349 words - 2 pages
Oxford Dictionary: A series of coded software instructions to control the operation of a computer or other machine.
Webster’s Dictionary: A sequence of instructions that a computer can interpret and execute; "the program required several hundred lines of code".
A program is an intermediate language that helps the user and the machine communicate. The user gives instructions to the machine through the program and the machine sends its output back to the user the same way.
A computer program or code, more specifically, is a set of instructions in an intermediate language between the user and a computer. The computer only understands a language called the
1026 words - 5 pages
your computer for email and Internet vulnerabilities. The company will then give some pointers on how to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a good resource.
The typical network attacks that put computers at risk are: viruses, worms, spoofing, Trojan horses and denial of service attacks. Every unprotected computer is vulnerable to a computer virus. Once the virus is in the computer it can spread throughout, infecting other files and potentially damaging the operating system itself.
A computer worm is a program that repeatedly copies itself and is similar to a computer virus. However, a virus needs to attach itself to an executable file
478 words - 2 pages
Lecture 1: Hello World!
The Very Basics
What is a computer?
What is a computer program?
• Series of commands that the computer interprets and
• For a program to accomplish a task the commands
must be put together in a meaningful way.
What are the ingredients of a program
that does something?
• The program must be written in a programming language that the
computer can understand. There are several languages: Pascal, Fortran,
C++, Java etc.
• The program must follow the rules of the language. The programmer
must know the words and the grammar.
• The instructions must be written in the correct sequence.
• The totallity of
1348 words - 6 pages
, Computer Science or Electrical Engineering, the central ideas in Computer Organization is the same. Thus, the emphasis of this is to show the relationship between hardware and software and to focus on the concepts that are the basis for current computers.
The computer lies at the heart of computing. Without it, most of the computing disciplines today would be a branch of theoretical mathematics. To be a professional in any field of computing today, one should not regard the computer as just black box that executes program by magic. We, students of computing should acquire some understanding and appreciation of a computer system’s functional components, their characteristics, their performance, and
1038 words - 5 pages
8.0 PROGRAMMING 8.1.1 Definition Program : Programming Language:
8.1 Introduction to Programming
Prepared by : Pn. Marzita Ismail (SC Unit)
a series of instructions that directs a computer to perform tasks. A set of words, abbreviations, and symbol that enables a programmer to communicate instructions to a computer Eg: Java, C++, Fortran, Cobol, C 8.1.2 Types of Programming Language:
1) Low Level Programming Language
• • Why Low Level? : Because it is designed closer to the hardware Machine Language (1st Generation) Assembly Language (2nd Generation) Made up of instructions written in binary code (0 and 1). • Written in mnemonics, more English-like code; codes shorter than The
552 words - 3 pages
computer technology such as hardware, software and Internet. Examples of laws of computing in Malaysia include the Malaysian Communication and Multimedia Act, the Computer Crime Act 1997 and the Telemedicine Act 1997. WHY DO WE NEED ETHICS & LAW IN COMPUTING? Ethics and law are needed i computing to: • • • Respect Ownership Respect Privacy & Confidentiality Respect Property
Respect Ownership We must respect ownership by not stealing other people’s work either by duplicating or distributing it. Duplicating and distributing copies of audio tapes, video tapes and computer programs without permission and authorisation from the individual or company that created the program are immoral and
970 words - 4 pages
library literacy programs and adult education classes trying to overcome her handicap. After doing everything she still had not learned to read, until she enrolled in a computer course program that taught her to read and write. Because of success stories like this it is crucial to support the use of computer technology in the classroom.
Although the advantages of having computer technology in classrooms outweigh the disadvantages, the writer can respect the concerns of the people who are against computer technology in the classroom. Many people argue the computer does all the work for the students, not allowing them the opportunity to digest what they have learned. Boyle (1998) argues that
1079 words - 5 pages
speaker, and then a famous-outsider speaker. This year I gave the faculty speech, about the sorry state of the world.
"Harmful to Children? The Alliance for Childhood Report" (a talk at the 2001 EuroLogo conference in Linz). A first pass at a response to Fool's Gold, a report condemning the use of computers in primary education. Some of the points in the report are as applicable to Logo as to other forms of educational computing, but Logo escapes from other criticisms in the report.
"Reasoning with Computers" (a talk at the 1997 EuroLogo conference in Budapest). One of the programming projects I used in my Logo-based computer science books is a program that solves logic puzzles. This
656 words - 3 pages
End User License Agreements
Microsoft Software License Terms
User Rights Granted by Microsoft
Write a paragraph defining the rights of the user in Microsoft’s EULA. Your paragraph must include what rights the user has to use, copy, and install the software. Can you sell or transfer the software to someone else? On how many devices may you install the software?
Microsoft’s EULA states that the user has the right to install 1 copy of the software on 1 computer to be used by one person at a time. One cannot sell the software. They can however transfer it with seemingly strict guidelines. They may do so directly on a licensed computer with a COA. The user may
655 words - 3 pages
automatically reboot after 72 Hours
5. Windows Easy Transfer supports migration using any removable storage medium common to the two computers except Floppy Disks – They have insufficient capacity.
6. The Windows 7 component that enables the computer to support more than one language is called the MUI (Multi-Language User Interface)
7. The reason it is possible to remove the Windows 7 installation disk to supply the Setup program with drivers is that Windows PE run on a RAM disk.
8. To upgrade Windows XP to Windows 7, you must perform a Clean Install.
9. The files and settings that Windows Easy Transfer can migrate to a Windows 7 computer and primarily stored
603 words - 3 pages
* Cache: Two types of caching are commonly used in personal computers: memory caching and disk caching. A memory cache, sometimes called a cache store or RAM cache, is a portion of memory made of high-speed static RAM (SRAM) instead of the slower and cheaper dynamic RAM (DRAM) used for main memory.
* Backside bus: backside bus, is a computer bus used to connect the CPU to CPU cache memory, usually L2.
* Processor: usually measured in GHz. A part of a computer, such as the central processing unit, that performs calculations or other manipulations of data. A program that translates another program into a form acceptable by the computer being used.
* System bus: A system bus
255 words - 2 pages
is the most important component in the computer because it actually is the part that runs the programs.
2- A bit that is turned off is represented by “0”. A bit that is turned on is represented by “1”
3- A device that work with binary data is called a digital device.
4- The words that make up a high level programming language are called keywords.
5- The short words that are used in assembly language are called mnemonics.
6- The compiler only translate a high level language program into a separate machine program, while the interpreter both translates and executes the instructions in a high level program.
7- The type of software that controls the internal operations of the computer’s hardware is the operating system.
1741 words - 7 pages
Keeping information secure in the workplace
A hacker is a person who breaks codes and passwords to gain unauthorised entry to computer systems. A system hacker knows about designing and maintaining operating systems and a password hacker knows how to find out someone else's password.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers enjoy learning more about how computers work and get excitement out of cracking the security of remote computer systems. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life
9431 words - 38 pages
into the main memory of the computer, as and when required, for processing.
* Versatility: Computers are quite versatile in nature. They can perform multiple tasks simultaneously with equal ease. For example, at one moment it can be used to prepare a letter, at the other moment it can be used to play music and in between one can print a document as well. All this work is possible by changing the program (sequence of instructions for computers).
* Diligence: Computer, being a machine, does not suffer from the human traits of tiredness and lack of concentration. If four million calculations have to be performed, then the computer will perform the last four-millionth calculation with the
291 words - 2 pages
Unite 2 home work
UNIT 2 HOME WORK
1. What does a professional programmer usually do first to gain an understanding of a problem?
.Break the larger problem into independent sub-problems
2. What is pseudocode?
Pseudocode is a detailed yet readable description of what a computer program or algorithm must do, and is expressed in a formally-styled natural language rather than in a programming language.
3. Computer programs typically perform what three steps?
a. Determine the Procedures and Services to Report
b. Identify the Correct Codes
c. Determine the Need for Modifiers
4. What does the term “user-friendly” mean?
That the software or device
953 words - 4 pages
* Scan all files and information contained on portable media and storage devices (such as DVDs, USB drives, floppy disks, etc.) for malware and malicious code prior to being used on any department information systems (such as laptops, PDAs, desktop computers, etc.).
Anti-virus software is used to prevent, detect and remove a range of malware, including computer viruses, worms, trojan horses, adware and spyware.
Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
A piece of unwanted
266 words - 2 pages
PT1420 Wk 3 Unit 3
James W. Norris, II
April 14, 2013
What is reverse engineering? Ans: Reverse Engineering is taking apart an abject to see how it works in order to duplicate or enhance the object. This practice is frequently used on computer hardware and software.
What are the advantages and disadvantages of using reverse engineering to discover the logics of a software program? Ans: Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a “bug” or error in the program.Hardware reverse engineering
5065 words - 21 pages
most popular methods is recycling all computer parts. Most computer hardware can be reused in some way. These companies will pick up any obsolete computers and other hardware that needs to be disposed of. These companies are regulated by the Federal Environmental Protection Agency. By recycling and reusing electronic waste the amount of hazardous materials released in the environment is reduced. Also by recycling and reusing electronic material it will reduce the quantities being put in landfills. In some states computers that were recycled get refurbished and donated to schools. The computer refurbishing program is also used as a great training tool for young adults and others to gain real
951 words - 4 pages
With the introduction of computer accounting as an area of studying has outline it’s important because with two or three weeks of training, a computer program can prepare financial statement using computer application.
Accounting is an important function in the business sector. It helps business to keep records of income and expenses that occurs to the day to day activity of the organization or business. Accounting involve in the preparation of general journal, spreadsheet, ledger sheet and others which frightens and makes it difficult to some people. In the computerized accounting section, it helps make it easy and interesting to the individual. Indeed computerized accounting has a
640 words - 3 pages
The Triumph of the nerds Paper
The first true nerds were young men who obsessed over computer programming. They would stay up for days at a time to program, not talk to anyone, smell terrible, and fell in love with computers. They developed the first more or less working computers and some applications, better operating systems and such. Nerds created programs for fun, tried to take over the computer market, and continued to expand their knowledge.
Impressing Their Friends-The first computer developed by these nerds was developed in a garage in Silicon Valley. Every one of them built a version of a computer in their garages. Ed Roberts developed the Altair (first personal computer
1090 words - 5 pages
of software used in western world
Importance of MS Office
1. To merge different software application into a suite package allowing users to navigate
2. Share resources between application
3. The integration of software applications in the suite package, but yet allows each software program to keep its own identity
* Is a full-featured word processing program
* Created by Microsoft and first released for windows 1995
* Offers the ability to save, edit and view XML documents
* Extensible Markup Language
* Is to coding language similar to HTLM that is used to create and edit web documents
MS Power Point
* Design for the macintch computer
1101 words - 5 pages
firewall from his computer. We could see where, when, and to whom he was sending the emails too. This is the downside of privacy rights in the workplace. People can do things like that with emails and not think that they will get caught. This person was caught and terminated. I do not know what happened outside of that. So what do you think? Is big brother is watching you while you send email?
Along with your emails the company firewall can monitor your Internet usage. It also keeps logs of what websites, when you went to them, and who visited them. A firewall is computer program that monitors Internet traffic in and out of the company’s private network. This program can be setup to
909 words - 4 pages
Operating systems are event driven collection of programs that manages integrate hardware and software services and makes them available to users, hardware, and other operating systems. The main goal for an Operating system is to make it easier for users and I/O devices. The major services of the operating system are:
User Interface and Command Execution Services
The main purpose of this service is to be an intermediate between the user and the computer. The two main interfaces are the Graphical User Interface GUI and the Command Line Interface CMI. As their names suggest with the GUI everything is primarily displayed as images and somewhat “dumb-ed” down for users. The CMI mechanism
1488 words - 6 pages
student and school, all from paying for classes, emailing instructors, and selecting classes even live help is available at certain campuses all across the country thanks to the innovation of the computer. Now schools have computer labs, which allow accesses to resources others may not have accesses to at home as well as applications they may not be able to afford. Schools have these computer program applications available for student use some examples are; teaching software development, hardware design these types of applications are considered indispensable to the modern computers. Reich illustrates the data management by computers in teaching music "songs, instrumental pieces, recordings
1304 words - 6 pages
) computer for the school's students. Gates took an interest in programming the GE system in BASIC, and was excused from math classes to pursue his interest. He wrote his first computer program on this machine: an implementation of tic-tac-toe that allowed users to play games against the computer. Gates was fascinated by the machine and how it would always execute software code perfectly. When he reflected back on that moment, he said, "There was just something neat about the machine." After the Mothers Club donation was exhausted, he and other students sought time on systems including DEC PDP minicomputers. One of these systems was a PDP-10 belonging to Computer Center Corporation (CCC
303 words - 2 pages
interface between two different media so that the wavefront returns into the medium from which it originated. In computer science, reflection is the ability of a computer program to examine and modify the structure and behavior of the program at runtime. Reflection also occurs at the surface of transparent media, such as water or glass.
An optical fiber is a flexible, transparent fiber made of extruded glass or plastic, slightly thicker than a human hair. It can function as a waveguide, to transmit light between the two ends of the fiber. The degragation of signal strength can be caused by light scattering, molecular level irregularities in the glass structure, and UV-Vis-IR absorption
318 words - 2 pages
n: Computers and Technology
Review Questions Chapter 1
1.3 Describe the approach taken to the handling of data in the early file-based systems.
In the early file based system their all data was in written form, due to the lake of education, due to the in-familiarity with new techniques, lake of computer knowledge so all the data required would be stored in a file or files owned by the programs.
Discuss the disadvantages of this approach.
Different programs could be written in different languages, and would not be able to access another program's files. This would be true even for those programs written in the same language, because a program needs to know the
282 words - 2 pages
theproliferation of computer system that obliges to meet the goal of Information technology.
This problems are commonly encountered on the current Salesand Inventory System of Tacloban ACME Hardware? What must be proposed to make it happen? What are the input needed to develop this type of program. We will be using Microsoft Visual Basic 6.0 develop our program and we will be using Structured System Analysis And Design for our Methodology.
3. COMPUTERIZED MANAGEMENT AND MONITORING SYSTEM FOR MONTEJO NEWSPAPER SUPPLY AND MAGAZINE DISTRIBUTOR
Introduction: The used of manual processes in business has decline since the rise of computerized and automated systems. And in
1747 words - 7 pages
• Rogue software program that attaches itself to other software programs or data files in order to be executed
• Independent computer programs that copy themselves from one computer to other computers over a network.
• Trojan horses
• Software program that appears to be benign but then does something other than expected.
• Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
• Key loggers
• Record every keystroke on computer to steal serial numbers, passwords, launch
656 words - 3 pages
Week 3 Reflection
Novemember 21, 2013
Week 3 Reflection
BIS/220 Introduction to Computer Applications Systems is a course that describes how database are used in the work environment, explains the benefits of collaborating tools to the work environment, and compare types of electronic commerce. A database collects records or stores information that is stored in a computer in a logical manner so that the information can be stored, managed, or retrieved. Databases are useful for large amounts of data and producing reports and documents for school or a workplace environment. There are a number of ways that the database can contribute to the success
604 words - 3 pages
Children today learn how to use a computer as soon as they are able to get their little fingers on one. It’s a different world than it was 20 years ago. Kids are given I-pads in school instead of notebooks. Almost everyone has access to the Internet at all times on his or her telephones. Technology is at our fingertips at almost every minute of our day. There is really no way for a parent to keep their child from technology unless they literally keep them in a cave. Seeing as how that may not be realistic, software developers have created a way for parents to keep their children safe while using technology. They have created parental control programs.
Parents control programs allow
1619 words - 7 pages
Its function is to get and execute the next command statement.
Operating System Services
Program execution – system capability to load a program into memory and to run it.
I/O operations – since user programs cannot execute I/O operations directly, the operating system must provide some means to perform I/O.
File-system manipulation – program capability to read, write, create, and delete files.
Communications – exchange of information between processes executing either on the same computer or on different systems tied together by a network. Implemented via shared memory or message passing.
Error detection – ensure correct computing by detecting
356 words - 2 pages
Apple Inc.(part 5)
Critical Thinking Question
-What early advances in information technology did Apple Computer develop?
Apple Computer developed a worldwide computer network that connected Apple’s employees, sales force, dealers, and third-party developers. It is now thought of as the basic form electronic mail which connected each segments with each other regardless of location and time. In simple, it was a direct connection for internal company support; intranet.
-How were these early advances precursors to later developments at Apple?
Later the early developments lead to the development of AppleLink Personal Edition, which allowed e-mail exchanges among personal computer
421 words - 2 pages
Answer: 4.00 GB of RAM
Exercise 1.6.5 Access the System Information window on your Windows machine and record the type of processor and the processor speed for the computer.
Answer: Intel 1.40GHz, Celeron 1.40GHz
Exercise 1.6.7 Open the Task Manager in Windows. What type of information about the computer is available? How would this be useful for monitoring your system?
Answer: Applications that are currently running, Processes, services, performance, networking and users. This is useful because you can monitor the system to make sure that it is running properly and can be used to force a program to close that is not working properly.
Exercise 1.6.8 With the Task Manager open in Windows, sort the running processes by CPU cycles. What process is using the most CPU time? Sort the processes by memory. What process is using the most RAM?
Answer: 1. System Idle is using the most CPU time. 2. AdobeARM is using the most RAM.
435 words - 2 pages
labor; improvement in organizational and departmental techniques; management of day-to-day activities (as accounts, stock control, payroll, etc.); day-to-day assistance in a Department and closer contact with the rest of the world. MIS provides a valuable time-saving benefit to the workforce. Employees do not have to collect data manually for filing and analysis. Instead, that information can be entered quickly and easily into a computer program. As the amount of raw data grows too large for employees to analyze, business analysts can build programs to access the data and information in response to queries by management. With faster access to needed information, managers can make better
1335 words - 6 pages
takes off and flies.
The CAVE is a new virtual reality interface that engulfs the individual into a room whose walls, ceiling, and floor surround the viewer with virtual space. The illusion is so powerful you won't be able to tell what's real and what's not. Computer engineers seem fascinated by virtual reality because you can not only program a world, but in a sense, inhabit it.
Mythic space surrounds the cyborg, embracing him/her with images that seem real but are not. 2 The sole purpose of cyberspace virtual reality technology is to trick the human senses, to help people believe and uphold an illusion.
Virtual reality engineers are space makers, to a certain degree
474 words - 2 pages
removable storage medium common to the two computers except Blank. Floppy Disks
6. The Windows 7 component the enables the computer to support more than one language is called the Blank. Multilingual User Interface Pack
7. The reason it is possible to remove the Windows 7 installation disk to supply the Setup program with drivers is that Windows PE runs on a Blank. RAM Drive
8. To upgrade Windows XP to Windows 7, you must perform a Blank. Clean Installation
9. The files and settings that Windows Easy Transfer can migrate to a Windows 7 computer are primarily stored in Blank. Registered Files
10. As a pre-installation environment, Windows PE is a vast improvement over MS-DOS because it includes internal support for Blank and Blank. NTFS File System & FAT File System
3373 words - 14 pages
DESIGN AND ANALYSIS OF ALGORITHM
GROUP THREE(3) ASSIGNMENT
THE KOLMOGOROV COMPLEXITY ALGORITHM
In algorithmic information theory (a subfield of computer science and mathematics), the Kolmogorov complexity (also known as descriptive complexity, Kolmogorov–Chaitin complexity, algorithmic entropy, or program-size complexity) of an object, such as a piece of text, is a measure of the computability resources needed to
1021 words - 5 pages
products with a myriad of features and can be assessed without any financial risk.
In the initial process, a barcode scanner is needed to scan the barcode or the information encoded on the item. The scanned information is then sent to and tracked by a central system. A prime example of this process is entailed in purchasing an order. A list of items that are due to for shipping and packing should be included with the purchase order. With this system in process, it should be helpful to locate the items, encode shipping information, and remove purchased items for an accurate count. Along with the barcode scanner, a mobile computer would be necessary for the automated process to serve as the
531 words - 3 pages
) describes the processor in terms of what the assembly language programmer sees the instructions and registers. All computer programs are translated to machine code for execution by the CPU. Once a program has been loaded into the computer’s memory. The program may then be executed. Many modern processor designs are so called RISC (Reduced Instruction Set Computer) designs which use relatively small instruction sets, in contrast to so called CISC designs such as the VAX and machines based on the Intel 8086 and Motorola 68000 microprocessor families. Operating instructions also include instructions that move data between registers and manipulate stacks. Memory-access instructions are those that
1326 words - 6 pages
search parameters, such as company name, date, publication name, and authors name.
External Databases – is a data storage facility that is located at an independent [FREE] site allowing multiple users to access it simultaneously. These mainly used by big company which having large amounts of data to store.
Search Engines – is a special computer program that asks a user for a word or group of words to be found. Ex. Yahoo, Google, Ask etc.
Extranets allow the sharing of sensitive computer-based information with other firms using information technology commonly associated with the Internet.
Interorganizational System [IOS] – is a combination of firms that are linked so that they
705 words - 3 pages
if you couldn’t delete file is that your computer would quickly run out of space due to all the clutter involved with the old unwanted or unneeded files. Another function is the ability to open files making it possible for programs to share files or for you to be able to access files. This function goes back to “file sharing” among the many programs within an operating systems provided the right permissions are made available to the outside program. There is also the ability to close files as well. This function allows software to stop using a file when it is no longer needed by that particular program. Without this function it would be like having a car with no brakes and a stuck gas petal
922 words - 4 pages
Republic of the Philippines
BATANGAS STATE UNIVERSITY
Don Claro M. Recto Campus
Marawoy, Lipa City
I. TITLE: BEATING PROCRASTNATION: A PROPOSED PROJECT DEDICATED IN ALTERINGPROCRASTINATION AMONG FRESHMEN COMPUTER-GAME-ENTHUSIAST STUDENTS
II. DESCRIPTION OF THE PROJECT:
The proposed action plan will consist of activities wherein the developers prepared a preventive approach. The first part will cover the introduction of time management and procrastination and its consequences. This is only the initiation of orienting the target subject by means of conducting a half-day seminar. Followed by uniting the students through team building and workshop, this is to understand and know
1687 words - 7 pages
Pacific Computer College especially the registrar because it will be made easy for them to compute the grades and monitor the grades of the students. This will help them managed will in the processing of the students semestral grades through the proposed system.
Particulalrly to the students, it is significant to them because through this program students can update and monitor their grades every end of the semester, through this computerized monitoring grading system.
The study must also be helpful to the future studies related to this because this will help them substantiate the data they needed.
Below is the mission and vision of the
789 words - 4 pages
The operating system that we use on our computers is the most important program that we have. Every computer used for home or business must have an operating system to run other programs. They perform basic tasks and recognize the input from the keyboard and output to the display screen. They keep track of files stored on your computer and control disk drives and printers. (Beal, N.D) There are five basic functions of an operating system. They are:
* Booting the computer
* Performing basic computer tasks like the mouse and keyboard
* Provides a user interface such as a command line or a graphical user interface
* Handles system resources such as a computer’s memory
705 words - 3 pages
OS will make sure that your computer's hardware is never overtaxed.
The OS also allows programs to run on a computer. Without an OS, a programmer would have to design an application to run on the hardware directly. This isn't very efficient, so operating systems act as an application interface to the hardware. The OS does this through the application program interface. Program developers build applications for the (API). Assuming the programmer has done a good job at building an application without any serious bugs, it should run smooth on the operating system.
Linux is an
4836 words - 20 pages
Prof. Yuh-Shyan Chen
Department of Computer Science and Information Engineering
National Taipei University
Prof. Chih-Shun Hsu
Department of Information Management
Shih Hsin University
Green computing architecture
Regulations and industry initiatives
Approaches to green computing
• In 1992, the US Environmental Protection Agency
launched Energy Star, a voluntary labeling program which
is designed to promote and recognize energy efficiency in
monitors, climate control equipment, and other
• “Green computing" was probably coined shortly after the
258 words - 2 pages
Organizational Planning-Goals and objectives, strategic and program plans
Organizational Operations-performance expectations within the department, program, and units.
Human Resources-Reports required, data and information on staff qualifications, licensing, certification, staff development and training
Technical Resources-Computer hardware, software, communication equipment, new developments
Financial Resources-Keeping track of revenues/expenditures, cash flow, and indications of financial problems.
480 words - 2 pages
Personal Learning Management
University of Phoenix
Algorithms and Logic for Computer Programming
March 07, 2013
Personal Learning Management
Being able to develop a management tool that would allow a user or student to review course material would be very beneficial. With a course such as programming that has so much information, it is important to be able to recall information in order to properly understand how programming works. I for example, do not have any prior knowledge of so I would have to continuously refresh the information that I have learn in the reading as well as in the class room environment. I will be discussing some topics that are