Free Essay

Sequence the Work and Execute

In:

Submitted By arevika
Words 4514
Pages 19
Sequence the Work and Execute the Plans Self-Assessment
Introduction
Course Overview
Welcome to the CPIM Execution and Control of Operations — Sequence the Work and Execute the Plans self-assessment course.

This introduction provides an overview of the CPIM program, this course, and further preparation for the certification examinations.

The CPIM certification is the recognized standard for individual assessment in the field of production and inventory management. The certification is designed to validate the candidate’s in-depth knowledge of a variety of subjects specific to the field. APICS has ensured that CPIM exams are consistently reliable and that the highest professional standards are used in developing and administering the program. The program consists of five examinations and the candidate must pass all five examinations to earn the CPIM designation.
The examinations that make up the program are: • Basics of Supply Chain Management (BSCM) • Master Planning of Resources (MPR) • Detailed Scheduling and Planning (DSP) • Execution and Control of Operations (ECO) • Strategic Management of Resources (SMR)
A CPIM Exam Content Manual is published annually by APICS. It is a key resource for anyone preparing for the APICS certification examinations. The manual addresses all five of the examinations by documenting the scope of the module, the content outline, the key terms, and primary and secondary references. The CPIM Exam Content Manual can be ordered directly from APICS. Click here for APICS contact information.

The APICS Web site is www.apics.org. APICS is located in Alexandria, Virginia, USA, and the telephone numbers are: 1.800.444.2743 and 1.703.354.8851. The fax number is 703.354.8106. Course Components
This course gives you a chance to review key content points and assess your understanding of the Sequence the Work and Execute the Plans segment of the APICS CPIM Execution and Control of Operations tested body of knowledge. It addresses the interfaces for the planning and execution of production activities.
There are four topics in this course with a summary of key learning points and a set of assessment items for each topic. The topics are: • Execution and Control of Operations Concepts The execution and control processes use the resources of the organization to transform the detailed plans into products and services. The four subprocesses are: prioritize the work to be done, execute the plans and report the results, evaluate the results, and take any required corrective actions. These subprocesses must be consistent with the basic business choices made by the organization and integrated with the other planning and control functions. These relationships are explored in this topic. • Scheduling Production and Process Operations Priority plans identify what is needed and when, but they do not provide a schedule of the work to be performed by operations. The work must be scheduled to indicate when each work element needs to be completed in order to meet the priority plans. The work waiting at a resource must be prioritized so that schedules can be met and the work can be performed in an efficient manner. When there are schedule or capacity constraints, adjustments must be made to the schedules or to the resources. These are the aspects of the execution and control processes that are explored in this topic. • Authorizing and Reporting Activities for Push Systems The requirements for execution and control processes are affected by the nature of the production system. This topic explores the configuration of those processes when push production is used. The authorizing activities transform the detailed priority plans into work for operations to perform. The authorization is typically communicated by work orders, shop packets, and dispatching priorities. Operations must execute the work and report the resources used and the results produced. This data is then used in the control subprocesses and to communicate with other processes in the overall business planning and control system. • Authorizing and Reporting Activities for Pull Systems The requirements for execution and control processes are affected by the nature of the production system. This topic explores the configuration of those processes when pull production is used. The authorizing activities transform the detailed priority plans into work for the operations function to perform. The authorization is typically communicated by production schedules. Operations must execute the work and report the resources used and the results produced. This data is then used in the control subprocesses and to communicate with other processes in the overall business planning and control system. All of these processes are typically simpler when a pull production system is used than when a push production system is used. CPIM Examination Preparation
The tested body of knowledge for each of the examinations is very broad. It is defined by the literature for the field of resource management. Therefore, the teaching and testing cannot be exhaustive. They must be samplings of the broad body of knowledge.

This course presents questions that are similar to those on the certification examination. Your performance in the course will help you identify areas where you may want to do additional preparation before taking the certification examination. Course Scoring
Each question (also referred to as an item) in this course is scored as correct or incorrect. No partial credit is given for partially correct answers. Your score for each topic and your score for the course are maintained and reported to you in the course Conclusion. Your score for this course will be posted to your training plan record, so that you have a record of your scores for the three self-assessment courses for the Execution and Control of Operations module.

You will be given feedback on why the correct answer is correct and why the other options are not the best choice. You will also be given pointers to the core course that covers the topic being tested and to references that support the test item.

If you find that you need to refresh your memory about specific terms, you can easily link to terms in the APICS Dictionary. Execution and Control of Operations Examination
The Execution and Control of Operations module encompasses the principles, approaches, and techniques needed to schedule, control, measure, and evaluate the effectiveness of production operations. The emphasis is on applied and higher-thinking questions.

This module is made up of three major topic areas. The topic areas, and the approximate percentage of questions from each area, are shown in the table below.
|Topic Area |Approximate Weight |
|Sequence the Work and Execute the Plans |40% |
|Implement Controls and Report Results |25% |
|Evaluate Performance and Provide Feedback |35% |

ECO Concepts
Overview
This topic presents a summary of the key learning points for the Execution and Control of Operations Concepts course and assessment items on that area of the tested body of knowledge. The learning points are grouped around three specific subtopics: • Execution and control interfaces • Effects of business choices • Effects of improvement initiatives
When you have achieved an understanding of this topic, you will be able to: • Identify the interfaces between the execution and control processes and the other operations planning and control processes and the requirements for each interface • Select execution and control processes that are consistent with the basic business choices of the firm • Explain the effects of quality and process improvement initiatives Execution and Control Interfaces
Execution and control processes transform the detailed plans into products and services. • The planning functions communicate information to the execution function using the production plan, the master production schedule, material requirements plan, and capacity requirements plan. • The data communicated through the planning interfaces are execution inputs — what to make, when to make it, expected cost, scheduled completion time, and manufacturing standards. • The execution outputs provide feedback to the planning process — order status, completed orders, performance to standards, and notification of delays and problems. Effects of Business Choices
The execution processes must be consistent with the basic business choices made by the organization. The business plan and other long-range planning can be achieved if the execution function is designed to support it.

Whether the plan calls for a connected or disconnected flow, the objectives of a production layout are to reduce costs, time, and inventory, while increasing quality. Balancing customer requirements and operational limitations, the appropriate layout type can be determined.

Options include: • Functional • Job shop • Flow • Cellular • Hybrid production process Effects of Improvement Initiatives
The business plan may be consistent over a long period of time, but the execution process will continually be modified by quality and process improvement initiatives.

Quality initiatives start with: • Identifying the problem • Finding the root cause • Changing the process so the problem is not repeated
Process improvement initiatives are applicable in all environments to: • Streamline the production process • Reduce non-value-added activity • Ensure effective process execution • Deliver total customer satisfaction
Eliminating waste requires modifications to the execution process for continuous improvement. Scheduling Operations
Overview
This topic presents a summary of the key learning points for the Scheduling Production and Process Operations course and assessment items on that area of the tested body of knowledge. The learning points are grouped around four specific subtopics: • Scheduling production and projects • Scheduling operations • Managing priorities • Managing schedules
When you have achieved an understanding of this topic, you will be able to: • Select the most appropriate production scheduling approach for a given situation • Develop a project schedule using the critical path method (CPM) and identify the critical path • Select the most appropriate operations scheduling and loading approaches for a given situation • Calculate priority and sequence the work to be performed • Identify ways to adjust the schedule of work to be performed to honor capacity and schedule constraints Scheduling Production and Projects
A manufacturing operation may use a combination of approaches for production. For example, a company may produce both standard and customized products. In this case, the standard products may be produced on a dedicated line, while the customized items are produced in an area using the job shop layout. Each area would then use the appropriate scheduling technique.

The following are important in scheduling production and projects: • Operations that produce high-volume, low-variety items should implement rate-based scheduling tuned to marketplace demand. Rates can be applied to final assembly, subassemblies, and purchased components, considering the yield rates and quantity per the bill of material (BOM). • Operations that produce a wide variety of products in varied lot sizes require a high degree of planning and control. The tools and techniques of production and inventory management (P&IM) are most appropriate for this environment. • Operations that produce single-piece orders for specialized items use project management techniques such as critical path method (CPM), program evaluation and review technique (PERT), or Gantt charts to sequence individual task completion. The focus is on managing constraints and precedence relationships to maintain the overall project deadline and budget targets. Scheduling Operations
The execution and control processes use the information gained from the scheduling techniques to determine the priorities and, therefore, the sequence of work to be performed by a specific resource. The primary scheduling techniques used in manufacturing environments are forward scheduling and backward scheduling. • Forward scheduling assumes a start date and schedules operations in the order they are listed on the routing. It sequentially calculates start and finish times for each operation and lead-time element (Q-S-R-W-M), ultimately providing a projected earliest possible finish date. • Backward scheduling assumes a finish date and schedules operations in the reverse order they are listed on the routing. It sequentially calculates finish and start times for each operation and lead-time element (M-W-R-S-Q), ultimately providing a projected latest possible start date.
Additional consideration must be given to loading. Loading refers to the placement of work (load) within a particular time bucket, for a given work center. Loading represents demand for a resource (manpower or machine) and is considered to fill up available capacity. Two types of loading are finite loading and infinite loading. • Finite loading assigns work to time buckets only up to the rated capacity level. Any additional work is shifted to another period where capacity exists. • Infinite loading assigns work to time buckets without regard to capacity limits. Planners will observe underload and overload conditions and initiate appropriate actions. Managing Priorities
Managing queues is essential to satisfy business objectives, such as desired inventory targets and on-time delivery. Numerous formulas are available to calculate a priority sequence for the jobs in queue.

The rule selected will depend on what metric or metrics the company values — reduced average lateness, reduced work-in-process (WIP), reduced cycle time, improved on-time delivery. • Simple rules — such as earliest due date or first come, first served — are the easiest to use, but may not provide the optimal sequence. • Slack time and critical ratio tend to outperform the other techniques because they consider due date and work remaining. • Dysfunctional rules — such as highest value job, highest piece rate, and last come, first served — should be avoided because they yield results which are not consistent with operations strategy. Managing Schedules
There are many different ways to manage schedules to ensure on-time delivery while recognizing capacity constraints. The focus is on opportunities that exist at the most detailed level of execution — the short-term management of daily operations, or even by shift or hour.

Four methods of managing the schedule by reducing lead-time are: • Lot splitting which is splitting a lot into smaller batches to run concurrently on multiple machines. • Operation overlapping where a portion of an order moves downstream to go through queue, set-up, and run concurrently with the remainder still being processed upstream. • Interoperation time reduction where non-value-adding queue, wait, and move time are reduced using a variety of techniques. • Expediting which should only be used as an exception, not as standard procedure.
The input/output control chart is useful in monitoring the flow of work into and out of the work center, as well as managing backlog. It details how the floor is doing in terms of actual versus planned inputs and outputs.

Four methods of adjusting capacity to relieve constraints are: • Alternate work centers where secondary work centers perform the operations when the primary work center is not available. • Alternate routings where the sequence of operations is changed because they cannot be performed in the normal sequence. • Alternate operations where a similar operation is substituted for the normal step. • Alternate operators where another operator is available to do the work. Push Systems
Overview
This topic presents a summary of the key learning points for the Authorizing and Reporting Activities for Push Systems course and assessment items on that area of the tested body of knowledge. The learning points are grouped around three specific subtopics: • Authorizing activities • Executing activities • Reporting activities
When you have achieved an understanding of this topic, you will be able to: • Explain resource availability checking and the feasible alternatives for resolving shortages • Demonstrate the use of priorities in assigning material and capacity resources to work • Given a specific situation, select the most appropriate approach to reporting work progress and status Authorizing Activities
Resource availability must be verified before work is released to the shop. The effects of inaccurate or out-of-date data can lead to increased intensity of bottleneck operations, increased queues, extended lead-times, and unacceptable service levels.

The load profile shows the information needed to check capacity requirements and availability. Capacity available is determined by rated capacity, demonstrated capacity, or both. Exceptions — such as unplanned maintenance, bottleneck work centers, or employee retention issues — could also affect the available capacity.

Checking the availability of material is determined by the following process characteristics. • Requirements for the manufacturing floor or your vendor are calculated using material requirements planning (MRP) • Quantities available include balances on-hand and quantities allocated to other orders • Availability that is checked by staging of inventory runs the risk of unauthorized use of components for other orders, leads to inefficient use of space, and complicates the cycle-counting process
Capacity shortages can be resolved in two ways: increase capacity or reduce the load. Increasing capacity, which is usually a short-term resolution, includes overtime, temporary help, reassignment of individuals from other work cells, and renting or leasing additional equipment. Additionally, alternate routings, subcontracting, lot splitting, and rescheduling releases or reprioritizing orders can reduce load. The key point is that both capacity and load need to be evaluated to determine the most efficient method to address the shortage of the resource in question.

Material shortages may be resolved by expediting components or raw materials, using alternate or substitute material, manufacturing components in-house, borrowing components, or obtaining them through the distributor network.

If resources related to capacity, material, and other resources can not be balanced, then the overall schedule must be adjusted. Adjusting the schedule can have the following effects: necessitate rescheduling of the parent part, delay the master schedule, affect timing of other assembly parts needed, or destroy previously balanced material and capacity. If the schedule has to be adjusted, the following alternatives could occur: delay release of orders, implement a recovery plan, evaluate impact on other related assemblies, or change order quantity to protect customer satisfaction index. Executing Activities
The execution activities related to issuing material in a push system include staging and kitting, dispatching, assignment of work, expediting and de-expediting, and activity reporting.

When maintaining priorities, expediting is probably the best-known technique for shop control. It consists principally of rushing urgent jobs through the production facilities by pushing them ahead of other jobs competing for the same resources. Expediting can be costly to an organization from a performance and reliability perspective. To avoid or minimize the situation, a few procedures could be put into place. • Arrange for delivery, assembly, and distribution of raw materials and components to ensure a smooth flow of materials throughout the process • Compile and prepare documentation related to production sequences, transportation, personnel schedules, and purchase, maintenance, and repair orders • Compile information — such as production rates and progress, material inventories, material used, and customer information — so status reports can be completed • Contact suppliers to verify shipment details
Dispatching is the function of selecting and sequencing available jobs to be run at individual work centers. Job selection is the selection of specific jobs to run in priority sequence. The purpose of job selection is to ensure that manufacturing objectives are being achieved.

A sample of the many job sequencing rules include first come, first serve (FCFS), earliest due date (EDD), and shortest process time (SPT). If a sequence can not be determined using the primary rule, then a secondary rule is applied. Reporting Activities
The production environment influences the level and design of the production reporting system. • Reporting in a process flow environment with long production runs may take place on an exception basis with feedback provided only when the output rate falls below an acceptable level • In a custom design and manufacturing environment where there is evidence of project management and fixed-site manufacturing, emphasis is on reporting the status of activities on the critical path. • Part or subassembly fabrication in a job shop environment requires more data collection for control than continuous processes or repetitive manufacturing of discrete parts.
Approaches to reporting progress include released order status, unreleased order status, and the dispatch list status. The type of manufacturing environment will determine the approach to reporting progress and the level of detail required.

The variables used to report progress in a push-system environment can include labor, equipment, tooling, and material. All of these variables together determine the overall progress of production.

There are situations when providing traceability is often required by law. It can be important with regard to liability and problems associated with recalling a product. It is more evident in, but not limited to, process industries. Even though it is commonly used in process industries, traceability is becoming more common throughout manufacturing. The functions involved in monitoring traceability include purchasing, inventory control, production control, distribution and logistics, and customer service. Pull Systems
Overview
This topic presents a summary of the key learning points for the Authorizing and Reporting Activities for Pull Systems course and assessment items on that area of the tested body of knowledge. The learning points are grouped around three specific subtopics: • Authorizing activities • Executing activities • Reporting activities
When you have achieved an understanding of this topic, you will be able to: • Demonstrate the use of visual signals to authorize movement of goods and performance of operations when a pull system is used • Given the basic data, determine the number of pull signals and inventory level for an item • Explain the methods that can be used to simplify the reporting activities when a pull system is used • Demonstrate how the required information is derived from the reported data Authorizing Activities
When using a connected production, the production schedule is the authorization for all production activities. The flow of goods along the line translates the production schedule into the authorization for each workstation. There is no need for work orders, operation priorities, or pull signals.

Several methods are used in a pull system to authorize and control work when using a disconnected flow of production. These methods included two-bin systems and visual reorder point methods such as cards, lights, or discs. Another method of authorizing production in a pull system is known as kanban, which normally uses cards as signals to move material and authorize production. There are two types of kanbans —brand-name and generic kanbans. Each answers two questions (what to make and when to make it) by different means. • A brand-name kanban, which is the more familiar type, answers both of these questions at once. When we receive a free brand-name kanban, we are authorized to immediately (answers, “When?”) build another identical item (answers, “What?”). • A generic kanban authorizes production to begin immediately (answers, “When?”), but it does not provide specific information regarding what to build. This information usually comes from the next shippable order or the production plan.
Kanbans facilitate our use of visual controls by enabling us to establish a visible ceiling on the amount of time or material that one work center is allowed to get ahead of another. The kanban ceiling can be expressed in terms of a maximum number of pieces. Or, if products vary in work content, a kanban unit of measure should be established to represent a consistent amount of time.

Two-card and one-card systems can be used to authorize movement of material. • With a two-card system, a move card and production card are used. Rules for a two-card system include only one card per container, return move card immediately, and leave the production card at the supply point. • With a one-card system, only a move card is used.
Volume and mix considerations related to the kanban system include repetition of the processes must be the norm, generic kanban handles volume/mix changes, and the system automatically reacts to mix considerations. Executing Activities
With connected production, the production order will initiate the requirements to the manufacturing group or external supplier. However, with a disconnected flow of production, executing activities related to a pull system include various signals that can be used to trigger an order to an upstream work center or an outside supplier.

When reviewing the number of signals and inventory, the kanban quantity is normally a fixed amount. The work center that manufactures the product is authorized to produce only in multiples of the kanban quantity and only when replenishment signals have been received. Other stations might not signal for a replenishment until two or more kanban quantities have been consumed. This is more common for materials replenished via a route, which is run less frequently than the rate at which the kanban quantity is consumed.

The kanban distribution graphic below shows a system where empty containers act as the replenishment signal. Routes are designed to pick up and deliver four containers at a time from the holding area and deliver them to the consuming station.

Calculating the number of signals is based on the type of environment or the stage of the manufacturing process. There are different formulas for the calculation for raw materials and finished goods than for work-in-process. The major difference between the two is that the calculation related to raw materials and finished goods includes safety stock, while the calculation for work-in-process includes a safety factor for process variability.

When reducing inventory within a pull system, the one less at a time methodology recognizes that inventory may be necessary given the current processes. But it also recognizes that inventory masks underlying problems. By systematically removing inventory one or a few pieces at a time, we can expose the weak links of our processes. By making the problems visible to those involved, we can stimulate customer and supplier communication which generates motivation to solve the problems rather than cover them up. Reporting Activities
With connected production, the only reporting that needs to be done includes the actual completion of units on each line, material that was scrapped in the production of those units, and the staffing of the line. The actual resources used can be calculated from the reported production, the bill of material, and the line staffing.

When addressing the required level of reporting related to a disconnected flow in a pull system, the process should be minimal and essentially streamlined. We assume that all processes are working correctly, and only report when things go wrong. Finally, we report the outcomes of the processes, rather than the inputs.

Production paperwork — such as work orders — gives way to kanban-style pull methods and visual systems. Work-in-process inventory tracking is eliminated, since inventory is reduced and standardized. These and other methods constantly reduce the amount of data gathered to maintain the accounting, control, and performance measurement systems.

When approaching the reporting process in a pull system implementing one less at a time, production problems are exposed because there is no buffer stock of inventory. If a part is discovered to be defective, and therefore unusable, then the production line must be stopped because there is no excess inventory to replace it. An exception report would be issued. The problem must be addressed immediately so that production can resume and similar problems can be avoided in the future.

In companies that implement pull systems, inventory stockrooms are smaller or have been eliminated altogether in favor of point-of-use storage or the ship-to-WIP process, and inventory balances are maintained through backflushing.

Scrap and rework reporting should be minimal. Since items are produced in small batches, the issue is confined to a smaller sample. Problems are not masked by large quantities of work-in-process. The root cause of the problem can be addressed and corrected immediately. There is a lower probability that product will be damaged, since items are delivered to the point-of-use and extra steps of moving the raw material or components in and out of inventory are eliminated. Conclusion
Quiz Results

Similar Documents

Free Essay

Lua Stuff

...gema as a set of Lua functions it has been tested with Lua 5.0.2. Refer to the detailed documentation to build gel togheter with gema, . 1.1 Status GeL is not as mature as gema or Lua, please report any bugs you may find using SourceForge bug tracking subsystem (you don't need to log in as a SourceForge user) or sending an e-mail to Remo Dentato. 1.2 Licence GeL is released under the same licence of Gema. No specific reference needs to be made to GeL as long as the due reference to Gema and Lua have been made. 2. Usage prev top next 2.1 Gema like Gel may be used exactly as if it was gema, any valid gema script should work when executed by gel: gel [gemaopts] [-f rules.gema] [-l script.lua] [infile [outfile]] . The only differences are: The @lua{} function is available to execute lua scripts in actions Text enclosed between "![" and "!]" is considered lua code and is immediately executed Rules specfied with '-f' are loaded, the lua script specified with '-l' is executed (possibily defining lua function to be used in some gema action) and the infile is translated to the outfile applying the rules defined in the default domain. All the gema options are recognized. 2.2 Lua like Gel may be used as a Lua (non interactive) interpreter: gel [gemaopts] [-f rules.gema] -lua script.lua [args] Rules specfied with '-f' are loaded then the control is passed to the lua script...

Words: 1294 - Pages: 6

Free Essay

Pt1420 Programming Unit 10 Research & Homework

...variations place the test at the start of the loop, while others have the test at the end of the loop.  Pre – test loop - the condition gets evaluated at the beginning of the loop cycle. Therefore, the body of the loop will not get executed if the condition does not hold the very first time. Post – Test loop - the loop condition gets evaluated at the end of the loop cycle. Therefore, the body of the loop will get executed at least once, regardless of the condition. This is a major difference between a pretest loop and a posttest loop. You may choose a posttest loop if the problem description justifies the body of the loop be executed at least once. Repetition Sequence/ Set of statements - A repetition structure causes a statement or set of statements to execute repeatedly. Sequence – set of statements that execute in the order that they appear. Condition controlled loop - uses a true/false condition to control the number of times that it repeats. Sentinel value - must be unique enough that it will not be mistaken as a regular value in the list. It is a special value that marks the end of a list of values. Function header - specifies the...

Words: 1912 - Pages: 8

Free Essay

Written Report

...certain input sequence (often a sequence of characters) should be mapped to a replacement output sequence (also often a sequence of characters) according to a defined procedure. The mappings process that instantiates (transforms) a macro use into a specific sequence is known as macro expansion. A facility for writing macros may be provided as part of a software application or as a part of a programming language. In the former case, macros are used to make tasks using the application less repetitive. In the latter case, they are a tool that allows a programmer to enable code reuse or even to design domain-specific languages. Macros are used to make a sequence of computing instructions available to the programmer as a single program statement, making the programming task less tedious and less error-prone. (Thus, they are called "macros" because a big block of code can be expanded from a small sequence of characters). Macros often allow positional or keyword parameters that dictate what the conditional assembler program generates and have been used to create entire programs or program suites according to such variables as operating system, platform or other factors. The term derives from "macro instruction", and such expansions were originally used in generating assembly language code. Keyboard and mouse macros Keyboard macros and mouse macros allow short sequences of keystrokes and mouse actions to be transformed into other, usually more time-consuming, sequences of keystrokes...

Words: 1595 - Pages: 7

Premium Essay

Chapter 2 Review Questions

... 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative numbers are encoded using the two’s complement technique. 17. Real numbers are encoded using the floating-point technique. 18. The tiny dots of color that digital images are composed of are called pixels. 19. If you were to look at a machine language program, you would see a stream of binary numbers. 20. In the decode part of the fetch-decode-execute cycle, the CPU determines...

Words: 727 - Pages: 3

Free Essay

Code

... larger  programs  and  programs  with  multiple  source  files.   •   Empower  you  with  Makefiles.   •   Implement  a  party  favor.       Recommended  Reading.     •   Section  17  of  http://www.howstuffworks.com/c.htm.   •   Chapters  20  and  23  of  Absolute  Beginner’s  Guide  to  C.   •   Chapters  13,  15,  and  18  of  Programming  in  C.                             0  <  12   This  is  CS50.   Harvard  College  Fall  2010   Academic  Honesty.     All   work   that   you   do   toward...

Words: 4248 - Pages: 17

Premium Essay

Student

...OS's (give example: Microsoft, Linux, Mac, etc.) Know what interpreter does for you Know difference between a Logic & Syntax error Know Fortran is first High level programming language Know Assembly Language Know how CPU works(Fetch,Decode,Execute) Which is faster, Interpreter or compiler Pg.18 Machine Language (1001001) Know about unicode Know difference between logic and syntax......again lol Program development cycles Pg.30 Difference between psuedocode and flowchart Same as 13 Repetition and sequence of structure Know all of the processing symbols for flowchart Mathematical operators Pg.46 Order of precedence Know data types Pg.56 What is constant variable (named constant) Know benefits of using modules know pseudocode in sequence same as 23 know about return point (memory address location) what flowchart symbol is the module call (rectangle with 2 lines?) difference between flowchart and hierarchy chart Pg.83 parameter difference know passing argument by value and by reference Pg.97 know difference between global & Local variable same as 28 difference between control and sequence of structure what is sequence structure diamond shape is a symbol of what (condition) relational operator what is ! = ( different symbols ) what is the oval sign in a flow chart? Appendix B is the answer Pg.570 symbols on pg.570 what is the variable...

Words: 259 - Pages: 2

Premium Essay

Hhello

...Dan Sandin/Wanda Rockwell Sherill Redd, Aptara®, Inc. Aptara®, Inc. Edwards Brothers LeHigh-Phoenix Color/Hagerstown Credits and acknowledgments borrowed from other sources and reproduced, with permission, appear on the Credits page in the endmatter of this textbook. Copyright © 2012, 2009 Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions...

Words: 76897 - Pages: 308

Premium Essay

Certification a++

...the program is working with, in __________. main memory  This is a volatile type of memory that is used only for temporary storage while a program is running. RAM  A type of memory that can hold data for long periods of time, even when there is no power to the computer, is called __________. secondary storage  A component that collects data from people or other devices and sends it to the computer is called __________. an input device  A video display is a(n) __________ device. output device  A __________ is enough memory to store a letter of the alphabet or a small number. byte  A byte is made up of eight __________. bits  In the __________ numbering system, all numeric values are written as sequences of 0s and 1s. binary  A bit that is turned off represents the following value: __________. 0  A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is __________. ASCII  An extensive encoding scheme that can represent characters for many languages in the world is __________. unicode  Negative numbers are encoded using the __________ technique. two's compliment  Real numbers are encoded using the __________ technique. floating point  The tiny dots of color that digital images are composed of are called __________. pixels  If you were to look at a machine language program, you would see __________. a...

Words: 713 - Pages: 3

Free Essay

Python Programming

...data Functions Program Flow (Branching) Input from the user Iteration (Looping) 2 What is Python  Python is both an interpreted, general purpose, open source, cross-platform, high level programming language.  Python uses an interpreter. This is a software program that convert Python code to machine language.  It is easy to jump in and experiment with Python in an interactive fashion. Compiling and interpreting  Many languages require you to compile (translate) your program into a form that the machine understands. compile source code Hello.java  execute byte code Hello.class output Python is instead directly interpreted into machine instructions. interpret source code Hello.py output 4 Programming basics     code or source code: instructions in a program. The sequence of syntax: The set of legal structures and commands that can be used in a particular programming language. output: The messages printed to the user by a program. console: The text box onto which output is printed. 5 The Basic Pattern Most of our programs will use the basic pattern of:  Get some user input  Perform some algorithm on the input  Provide results as output Identifiers in Python    Identifiers are names of various program elements in the code that uniquely identify the elements. They are the names of things like variables or functions to...

Words: 3768 - Pages: 16

Premium Essay

Assignment: Noncontiguous Memory Allocation In Memory Management System

... Institute of Technology Nirma University 13BEC176@nirmauni.ac.in ABSTACT:- In memory management unit we have limited memory so we used virtual memory. Mapping is between pages and frames. Mapping is done by MMU. Processor after dividing the program into pages generates virtual address. Through this mapping we received virtual address of page and by mapping generates the physical address of the frame so we can read the program and execute it.so large program can be executed in small memory. Keywords: MMU;...

Words: 815 - Pages: 4

Premium Essay

Programming Midterm Study Guide Notes

...computers hardware manage all of the devices connected to the computer, allows data to be saved to and retrieved from storage device, and allows other programs to run on the computer. Utility programs: performs a specialized task that enhances the computer’s operation or safeguard data. Examples are virus scanners, file compression programs, and data backup programs. Software Development tools: the programs that programmers use to create, modify, and tests software. Assemblers, compilers, and interpreters are examples. Interpreter is a program that both translates and executes the instructions in a high-level language program. The statements that a programmer writes in a high-level language are called source code or code. Syntax error is a mistake such as a misspelled key word, a missing punctuation character, or the incorrect use of an operator. NOTE: programs that are compiled generally execute faster than programs that are interpreted because a compiled program is already translated entirely to machine language when it is executed. A program that is interpreted must be translated at the time it is executed. Compiler is a program that translate high-level language program into a separate machine language program. Words that make up a high-level programming language are known as key word or reserved words. Operator performs various operation on data. Syntax is a set of rules that must be strictly followed when writing a program. Statements is the individual...

Words: 1662 - Pages: 7

Premium Essay

Bash Qs Ref

...9 9 Chapter9 Answers to Evennumbered Exercises 9 1. 2. What are two ways you can execute a shell script when you do not have execute access permission to the file containing the script? Can you execute a shell script if you do not have read access permission? You can give the name of the file containing the script as an argument to the shell (for example, sh scriptfile, where scriptfile is the name of the file containing the script). Under bash you can give the following command: $ . scriptfile Because the shell must read the commands from the file containing a shell script before it can execute the commands, you must have read permission for the file in order to execute the shell script. 3. 4. Assume that you have made the following assignment: $ person=jenny Give the output of each of the following commands: a. echo $person jenny b. echo '$person' $person c. echo "$person" jenny 5. 1 2 Chapter 9 6. Assume that the /home/jenny/grants/biblios and /home/jenny/biblios directories exist. For both (a) and (b), give Jenny’s working directory after she executes the sequence of commands given. Explain. a. $ pwd /home/jenny/grants $ CDPATH=$(pwd) $ cd $ cd biblios After executing the preceding commands, Jenny’s working directory is /home/jenny/grants/biblios. When CDPATH is set, cd searches only the directories specified by CDPATH; cd does not search the working directory unless the working directory is specified in CDPATH (by using a period). b. $ pwd /home/jenny/grants $...

Words: 737 - Pages: 3

Free Essay

Test

... If I ask a man to bring 6-bags of wheat, each weighing 100 kg, he may take 6-times to perform this task in going and bringing it. A stronger man might perform the same task in 3times only. Thus, it depends on the strength of the man to finish the job quickly or slowly. Here, we can assume both weaker and strong men as machine. The weaker man has taken 6-machine cycle (6-times going and coming with one bag each time) to execute the job where as the stronger man has taken only 3-machine cycle for the same job. Similarly, a machine may execute one instruction in as many as 3-machine cycles while the other machine can take only one machine cycle to execute the same instruction. Thus, the machine that has taken only one machine cycle is efficient than the one taking 3-machine cycle. Each machine cycle is composed of many clock cycle. Since, the data and instructions, both are stored in the memory, the µP performs fetch operation to read the instruction or data and then execute the instruction. The µP in doing so may take several cycles to perform fetch and execute operation. The 3-status signals : IO / M , S1, and S0 are generated at the beginning of each machine cycle. The unique combination of these 3-status signals identify read or write operation and remain valid for the duration of the cycle. Table-5.1(a) shows details of the unique combination of these status signals to identify different machine cycles. Thus, time taken by any...

Words: 3904 - Pages: 16

Free Essay

Computer Viruses

...Definition of virus "Computer viruses" is the term that defines the class of programs which illegally explore resources of systems. It is an executable code able to reproduce itself. Viruses are an area of pure programming, and, unlike other computer programs, carry intellectual functions on protection from being found and destroyed. They have to fight for survival in complex conditions of conflicting computer systems. Computer viruses have pervaded popular culture at least as successfully as they have the world's computer population. Computer viruses replicate by attaching themselves to a host a program or computer and co-opting the host's resources to make copies of themselves. Symptoms can range from unpleasant to fatal. Computer viruses spread from program to program and computer to computer. There are other computer pathogens, such as the "worms" that occasionally afflict networks, and the "Trojan horses" that put a friendly face on malicious programs, but viruses are the most common computer ill by far. Types of viruses. There are different types of viruses, and they have already been separated into classes and categories. For instance: dangerous, harmless, and very dangerous. No destruction means a harmless one, tricks with system halts means a dangerous one, and finally with a devastating destruction means a very dangerous virus. But viruses are famous not only for their destructive actions, but also for their special effects, which are almost impossible to classify...

Words: 1595 - Pages: 7

Premium Essay

Stored Program Concept

...the memory of the computer. Memory contains: (a) instructions, (b) data. Conceptually, programs and data seem very different. In fact the first computers, distinguished between them and stored them in different places. Another point of view: Treat programs as data. Intro to CS: stored program concept 2 Inside hardware The two hardware parts, that are ‘inside’ the computer: Processor or CPU (Central Processing Unit) Main memory (RAM: Random Access Memory) (Remember: the other part is input/ouput devices) Intro to CS: stored program concept 3 Components of CPU/memory arithmetic and logic unit (ALU): circuitry for arithmetic and logic operations (here the ‘real’ work is done) control unit (CU): responsible for running programs (here the ‘book-keeping’ job is done) • Fetch next instruction • Decode instruction • Execute instruction (activate relevant circuitry in ALU) registers (in ALU and CU): hold data for use by arithmetic and logical operations bus: wires connecting CPU and main memory Intro to CS: stored program concept 4 Review question What is the difference between a computer and a calculator? Intro to CS: stored program concept 5 Review question What is the difference between a computer and a calculator? Answer: The computer is programmable, and this is achieved through the control unit. The control unit is responsible for running programs from memory. Intro to CS: stored program concept 6 Machine language Most programmmers write their programs in a high-level...

Words: 694 - Pages: 3