Premium Essay


In: Computers and Technology

Submitted By mcgee8621
Words 1412
Pages 6
Lab 7: Repetition Structures I
This lab accompanies Chapter 5 (pp. 163-183 and pp. 196-201) of Starting Out with Programming Logic & Design.

Name: ___Jeffry McGee_____

Lab 7.1 –Condition Controlled with While and Do-While Loops: Pseudocode

|Critical Review |
| |
|A repetition structure causes a statement or set of statements to execute repeatedly. |
| |
|Repetition structures are used to perform the same task over and over. |
| |
|Repetition structures are commonly called loops |
| |
|A condition-controlled loop uses a true/false condition to control the number of times that it repeats. |
| |
|The general structure of a While loop with a condition-controlled statement is: |
| |…...

Similar Documents

Free Essay


...38 LAB #3 | Perform Data Gathering and Footprinting on a Targeted Website LAB #3 – ASSESSMENT WORKSHEET Perform Data Gathering and Footprinting on a Targeted Website Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you targeted an organization with an e-commerce website and performed data gathering and footprinting for that site. You collected public domain information about an organization’s website by making use of Google hacking techniques, downloading the Sam Spade reconnaissance-gathering tool, and using nslookup and tracert, similar DOS command tools packaged with Microsoft® Windows. You also researched public domain sites such as IANA’s WHOIS tool to obtain public domain information about the targeted website. Finally, you performed Google hacking research on the targeted organization’s e-commerce website to identify other shared information. Lab Assessment Questions & Answers 1. Which reconnaissance tool comes with Microsoft® Windows that can provide reconnaissance-gathering data and can be initiated from the DOS command prompt? What useful information does this query provide? name and the IP address associated with the source you are targeting. 2. What is the difference between ARIN, RIPE, and IANA? What regions of the world do these domain name registry organizations cover? The internet assigned numbers authority (IANA) delegates internet resources to the regional internet registries which are...

Words: 918 - Pages: 4

Free Essay


...Timothy Hicks IS4680 Lab7 Auditing the LAN-to-WAN Domain for Compliance 1. People threats, Viruses and related threats, physical threats, pc vulnerability, the pc virus, lan access and internetworking. 2. An access control list (ACL) is a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee. ACLs contain access control entries (or ACEs) that describe the permissions associated with objects and object properties. For a security principal, an ACE defines the rights which are denied, allowed and audited for a particular security principal. 3. A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer. An example of this is a proxy server, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of the firewall or in the DMZ and usually involves access from untrusted networks or computers. 4.Two examples of an enclave requirement are 1) a set of resources requires uninterrupted 24/7 availability. And 2) Proprietary information must be shared must be shared among several computers. 5.SPI is a basic firewalling......

Words: 653 - Pages: 3

Premium Essay


...survive and form colonies on LB agar that has been supplemented with ampicillin. Restriction enzyme digestion and gel electrophoresis Lab 7: Genetics of Organisms For this lab, it is important to be able to use data to determine the mode of transmission (dominant, recessive, sex-linked, autosomal) and genetic make-up of the parents. You must also be able to do chi-square analysis of data. Because the data we obtained was limited at best, we were unable to perform chi-square analysis. It is, therefore, very important for you to go through the exercise on the LabBench website ( I If the chi-square value is greater than the critical values, the null hypothesis is rejected. Hint from the graders: There was a chi-square problem on the AP Biology Exam a few years ago, and we found that a common error was the some students took the square root of the value they got for Χ2. Don’t make this mistake! Χ2 is just the shorthand for the name of this mathematical technique, chi-square. Fred and Theresa Holtzclaw Lab 8: Population genetics and evolution This is the (in)famous “grebe” lab. You are expected to know the Hardy-Weinberg equation and use it to determine the frequency of alleles in a population. You also should know the conditions......

Words: 2702 - Pages: 11

Premium Essay

Lab7 Wide Area Networks

...NT1210 Wednesday am | Chapter 7 Wide-Area Networks | | | David | 4/30/2014 | | Exercise 7.1.1: Owning the entirety of a WAN is impractical for an organization because there are no limitations and they can be custom built to the organization. It is favorable for the organization to maintain a LAN for expansion purposes. Exercise 7.1.2: On a WAN there is no absolute limit for the distance of a leased line. Table 7-1 WAN Physical Media Media | Infrastructure | Summary | UTP | Phone lines | Uses copper lines between all locations, limited speed with the lines. Already in place, can be very cheap to use | Coaxial | Television cable | Must run cable to all locations, can carry much higher speeds than Telco. Is a little more expensive to run. Needs boosters at specific distances | Fiber-optic | Glass cables with POP’s at specific distances | Uses a customized infrastructure to run dedicated connections: this is a costly option | Electric power lines | Power lines. They are everywhere and the infrastructure is already there | This type of media can be used with Broadband over Power Lines (BPL), making use of the extensive infrastructure in place already | Table 7-2 WAN Wireless Media Media | Summary | Satellite | Not very fast, has a delay of about 1 second, very costly to use. Uses a star topology | Imax (Worldwide Interoperability for Microwave Access) | This has 75Mbps speeds and can transmit for distances up to 30 miles. It......

Words: 784 - Pages: 4

Premium Essay


...Functions This lab accompanies Chapter 6 of Starting Out with Programming Logic & Design. Name: ___________________________ Lab 7.1 – Functions and Pseudocode Critical Review You have been coding with modules in pseudocode and functions when using Python. You modules in pseudocode can be made into functions by returning a value. A function is a special type of module that returns a value back to the part of the program that called it. Most programming languages provide a library of prewritten functions that perform commonly needed tasks. Library functions are built into the programming language and you can call them as needed. They are commonly performed tasks. Help Video: View the tutorial video titled, "lab7-1.wmv" to assist you in completing this lab assignment. Writing Your Own Function that Returns an Integer Step 1: A function contains three parts: a header, a body, and a return statement. The first is a function header which specifies the data type of the value that is to be returned, the name of the function, and any parameter variables used by the function to accept arguments. The body is comprised of one or more statements that are executed when the function is called. In the following space, complete the following: (Reference: Writing Your Own Functions, page 225). a. Write a function with the header named addTen. b. The function will accept an Integer variable named number. c. The function body will ask the......

Words: 2530 - Pages: 11

Free Essay


... | | |11:40 | | | | | | | | | | | | | | | | | | | | | | |下午 |5-6节 |Language Lab7、8 | | |Language Lab 1、2 |环境工程概论 1-8 1203 | | |13:00 |AIEN机306 | | |AIEN机306 | | | |至 |BMA247小课 AIEN212 | | | | | | |14:35 |13:00-13:45 重修 | ...

Words: 935 - Pages: 4

Premium Essay


...Reproductive System worksheet Name: Michael Duncan Before answering the questions below, log in to ADAM and review the following Clinical Animations about the Reproductive System a. Conception b. Fetal Development c. Formation of twins d. vasectomy Next, view the clinical illustration a. Ectopic Pregnancy Answer the following questions 1. How is a vasectomy performed? Be sure to cite the specific anatomical structures involved. How does this prevent pregnancy? |A vasectomy is procedure used to prevent a man from ejaculating sperm. There are two methods for performing this procedure. The | |conventional vasectomy uses one or more small incisions in the scrotum used to access the vas deferens. They take a small section | |out of both vas deferens and either tie or carterize the ends then stitch the cuts. The second way is called no-scalpel vasectomy | |where a small hole is punctured in the scrotum in which the vas deferens is pulled out and severed then the vas deferens are tied | |or catrtarized. No stitches are required since the holes are so small. The man will still function normally with discharge during | |orgasm just no sperm will be ejaculated. | 2. Where does fertilization take place? | ......

Words: 430 - Pages: 2