Intro Programing It104 Uint 1 Assign 1 H.W.

In: Computers and Technology

Submitted By Tuxedoboss
Words 476
Pages 2
Learning Objectives and Outcomes
• Describe the role of software for computers-
Software refers to one or more computer programs and data held in the storage of the computer for some reasons. In other words, software is a set of programs, procedures, algorithms and its documentation concerned with the operation of a data processing system.
• Identify the hardware associated with a computer-
1. The central processing unit (CPU)
2. Main memory
3. Secondary storage devices
4. Input devices
5. Output devices
• Describe how computers store data-
All data that is stored in a computer is converted to a sequences of 0s and 1s
• Explain how programs work-
A program is nothing more than a list of instructions that cause the CPU to perform operations. Each instruction in a program is a command that tells the CPU to perform a specific operation.
• Differentiate between machine language, assembly language, and high level language-
-Machine language uses binary instructions (0s and 1s)
-Assembly language uses short words that are known as mnemonics
-High level language allows you to create powerful and complex programs without knowing how the CPU works, and without writing large numbers of low-level instructions.
• Differentiate between compilers and interpreters-
A compiled program is already translated entirely to machine language when it is executed. A program that is interpreted must be translated at the time it is executed
• Identify the different types of software-
Systems software is the set of programs that control or enhance the operation of a computer. Application software makes a computer useful for everyday tasks.
Short-Answer Review Questions 1-7 pg.26
1. Why is the CPU the most important component in a computer?
The CPU is the part of a computer that actually runs programs. Without it, the computer could…...

Similar Documents

Bus 520 Assign 1

...Running head: How Personal Can Ethics Get? How Personal Can Ethics Get? Leadership and Organizational Behavior How Personal Can Ethics Get? Discovering inappropriate behavior at work, forces an individual to make an ethical decision. Ethics are values and principles that help individuals distinguish right from wrong (Hellriegel & Slocum, 2011). There are many considerations before making a final decision. In this case we will address some of the items an individual needs to consider while making a decision by exploring the following questions: 1. How can personal differences and preferences impact organizational ethics? 2. How can organizational policies and procedures impact ethics? 3. What ethical dilemmas are Valerie facing? 4. What should Valerie do? Answering these questions will show it is not an easy decision and it begins with personal differences and preferences. How Can Personal Differences and Preferences Impact Organizational Ethics? An individual’s personal differences and preferences must first be understood before providing an impact on organizational ethics. Both moral intelligence and moral development influences personal differences. Since each individual experiences a unique upbringing, each individual’s differences can vary greatly (Hellriegel & Slocum, 2011). Moral intelligence consists of integrity, responsibility, compassion, and forgiveness (Hellriegel & Slocum, 2011). Pierce and Henry (2000), discuss how...

Words: 1380 - Pages: 6

Assign 1

...Assignment 1 Name: (Your Name) For Dr. Larry Byrd HRM533 Date: (Today’s date) (Title) Advantages to a Total Rewards Approach There are several advantages to using a total rewards approach to compensating the workforce. The top five are described in the succeeding paragraphs. The first of the top five advantages is (Complete the paragraph.) The second of the top five advantages is (Complete the paragraph.) The third of the top five advantages is (Complete the paragraph.) The fourth of the top five advantages is (Complete the paragraph.) The fifth of the top five advantages is (Complete the paragraph.) Total Rewards Strategy Gone Astray There are many ways a total rewards strategy can go astray. Five of the common ways are described in the succeeding paragraphs. The first way the strategy can go astray is (Complete the paragraph.) The second way the strategy can go astray is (Complete the paragraph.) The third way the strategy can go astray is (Complete the paragraph.) The fourth way the strategy can go astray is (Complete the paragraph.) The fifth way the strategy can go astray is (Complete the paragraph.) Steps in Designing a Total Rewards Program In the succeeding paragraphs, the six steps in designing a total rewards program are described. The first step is (Complete this paragraph.) The second step is (Complete this paragraph.) The third...

Words: 355 - Pages: 2

Assign 1

... outcome E. Encourage the Heart- Recognizing individuals. A leader has to focus on their team. That is a key factor. As a leader, you have to focus on what your team needs to function at their best. You also have to find out what motives the people working with you? Steps to find out that information is: 1. What have you done this week to improve your business? People never do their best when they keep doing the same thing over and over. There has to be change. 2. Do you have the right credibility? People tend to not follow a leader that has no background in the business they are working for. They have to see that you know what you are talk about as a leader, or it means nothing. 3. Do you have a great relationship with your employees? People tend to work harder for people that they like. Putting this theory into place would help any leader become successful. A transactional, transformational, and authentic leader would thrive in any organization, if they have the right skills and heart to do what means to them the most. A leader that has no credibility, no true and thought out vision and no respect for their followers will never thrive in any organization. Reference Case, S. (2010, Febuary 24). People, Passion, and Perseverance. You've Got Entrepreneurship. Stanford University. Drucker, P. (1985). Entrepreneurial Strategies. In P. Drucker. California Management Review . Kouzes, J. (2008, July 3). Rising to the leadership Challenge. Amberican......

Words: 979 - Pages: 4

Intro Programing It104 Uint 1 Assign 1 H.W.

...Learning Objectives and Outcomes • Describe the role of software for computers- Software refers to one or more computer programs and data held in the storage of the computer for some reasons. In other words, software is a set of programs, procedures, algorithms and its documentation concerned with the operation of a data processing system. • Identify the hardware associated with a computer- 1. The central processing unit (CPU) 2. Main memory 3. Secondary storage devices 4. Input devices 5. Output devices • Describe how computers store data- All data that is stored in a computer is converted to a sequences of 0s and 1s • Explain how programs work- A program is nothing more than a list of instructions that cause the CPU to perform operations. Each instruction in a program is a command that tells the CPU to perform a specific operation. • Differentiate between machine language, assembly language, and high level language- -Machine language uses binary instructions (0s and 1s) -Assembly language uses short words that are known as mnemonics -High level language allows you to create powerful and complex programs without knowing how the CPU works, and without writing large numbers of low-level instructions. • Differentiate between compilers and interpreters- A compiled program is already translated entirely to machine language when it is executed. A program that is interpreted must be translated at the time it is executed • Identify the different types of...

Words: 476 - Pages: 2

Assign 1 Nexty Card

...• Case 1-4 Generally Accepted Accounting Principles At the completion of the Darby Department Store audit, the president asks about the meaning of the phrase “in conformity with generally accepted accounting principles,” which appears in your audit report on the management’s financial statements. He observes that the meaning of the phrase must include more than what he thinks of as “principles.” Required: a. Explain the meaning of the term accounting principles as used in the audit report. (Do not in this part discuss the significance of “generally accepted.”) "Generally accepted accounting principles" is a guideline of accounting practices and processes which define how accounting professionals are to report the daily activity of the business performance relating to the revenue and expenses, in/outflows of cash and any other material activity relating to the value of the business. b. The president wants to know how you determine whether or not an accounting principle is generally accepted. Discuss the sources of evidence for determining whether an accounting principle has substantial authoritative support. Accounting guidelines are just that, guidelines. The entity is obligated to choose a guideline that is appropriate handling for the transactions. The accounting principle must be consistent and pronounced in FASB, AICPA and their respective Technical Bulletins and Accounting Guidelines and Statements of Position. If the accounting treatment for a transaction or event...

Words: 539 - Pages: 3

Nt1230 Unit 3. Assign 1 – Ipv6 Addressing

...1-A ARIN –Provides services related to the technical coordination and management of Internet number resources. Supports the operation of the internet through the management of internet number resources and coordinates the development of policies for the management of IP number resources. They provide services for technical coordination and management of internet number resources in its respective service region. This includes IP address space allocation & ASN allocation, transfer and record maintenance. 1-B IANA – They are responsible for the allocation of globally unique names and numbers that are used in Internet protocols that are published as rfc documents and for coordinating some of the key elements that keep the internet running smoothly. Allocates and maintains unique codes and numbering systems that are used in the technical standards/protocols that drive the internet. This includes Domain names, number resources and Protocol assignments. 1-C APNIC – An organization that manages the assignment of internet number resources within the Asian continent. Provides number resource allocation and registration services that support the global operation of the Internet. 2. Approximately how many Ipv4 addresses are possible? An IPv4 uses 32 bit IP address and with 32 bits the maximum number of IP addresses is approximately four billion IPv4 addresses 3. Approximately how many IPV6 addresses are possible? An IPv6 uses 128 bit IP address and with 128 bits the...

Words: 505 - Pages: 3

Legal 500 Assign. 1

.... We cannot fire her for performing a public duty, she is protected by the tort of wrongful discharge. The rights ethical approach was used here, Anna has rights not only with how she should be treated as an individual but also abiding by the law. She is exercising her legal rights. Beesley, (2012). I recommend to the CEO that a Whistleblowing policy be put in place. We are planning on becoming a publicly traded company and need to be aware of our rights as a company and those of our employees. There are several state and federal laws, statutes and torts that we must familiarize ourselves. With a sound policy, we should be able to handle internal concerns before they get out of hand, harming not only the employee but the employers as well as the shareholders. First, the policy shall inform employees of the appropriate steps to take in communicating their ethical concerns internally. Second, our employees must believe that their concerns will be taken seriously and will be investigated. Third, our employees must feel confident that they will not suffer personal reprisals for using the appropriate internal channels to report perceived wrongdoing. In addition to the three fundamental items I’ve included, I also suggest that the Whistleblowing policy should include the following components. 1. A clear statement that employees who are aware of possible wrongdoing within the organization have a responsibility to disclose that information to appropriate parties inside the...

Words: 1682 - Pages: 7

Intro to Programing Logic

...IT106-1201A-05 Introduction to Programming Logic Phase 3 Discussion Board By Norman L Moffatt Jr Date 1/25/12 In this discussion board we are given a problem that is the billing department for the bank has asked for your team’s help. They want to develop a program that will determine the monthly charges for checking accounts. The following criteria are to be used: Balance > = 100.00 will not be charged fees Balance < 100.00 will be charged $9.95 monthly fee The first thing I would do is look at different steps to us to get to the desired answer. After I have figured them out I would write them in order. These steps I am writing down are called an algorithm. Now I had to pick the best algorithm style to use there are three While loop, Do while loop and For loop. I picked For loop due to this is going to be done for 12 months which gives me a set amount. The algorithm in pseudo code steps are START INITIALIZE CONTROL VARIABLE (Checking account Balance) LOGICAL PROCESS (CHECKING BALANCE GREATER > = TO 100) TRUE (DO NOTHING) FALSE (MINUS 9.95 FROM CHECKING ACCOUNT) PRINT NEW BALANCE (YOU ONLY SEE THIS FOR FALSE STATEMENTS) END The flowchart for this discussion we are still using a For flowchart. To do this I first need to identify the symbols I will us. In flowcharts there are a variety of symbols that are used with various operations. The first symbol I used is the one that means start and end. The second symbol I......

Words: 386 - Pages: 2

Project Management Assign 1

... Murray for much of its water. On average 40% of Adelaide’s water supply comes from the River Murray, but in a drought year as much as 90% of the supply may come from this one finite resource. With further population growth, a secure water supply was under serious threat. In 2009, the South Australian Government launched the Water for Good plan. A key component of this plan was a $1.824 billion construction of a desalination plant to secure long-term and climate independent sustainable water supplies for South Australia, and to reduce the State’s reliance on the River Murray and other rain-dependent sources. Many conditions were attached to the final development approval which required strict environmental management and monitoring to ensure the construction and operational phases of the project meet the strict environmental performance expectations from the client and EPA. Adelaide Desalination Project Background The security of Adelaide’s Metropolitan water supply is largely influenced by climate variability and compounded by limited local water storage capacity in the Adelaide Hills (approximately 1 year’s supply). Due to the drought and the effects of climate change, security of this water supply has become an issue of critical significance. In response to this, the Desalination Working Group (DWG) was established by the State Government in March 2007 to assess the feasibility of large-scale desalination for Adelaide. In its final report (issued September......

Words: 1109 - Pages: 5

Nt2580 Unit 6 Assign 1

...JO STARNES, NT2580, UNIT 2 CALCULATING THE WINDOW OF VULNERABILITY The window of vulnerability is the amount of time the systems defense measures are compromised, minimized, or eliminated. This is when the system is most likely to be at risk, and can be affected by malicious attacks. It is not stated as what day the server software detected the attack on the SMB server. It only states that it was detected the day before. So from day one, these are the steps we will need to take to get the SMB server back up and running properly and safely, as well as the amount of time it will take for us to solve the issue: Day 1 - The software company will release a patch for this attack in three days. Day 4 – We will receive the patch, and we need to install and test the patch, this will take at least five days. Day 9 – After installation and testing is completed; we will send the update to the entire company’s network devices. As soon as all the updates are sent out to all the devices, they will need to be rebooted in order for the patch to take effect. We can send out a message to all devices to insure this happens. This could take a day or two to complete. This could all be completed as early as 10 days if there are no issues during the process, however problems may arise and it could possibly take a day or two more. I hope that this is helpful and we will start immediately on the problem. It is of upmost importance that you have team members monitoring the server at all times......

Words: 310 - Pages: 2

Bus 508 Assign 1

... didn’t seem that bad because the employees are now quite satisfied with their new company. We all have to wait and see to realize the long term impacts of the merger process on Thermo and on the employees. References: 1. Blankenhorn, D. (2014). Thanks to ge, thermo fisher will buy life technologies. Thestreet, 1/6, p.1. 2. Layne, S. L. (2006). Mergers. Gretna: Pelican Pub. Co.Lifetechnologies.com. (2014). Life technologies. [online] Retrieved from: http://www.lifetechnologies.com/my/en/home.html [Accessed: 15 Feb 2014]. 3. Risberg, A. (2006). Mergers and acquisitions. Oxon: Routledge. 4. Sherman, A. J. & Hart, M. A. (2006). Mergers & acquisitions from a to z. New York: AMACOM. 5. Spiegel, M. & Tookes, H. (2013). Dynamic competition, valuation, and merger activity. The Journal Of Finance, 68 (1), pp. 125--172. 6. The Street. (2014). Thanks to ge, thermo fisher will buy life technologies. [online] Retrieved from: http://www.thestreet.com/story/12210824/1/thanks-to-ge-thermo-fisher-will-buy-life-technologies.html [Accessed: 15 Feb 2014]. 7. Thermofisher.com. (2014). Thermo fisher scientific - welcome. [online] Retrieved from: https://www.thermofisher.com/global/en/home.asp [Accessed: 15 Feb 2014]....

Words: 1950 - Pages: 8

Assign 1

... the price is low there may be seen as defective or cheap and consumer may not buy the product. This is an inelastic product so a price above our nearest competitors price and then there will be discounts given as coupons. This will get more consumers to try the low calorie microwavable food. This way the company will be lower the price without lowering the price permanently. (Miller, 2012) The price elasticity is the ratio of the percentage change in quantity to the percentage change in price. Effects of Government Policies Have On Production and Employment One of the biggest regulation laws that have had a huge effect of production and employment would by the Department of Labor’s minimum wage law that has been in effect since 1938. This law has protected the average citizen and put a stop to employers from paying salary that are lower than a specified level. This law is direct to helping employees; research has shown that minimum wages at times hurts the employee and the broader economy. This regulation can sometimes choke job opportunities for low-skill workers, youth, and minorities. This particular law will not affect the microwave low calorie meal businesses much as others. that government policy could have on your company. FIGURE 1 .Government Regulation to Ensure Fairness The low calorie microwavable food industry is governed by many regulations, from OSHA regulation in the plant to the Sherman Act. Another regulation that is used by the food...

Words: 1531 - Pages: 7

Assign 1

...Carlos Monsanto Assignment No. 1 CS 782 1) Business Model Starbucks Corporation, an American company founded in 1971 in Seattle, WA, is a premier roaster, marketer and retailer of specialty coffee around world. Starbucks has about 182,000 employees across 19,767 company operated & licensed stores in 62 countries. Their product mix includes roasted and handcrafted highquality/ premium priced coffees, tea, a variety of fresh food items and other beverages. They also sell a variety of coffee and tea products and license their trademarks through other channels such as licensed stores, grocery and national foodservice accounts.1 Starbucks also markets its products mix with other brand names within its portfolio of companies, which include Teavana, Tazo, Seattle’s Best Coffee, Starbucks VIA, Starbucks Refreshers, Evolution Fresh, La Boulange and Verismo. Starbucks had total revenue of $14.89 billion as of September 29th, 2013.2 Starbucks primarily operates and competes in the retail coffee and snacks store industry. This industry experienced a major slowdown in 2009 due to the economic crisis and changing consumer tastes, with the industry revenue in the US declining 6.6% to $25.9 billion. Before this, the industry had a decade of growth consistent. Due to the economic slump, consumers spent less on luxuries like eating out, choosing to purchase low-price items instead of high-priced coffee drinks due to shrinking budgets.3 The industry grew at a low annual...

Words: 2853 - Pages: 12

Intro 1

...C# PROGRAMMING PROGRAM #1 C# program number one is a tool that allows you to choose a file and it breaks it down for a MD5 hash, or unique identifier. The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32-digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications and is also commonly used to verify data integrity. The usage of this tool is used towards other programs I have produced in C#. This is the most basic of the 3 programs. PROGRAM #2 C# program number two is a whole infrastructure in which the C# program can run with. It is a client that allows me to log chat logs gathered from IRC chatrooms and organize/search them for key terms etc. Internet Relay Chat, or IRC, is a protocol that allows users that connect to Internet Relay Chat Servers to have conversations with others in real time. Users connect to IRC Servers using an IRC Client. There are many popular IRC clients available on the Internet for all operating systems. PROGRAM #3 C# program number three is the main component that can have program one integrated into it. The secondary piece that makes this software so important is that it is an external firewall that uses artificial intelligence gathered from other programs to help corporate level users that are not tech savvy keep the company from being internally compromised. It accomplishes this by......

Words: 313 - Pages: 2

Intro to Sociology #1

...Richard Nicholson SOC 100 Mon. & Wed. 8:45-10:00 Introduction to Sociology Exam #1 Section #1 Public Issue: A public issue occurs when the system itself causes a problem or hardship that someone may face. Individuals tend to view public issues as personal problems which causes them to believe the reason they are not able to do something as an individual failure instead of a structural problem. An example of a public issue that I have experienced is that I had to take a year off from attending school. I took a year off from school so I could have money to support myself. At first, I believed this was entirely a personal issue because I could not afford it. However, looking at it from a sociological viewpoint, I can now see it as a public issue because the tuition rates and cost of living continues to go up yearly. Inequality: Inequality is a built in feature within our social system. This inequality dictates the access and distribution of the commons, or the resources all people need. Inequality is mainly based on the location in which someone was born and/or what family they were born into to. An example of inequality occurred when I attempted to take a loan out on a car. While I was, able to afford the payments on a loan, I did not have credit for a long enough period of time or the down payment the bank was looking for that a person in a higher social class would have through familial ties. Iron Cage of Rationality: An iron cage of rationality is...

Words: 1320 - Pages: 6