describe programs that are easy to use. Algorithm Workbench: 1. A. Display “Height” B. Input height C. Display “Here is the height you entered:”, height 2. A. Display “Favorite Color” B. Input Favorite Color C. Display “Here is your favorite color you entered:”, color Programming Exercises: 1. Personal Information 1 Display “Name” 2 Input Name 3 Display “Here is the name you have entered:”, name 4 Display “Address with city, state, and ZIP” 5 Input address with city, state, and ZIP 6 Display “This is the address you have entered:”, address with city, state, and ZIP 7 Display “Telephone number” 8 Input telephone number 9 Display “This is the telephone number you have entered:”, telephone ...
Words: 277 - Pages: 2
...PT1420 Wk 3 Unit 3 James W. Norris, II April 14, 2013 What is reverse engineering? Ans: Reverse Engineering is taking apart an abject to see how it works in order to duplicate or enhance the object. This practice is frequently used on computer hardware and software. What are the advantages and disadvantages of using reverse engineering to discover the logics of a software program? Ans: Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a “bug” or error in the program.Hardware reverse engineering involves taking apart a device to see how it works. If a processor manufacturer wants to see how a competitor’s processor works, they can purchase a competitor’s processor, disassemble it, and then make a processor similar to it. Find any one tool available to perform reverse engineering of software programs. What are at least five features of that tool? Ans: One tool used is a hexadecimal dumper, which prints and displays the binary numbers of a program in hexadecimal format(which is easier to read than a binary format. Short Answer Questions: 5. What two things must you normally specify in a variable declaration? Ans: The variable’s name and the variable’s data type 6. What value is stored in uninitialized variables? Ans: zero Algorithm Workbench 3. Write assignment statements...
Words: 266 - Pages: 2
...associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...
Words: 2573 - Pages: 11
...Dr. Davis PT1420 26 June 2014 Unit 3 Assignment 1: Homework 5. Write a pseudo code statement that declares the variable cost so that so that it can hold real numbers. a. declare real cost 6. Write a pseudo code statement that declares the variable total so that it can hold integers. Initialize the variable with value zero. a. Declare real price = 0.00 display “the original price” input items original price display “price” 3. Write assignment statements that perform the following operations with variables a, b and c. a. set b = a+2 b. set a = b*4 c. set b = a/3.14 d. set a= b-8 7. Write a pseudo code statement that assigns the value 27 to the variable count. A count: = 27 8. Write pseudo code statement that assigns the sum of 10 and 14 to the variable total. a. declare integer total set total = 10+14 display total 9. Write a pseudo code statement that subtracts the variable down payment from the variable total and assigns the result for the variable due. a. declare integer down payment declare integer total declare integer due set due = total – down payment display “down payment “ input down payment 10. Write a pseudo code statement that multiplies the variable subtotal by 0.15 and assigns the result to the variable total fee a. declare real subtotal declare real totalfee set totalfee subtotal * 0.15 display “subtotal” input subtotal display totalfee 4. Assume the variable result,...
Words: 550 - Pages: 3
...PT1420 Introduction to Programming Week-2 Lesson Plan TUE 6:00 PM to 10:30 PM Instructor: Tushar Patel (tspatel02@yahoo.com, tpatel@itt-tech.edu) CLASS: Topic: Unit 2: Software Program Design I Course Objectives Covered by This Unit CO2: Design programs by using flowcharts and pseudo code. CO3: Write programs that perform input, processing, and output. Unit Learning Outcomes LO8: Determine program input, processing, and output stages. LO9: Create the necessary flowcharts to describe a program’s structure. LO10: Use pseudocode to define a program’s structure. LO11: Formulate solution algorithms for calculations by properly following the order of operations. Key Concepts ▪ Determining input, process, and output ▪ Creating flowcharts and pseudocode ▪ Formulating algorithms Reading ▪ Gaddis, Chapter 2: “Introduction to Computers and Programming,” pages 29-55 Resources: • Data Projector • ITT Virtual Library • Text Books • Visual Studio • Lab Computers • Student Removable Hard Drive • VM Ware Player Methods: • Lecture • Group Discussion • Lab Work • Review exercise / Research Papers • Quiz Brief Lesson Overview: Today’s lecture we would be discussing the following topics. • Discuss how all programs basically consist of a three-step process: input, process, and output. Use the payroll calculation program...
Words: 895 - Pages: 4
...Delvon Frye 7/26/2016 PT1420 Unit 6 Assignment Algorithm Workbench pg. 159 6-10 6. Select number Case 1: Display “You selected A.” Case 2: Display “You selected 2.” Case 3: Display “You selected 3.” Case 4: Display “You selected 4.” Default: Display “Not good with numbers, eh?” End Select 7. If Speed 24 > and Speed < 56 Display “Speed is normal.” Else Display “Speed is abnormal.” 8. If points are < 9 and >51 Display “Invalid points.” Else 9. Display “Valid points.” Select testMonth Case value_1: Display “January has 31 days.” Case value_2: Display “February has 28 days.” Case value_3: Display “March has 31 days.” Default: Display “Invalid selection.” End select 10. If hours==10 THEN Programming Exercises 5 and 8 pg. 160 5. Dim color1 as string Dim color2 as string Display (“Please enter two primary colors.”) Display (“The color you made is Purple”) Else Display (“The color you made is Purple”) Else Display (“The color you made is Orange”) Else Display (“The color you made is Orange”) Else Display (“The color you made is Green”) Else Display (“The color you made is Green”) Else If color1 = else or color2 = else then Display (“You failed to enter a valid color!”) End if 8. //This is a program asks the user to enter the number of coins required to make exactly one dollar. //Declare the variables Declare Real pennies Declare Real nickels Declare Real dimes Declare...
Words: 533 - Pages: 3
...Kelli Okuly PT1420 Unit 2 Research Assignment 12-5-2014 Variable naming conventions vary from program to program. In Visual Basic the variable must begin with a letter and you cannot use a space, period (.), or the characters !, @, &, $, # in the name. Visual Basic variable names must be under 255 characters long. You shouldn't use any names that are the same as the functions, statements, and methods in Visual Basic. You end up shadowing the same keywords in the language. To use a basic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Precede the fundamental function, statement, or method name with the name of the associated type library. For example, if you have a variable called “Left”, you can only use the “Left” function using “VBA.Left”. In Python, variables must begin with a letter or underscore (_). Other characters can be letters, numbers, or the underscore. Python variables are case sensitive and can be any length, within reason. There are several keywords in Python that are reserved for other functions and cannot be used as variables. For example; print, def, from, not, and return. Variables in Java are referred to as Identifiers. In Java the variable must begin with a letter, an underscore, or a dollar sign ($) although a letter is typically what is used. The other characters may be letters or numbers, no spaces or special characters are allowed. Java identifiers can be any length within...
Words: 405 - Pages: 2