This website uses cookies to ensure you have the best experience. Learn more

Pt1420 V1 Unit 2 Assignment 1: Homework

319 words - 2 pages

Unit 2 Assignment 1 Pt1420
Unit 2 Assignment 1: Homework Kenneth D. Davis Intro to Programming

Short Answer
1. What does a professional programmer usually do first to gain an understanding of a problem?
Interview the customer
2. What is pseudocode? Fake Code
3. Computer programs typically perform what three steps?
1. Input is received. 2. Some process is performed on the input. 3. Output is produced.
4. What does the term “user- friendly” mean?
The term user- friendly is ...view middle of the document...

5. What two things must you normally specify in a variable declaration?
You must specify the variable type and an identifier
6. What value is stored in uninitialized variables?
Some languages assign a default value as 0 to uninitialized variables. In many languages, however, uninitialized variables hold unpredictable values.

Algorithm Workbench
1. Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height.

Set height = 72”
Display ‘Enter your Height at Age 21’
Input hEIGHT
Display ‘Enter your Height at Age 22’
Input hEIGHT
2. Design an algorithm that prompts the user to enter his or her favorite color and stores the user’s input in a variable named color.
Set Favorite Color = fAVCOLOR
Display ‘What is your Favorite Color?’
Input fAVCOLOR
Programming Exercises
1. Personal Information
Design a program that displays the following information:

Display ‘What is your Name?’
Input name
Display ‘What is your Address’
Input address
Display ‘What is your City, State, and Zip’
Input citystatezip...

Other assignments on Pt1420 V1 Unit 2 Assignment 1: Homework

Acc555 Assignment 1 Unit 4

868 words - 4 pages Melanie Waghalter Johnson Unit 4 Assignment 1 Professor Cynthia Waddell ACC555: Fraud Examination “How to Steal a Million Dollar Without Taking the Cash” Seneca Staunton was an overwhelmed accounting clerk at Carlton Chemicals. His job was to deal with AR collection, customer service issues, process payments and keep the AR records straight. He was a quiet man who preferred to work alone than with others, and this was his down fall with

Unit 1 Assignment 1 Windows 2008 Network

461 words - 2 pages Unit 1. Assignment 1. Windows 2008 Network Services Course Objectives and Learning Outcomes In this assignment, you will explain the function of DHCP and DNS. Assignment Requirements Write a 1-page report summarizing IT-management overhead in reference to DHCP and DNS. In your report, address IT-management overhead in reference to DNS and DHCP, with the following question in mind: 1. How many hosts does it take to justify the

Is3230 Unit 2 Assignment 1

307 words - 2 pages Selecting Security Countermeasures IS3220 As a technology associate in the information system department at Corporation Tech I have reviewed the new network design and identified possible security threats and appropriated countermeasures. Entering the internet without proper security can be harmful in many ways. The first thing that should be added is a firewall. Firewalls can prevent unwanted traffic from infiltrating the network. This is

Week 1 Writing Assignment 2

440 words - 2 pages Week 1 Writing Assignment 2 Karl von Busse EG 542 Economics and Change December 14, 2014 Rationing Bypassing the free market becomes necessary during war simply because the free market is not perfect and may not respond adequately to wartime material demands. During WW2 immediately following Pearl Harbor the government imposed a system of rationing on needed commodities such as steel, brass, rubber and gasoline. The reason was twofold

Unit 1 Assignment 1

344 words - 2 pages In the past the greatest threats to the computing world were the highly skilled black hat hackers and their various coordinated groups. Not to downplay their reputation, they are still very real threats; however there has been a surge of neophyte hackers in the world. It has become profitable for the skilled and connected hackers to create tidy packages of malicious software and sell them to what are called “script kiddies,” which are essentially

Unit 1 Assignment 1

809 words - 4 pages Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach

Unit 1, Assignment 1

385 words - 2 pages Vanessa Joyal GE 257 U1, A1: Microbiology in the News ITT Tech Scientists at the University of Florida have discovered a way to use microbiology and nanotechnology to decrease the amount of pesticides necessary to kill the insect that causes citrus greening in Florida's citrus crops. The bacteria that causes citrus greening prevents the tree from getting proper nutrients and causes the fruit produced to be “unsuitable for sale as fresh fruit

Unit 5 Assignment 2 Define An Acceptable Use Policy (Aup)

339 words - 2 pages Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) Acceptable Use Policy Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic. LAN – WAN is where the IT infrastructure links to a wide area network and internet. For Security (Administrators and Managers) - Security monitoring controls for intrusion - Apply email server and attachment antivirus and email

Ethical Hacking And Network Defense Unit 2 Assignment

1705 words - 7 pages Ethical Hacking and Network Defense Unit 1 Assignment Kaplan University Table of Contents Scope Goals and Objectives Tasks Reporting Schedule Unanswered Questions Authorization Letter Scope Production e-commerce Web application server and Cisco network described in Figure 1.1. Located on ASA_Instructor, the e-commerce Web

Nt-1310 Unit 2 Activity 1 Cloud Computing

287 words - 2 pages Fidel Luna (15275168) NT-1310 Unit 2 Lab Cloud Computing Research iCloud Drive Inc. #566-533W Roulette Street, Pembina North Dakota, 58271 USA Founded in 2000, iCloud Inc. is recognized as a thought leader and innovator of Cloud services, bringing continuous innovation through high-performing cloud solutions to clients that want simple Internet Technology delivered in a less expensive way. iCloudDrive brings powerful backup

Unit 6 Assignment 1

255 words - 2 pages I received your E-mail and in response I recommend that you do the following. There is a domain for each department, such as Marketing, accessing one printer is easy to do. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the

Similar Documents

Pt1420 Unit 2: Research Assignment

270 words - 2 pages In Java, naming conventions for identifiers have been established and suggested by various Java communities such as Sun Microsystems, Netscape, AmbySoft etc. • The Classes names should be nouns in UpperCamelCase, with the first letter of every word capitalized. Use whole words — avoid acronyms and abbreviations (unless the abbreviation is much more widely used than the long form, such as URL or HTML). • Methods should be verbs in

Unit 2 Assignment 1 Transfer Time

306 words - 2 pages Unit 2 Assignment 1: Transfer Time File Size | Transfer Rate | Transfer Time | 100 MB | 56 Kbps | 15 seconds | 100 MB | 4 Mbps | .2 seconds | 2 GB | 56 Kbps | 4 minutes 46 seconds | 2 GB | 4 Mbps | 4 seconds | (100 MB x 1,000 x 8) / (56 Kbps x 1000) = 15 seconds (100 MB x 1,000 x 8) / (4 Mbps x 1,000 x 1,000) = .2 seconds (2 GB x 1,000 x 1,000 x 8) / (56 Kbps x 1,000) = 286 seconds = 4 minutes 46 seconds (2 GB x 1,000 x 1,000 x

Unit 1 Assignment

308 words - 2 pages Unit 1 Assignment PA205-03 UNIT 1 ASSIGNMENT CASE STUDY QUESTIONS 1. The case study references one state statute. Identify it and explain what it prohibits. My understanding of the case study is that the identifiable state statute is section 42.09(a)(3) of the Texas Penal code, which prohibited the “desecration of a venerable object.” 2. Which branch of government (executive, judicial, or legislative) created the state statute? The

Nt 1210 Unit 1 Assignment

2960 words - 12 pages Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 &gt