Premium Essay

Pt1420 Unit 2 Research

In:

Submitted By kokuly
Words 405
Pages 2
Kelli Okuly
PT1420
Unit 2 Research Assignment
12-5-2014

Variable naming conventions vary from program to program. In Visual Basic the variable must begin with a letter and you cannot use a space, period (.), or the characters !, @, &, $, # in the name. Visual Basic variable names must be under 255 characters long. You shouldn't use any names that are the same as the functions, statements, and methods in Visual Basic. You end up shadowing the same keywords in the language. To use a basic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Precede the fundamental function, statement, or method name with the name of the associated type library. For example, if you have a variable called “Left”, you can only use the “Left” function using “VBA.Left”.
In Python, variables must begin with a letter or underscore (_). Other characters can be letters, numbers, or the underscore. Python variables are case sensitive and can be any length, within reason. There are several keywords in Python that are reserved for other functions and cannot be used as variables. For example; print, def, from, not, and return.
Variables in Java are referred to as Identifiers. In Java the variable must begin with a letter, an underscore, or a dollar sign ($) although a letter is typically what is used. The other characters may be letters or numbers, no spaces or special characters are allowed. Java identifiers can be any length within reason. These variables are case sensitive, using all uppercase letters are primarily used to identify constant variables. Like Python, there are certain keywords or reserved words that cannot be used as a variable name. Examples of these keywords are assert, break, case, default, and final.
There are three similarities between naming conventions in Visual Basic, Python, and Java. First

Similar Documents

Premium Essay

Pt1420 Unit 2 Research Paper

...The following question appeared in paper 2 of the June 2015 additional examination (actual question number 4.3): Drug-testing kits are sometimes used in schools. The current drug test which uses blood or urine samples is considered to be too personal (invasive). A new drug test, the Saliva Drug Test (SDT), uses saliva and is considered to be less personal than the current test. It can be used to test for up to 9 different types of drugs. The pictures below show the drug-testing instrument and the swab used to take a sample of saliva. The tree diagram below shows the outcomes of the SDT after testing the saliva of the same person twice. Study the tree diagram above to answer the following questions. 1. Give the probability (as a common fraction) of obtaining both...

Words: 624 - Pages: 3

Free Essay

Itt Technical Institute Pt1420 Unit 2

...David Camacho PT1420 Programming Lab 2.1 Display Welcome to the Fiber Optic Calculator Program. Enter company name. Enter the number of fiber optic cable needed. Multiply .87 times the feet needed for the total cost. Display the total cost of the fiber optic cable and the company name. Purpose of Variable | Variable Name | Stores cost of fiber | fiberCost | Stores the company name | firstChoice | Stores the number of feet to be installed | 50 | Stores the calculated cost of installed fiber | .87 | Display “Welcome to the Fiber Optic Calculator Program” Set fiberCost = .87 Display “What is the company name?” Input companyName Display “How many feet of fiber will be installed” Input feetInstalled Set totalCost = fiberCost * feetInstalled Display “For the company” , companyName, “the total cost will be $” , totalCost David Camacho PT1420 Lab 2.2 Flowchart David Camacho PT1420 Programming Lab 2.3 Visual Studios Program David Camacho Unit 2 HW Assignment 1 Short Answer 1.What does a professional programmer usually do first to gain an understanding of a problem? The programmer creates a design for the program, which starts by asking the customer what they need the program to accomplish. 2.What is pseudocode? Pseudocode is an informal language that has no syntax rules, and is not meant to be compiled or executed. 3.Computer programs typically perform what three steps? Step 1: Input is received. Step 2: Some process...

Words: 718 - Pages: 3

Premium Essay

Home Page » Computers and Technology Pt1420 Unit 1 in: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” Itt Technical Institute Intro to Programming – Pt1420 Unit 1 Assignment 1 Short Answer Questions 1.

...Home Page » Computers and Technology Pt1420 Unit 1 In: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An operating...

Words: 393 - Pages: 2

Premium Essay

Unit 1 Pt1420

...Unit 1 Research 1 PT1420 In the 1970s the programming language that was most popular was Pascal. Pascal was designed in 1968-69 but published in 1970. Niklaus Wirth created the Pascal language to “1) make available a language suitable for teaching programming as a systematic discipline based on fundamental concepts clearly by the language, and 2) to define a language whose implementations could be both reliable and efficient on then-available computers. In 1972 the C programming language was developed by Dennis Ritchie. C was created to work with the system Unix. “Unix gives C such advanced features as dynamic variables, multitasking, interrupt handling, forking, and strong, low-level, input-output. Because of this, C is very commonly used to program operating systems such as Unix, Windows, the MacOS, and Linux.” In the 1980s the popular programming language was C++. C++ was developed at Bell Laboratories. C++ is a general purpose multi-paradigm spanning compiled language that has both high-level and low-level languages’ features. It was started as an enhancement to the C programming language, Bjarne Stroustrup in 1979. In the 1990s Java was the popular programming language. It was created in 1991 developed by James Gosling at Sun Microsystems and release in 1995. In the 2000s Visual Basic (VB) was popular in the programming world. VB was developed from BASIC which was originally developed in 1964 by John Kemeny and Thomas Kurts. VB is a Microsoft programing language and software...

Words: 261 - Pages: 2

Premium Essay

Homework

...Denietra Franklin PT1420 Juan Hernandez 4/13/2015 Unit 4 Research Assignment 1. List 5 advantages and 5 disadvantages of using global variables. Advantages: 1.It is accessible to all the modules in a program. 2.You only have to declare it once outside the modules. 3.It is good to use it for constants you want to keep consistant. 4. It simplifies maintenance, avoids duplication of local constants. 5. It can make a program easier to read in reference to constants. Disadvantages: 1.It makes debugging difficult. 2.Any statement in a program can change the value. 3.If modules use global variables it is dependent upon the module and if other modules are presented you have to redesign all over each time. 4.It makes a program hard to understand since it can be modified and have to be aware of all other parts of the program that access it. 5.Global variables are not writing direct into flowcharts. 2. How can you declare global and local variables in flowcharts? Global variables are displayed in pseudocode but not in flowcharts directly. 3. How can you declare global and local variables in pseudocode? You can declare variables using the Global, Local, or Component statements, or you can use local variables without declaring them. Here are some examples: Local Number &AGE; Global String &OPER_NICKNAME; Component Rowset &MY_ROWSET; Local Any &SOME_FIELD; Local ApiObject &MYTREE; Local Boolean &Compare = True; Variable declarations...

Words: 314 - Pages: 2

Premium Essay

Nt1230 Syllabus

...Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Free Essay

Unit 6 Research Paper 1: “Advantages and Disadvantages of Using Case Structures”

...PT1420 Unit 6 Research Paper 1: “Advantages and Disadvantages of Using Case Structures” Advantages: Because of their many important advantages and extreme popularity, use cases have become a fundamental part of object technology and have been incorporated in one form or another into most major object-oriented development methods. 1.You can create logic flows; in which is a method used to make the reading easier for the reader. 2.Because they are written in natural language, use cases are easy to understand and provide an excellent way for communicating with customers and users. 3.Static depth, in which “if” can be set to however amount the user wants. 4.Low CPU overhead. 5.You can insert certain captions using “< >//” 6.As a user-centered technique, use cases help ensure that the correct system is developed by capturing the requirements from the user's point of view. ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Disadvantages: In the rush to jump onto the use case bandwagon, use cases have been perceived by some as either a panacea or as an end in-and-of themselves. Unfortunately, this has often led to the uncritical acceptance of use cases without any examination of their numerous limitations and ample opportunities they offer for misuse...

Words: 426 - Pages: 2

Premium Essay

Its Making Put Something Here

...PT1420 Introduction to Programming Week-2 Lesson Plan TUE 6:00 PM to 10:30 PM Instructor: Tushar Patel (tspatel02@yahoo.com, tpatel@itt-tech.edu) CLASS: Topic: Unit 2: Software Program Design I Course Objectives Covered by This Unit CO2: Design programs by using flowcharts and pseudo code. CO3: Write programs that perform input, processing, and output. Unit Learning Outcomes LO8: Determine program input, processing, and output stages. LO9: Create the necessary flowcharts to describe a program’s structure. LO10: Use pseudocode to define a program’s structure. LO11: Formulate solution algorithms for calculations by properly following the order of operations. Key Concepts ▪ Determining input, process, and output ▪ Creating flowcharts and pseudocode ▪ Formulating algorithms Reading ▪ Gaddis, Chapter 2: “Introduction to Computers and Programming,” pages 29-55 Resources: • Data Projector • ITT Virtual Library • Text Books • Visual Studio • Lab Computers • Student Removable Hard Drive • VM Ware Player Methods: • Lecture • Group Discussion • Lab Work • Review exercise / Research Papers • Quiz Brief Lesson Overview: Today’s lecture we would be discussing the following topics. • Discuss how all programs basically consist of a three-step process: input, process, and output. Use the payroll calculation program...

Words: 895 - Pages: 4

Free Essay

Unit 6 Pt1420 Introprogramming

...Delvon Frye 7/26/2016 PT1420 Unit 6 Assignment Algorithm Workbench pg. 159 6-10 6. Select number Case 1: Display “You selected A.” Case 2: Display “You selected 2.” Case 3: Display “You selected 3.” Case 4: Display “You selected 4.” Default: Display “Not good with numbers, eh?” End Select 7. If Speed 24 > and Speed < 56 Display “Speed is normal.” Else Display “Speed is abnormal.” 8. If points are < 9 and >51 Display “Invalid points.” Else 9. Display “Valid points.” Select testMonth Case value_1: Display “January has 31 days.” Case value_2: Display “February has 28 days.” Case value_3: Display “March has 31 days.” Default: Display “Invalid selection.” End select 10. If hours==10 THEN Programming Exercises 5 and 8 pg. 160 5. Dim color1 as string Dim color2 as string Display (“Please enter two primary colors.”) Display (“The color you made is Purple”) Else Display (“The color you made is Purple”) Else Display (“The color you made is Orange”) Else Display (“The color you made is Orange”) Else Display (“The color you made is Green”) Else Display (“The color you made is Green”) Else If color1 = else or color2 = else then Display (“You failed to enter a valid color!”) End if 8. //This is a program asks the user to enter the number of coins required to make exactly one dollar. //Declare the variables Declare Real pennies Declare Real nickels Declare Real dimes Declare...

Words: 533 - Pages: 3

Free Essay

Research Assignment 1

...Unit 1 Louis Billings Research Assignment 1 PT1420 1. C# This general-purpose programming language developed by Microsoft evolved from C and C++ as a part of the software company’s .NET initiative. the C++ programming language standard was ratified in 1998 as ISO/IEC 14882: 1998. The standard was amended by the 2003 This language is an essential part of the .NET framework, so developers who use Microsoft heavily will find it critical, according to Duqaine. 2. Java  An object-oriented programming language developed in the late 1990s by James Gosling and colleagues at Sun Microsystems. This “beautiful” programming language is central for any non-Microsoft developer, i.e. any developer who focuses on the non-.NET experience. It is mostly derived from C and C++ but has a more basic object model. It ranked first on TIOBE’s list of most popular programming languages. 3. Objective-C This object-oriented programming language created first by Brad Cox and Tom Love at their company Stepstone in the early 1980s, adds Smalltalk-like messaging to the C programming language. This language is most used on the Apple iOS and Mac OS X. Objective-C is the principal language used for Apple's Cocoa API as well. 4. C++ is a general purpose multi-paradigm spanning compiled language that has...

Words: 404 - Pages: 2

Premium Essay

U1Ra1 - Exploring Programming Languages

...Shannon Sarratt June 24, 2014 PT1420 Unit 1, Research Assignment 1: Exploring Programming Languages 1970’s: 1. C- created by Dennis Ritchie in 1972. It was designed to be compiled using a relatively straightforward compiler, to provide low-level access to memory, to provide language constructs that map efficiently to machine instructions, and to require minimal run-time support 2. SQL- Designed by Donald D. Chamberlin and Raymond F. Boyce in 1974. It was designed to manipulate and retrieve data stored in IBM's original quasi-relational database management system, System R, which a group at IBM San Jose Research Laboratory had developed during the 1970s. 3. Scheme- Developed by Guy L. Steele and Gerald Jay Sussman in 1975. Scheme started as an attempt to understand Carl Hewitt's Actor model, for which purpose Steele and Sussman wrote a "tiny Lisp interpreter" using Maclisp and then "added mechanisms for creating actors and sending messages. 4. Smalltalk- Designed by Alan Kay, Dan Ingalls, and Adelle Goldberg in 1972. The first version, known as Smalltalk-71, was created by Ingalls in a few mornings on a bet that a programming language based on the idea of message passing inspired by Simula could be implemented in "a page of code." 5. Prolog- Designed by Alain Colmerauer in 1972. Its intended field of use was natural language processing. 1980’s: 1. C++- Designed by Bjarne Stroustrup in 1983. The motivation for creating a new language originated from...

Words: 747 - Pages: 3

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Unit 2 Research Assignment

...Unit 2 Research Assignment 1 Chris Stephens ITT Technical Institute PT1420 Introduction to Programming Mr. Chamberlin April 1, 2014 Researching Variable Naming Rules The variable naming rules for Visual Basic, Python, and Java have many different facets to them. These are the most common and most used programming languages in use today. Over the years these languages have become more user-friendly and easier to comprehend to write programs. Visual Basic is most used in introductory program writing and common for students’ first learning of programming. Some of the naming rules for Visual Basic are: the first character of the name must be a letter, you can’t use a space, period, exclamation point, or these special characters - &, @, $, or # in the name, the name cant’ exceed 255 characters in length, and Visual Basic isn't case-sensitive, but it preserves the capitalization in the statement where the name is declared. (Microsoft, 2014) Python provides a special process called the PEP process, short for Python Enhancement Process for changes proposed to Python. (University, 2014) Some of the naming rules for Python are as follows : indentation should be done using four spaces per indentation level, lines should be less than 80 characters as compared to Visual Basic and its use of a maximum of 255 characters, and lines that get too long should be aligned in a “reasonable” fashion, for example aligned with an open delimiter and at a different...

Words: 625 - Pages: 3

Premium Essay

Nt2640

...associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Premium Essay

Pt1420 Unit 1

...“Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An operating system controls the internal operations of the computer’s hardware. Unit 1 Research Assignment 1 * What were...

Words: 1534 - Pages: 7