Free Essay

Pt1420 Unit 6 Assignment 1

In: Computers and Technology

Submitted By caracoay784
Words 764
Pages 4
Week 06 Assignments

Textbook Reading * Chapter 4 * Chapter 5 sections 5.1, 5.2, and 5.3 (pages 196-201)

Week 06 Homework

From the Gaddis textbook: * Programming Exercises 2, 6 and 9, on pages 160-161
For the Programming Exercises, design a program means write the pseudocode for the program. Except for Programming Exercise 2, your design should include multiple modules, not just main().
Upload a Microsoft Word document with the pseudocode to your shared PT1420 community website or submit a paper copy to your instructor by the beginning of the Week 7 class.
Programing Exercises pg. 160-161
2. Areas of rectangles
Module Main()
Declare width1 integer = 0
Declare length1 integer = 0
Declare width2 integer = 0
Declare length2 integer = 0
Declare area1 integer = 0
Declare area2 integer = 0
Call rectangle1 (width1, length1, area1)
Call rectangle2 (width2, length2, area2)
Call comparison (rectangle1, rectangle2)
Display “press enter to continue”
End module

Module rectangle1 (value width1 as integer, value length1 as integer, value area1 as integer) Display "Enter the width of rectangle 1” Input width1 Display "Enter the length of rectangle 1" Input length1 area1 = width1 * length1
End module
Module rectangle2 (value width2 as integer, value length2 as integer, value area2 as integer) Display "Enter the width of rectangle 2” Input width2 Display "Enter the length of rectangle 2" Input length2 area2 = width2 * length2
End module

Module comparison (reference area1 as integer, reference area2 as integer) If area1 > area2 then Display “The rectangle 1 is larger” Else Display “The rectangle 2 is larger” End if
End module

6. Book club points
Main module () Declare purchase as integer = 0 Display “input the number of books have you purchased this month:” Input purchase If purchase < 1 then Display “you have 0 points” Else If purchase < 2 then Display “You have 5 points” Else If purchase < 3 then Display “You have 15 points” Else If purchase < 4 then Display “You have 30 points” Else Display “you have 60 points” End if End if End if End if End if
End main

9. Shipping charges
Main module () Declare pounds integer = 0 Display “input the weight of your package weigh in Lbs:” Input pounds
If Lbs <= 2 then Display “your will cost $1.10 to ship.” Else If Lbs <= 6 then Display “your will cost $2.20 to ship.” Else If Lbs <= 10 then Display “your will cost $3.70 to ship.” Else Display “your will cost $3.80 to ship.” End if End if End if
End if
End main

Upload a Microsoft Word document with the pseudocode to your shared PT1420 community website or submit a paper copy to your instructor by the beginning of the Week 7 class.

Week 05 and 06 Research – Exploring Why and When to Use Shell Scripts
Use the Internet and the ITT Tech Virtual Library to research shell scripts and answer the following questions:
What is the shell and what is a shell script?
What are some examples of tasks that shell scripts are used for? * Include at least three examples.
What are the advantages and disadvantages of using shell scripts? * Include at least three advantages and three disadvantages.
What are the ways to automate tasks in, also known as the kinds of named commands executed by, Windows PowerShell? * Name and briefly describe at least three of them.
Note that in the DOS operating system, a shell script is called a batch file and in IBM's mainframe VM operating systems, it's called an EXEC.Upload a Microsoft Word document with findings to your shared PT1420 community website or submit a paper copy to your instructor by the beginning of Week 7 class.
Research assignment
A shell script is a script written for the command line interpreter of an operating system. The shell is often considered a simple domain-specific programming language. It's called a shell script because it combines into a "script" in a single file a sequence of commands that would otherwise have to be presented to the system from a keyboard one at a time. Some advantages include; easy file selection, quick start, and interactive debugging. It can be used to provide sequencing and decision-making linkage around existing programs. Interpretive running makes it easy to write debugging code into a script and rerun it to detect and fix bugs.

The Most common usage methods of PowerShell are interactive console (powershell.exe) and script files. PowerShell uses special commands called cmdlets (pronounced 'command-lets') that can use .Net objects in input and output. PowerShell can also use legacy command line utilities.

Similar Documents

Free Essay

Pt1420 Programming Unit 1 Research Assignment

...language and integrated development environment (IDE) from Microsoft for its COM programming model first released in 1991. Visual Basic is designed to be relatively easy to learn and use.[1][2] Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Java was originally developed by James Gosling at Sun Microsystems (which has since merged into Oracle Corporation) and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++, but it has fewer low-level facilities than either of them. Java is a general-purpose, concurrent, class-based, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another. PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. PHP is now installed on more than 20 million websites and 1 million web servers. Originally created by Rasmus Lerdorf in 1995, the reference implementation of PHP is now produced by The PHP Group. While PHP originally stood for Personal......

Words: 1885 - Pages: 8

Premium Essay

Unit 6 Assignment 1

...Chapter 6: Conceptual Review Questions (All Questions worth 5 points each) Match the information below with Questions 1 through 14. |A. Compound Interest |E. IRR |I. PMT |M. ROI | |B. CUMPRINC |F. NPER |J. PPMT |N. Simple Interest | |C. FV |G. NPV |K. PV |O. SLN | |D. IPMT |H. Payback Period |L. RATE |P. Type | 1. Function to calculate the interest percentage per period of a financial transaction 2. Function to calculate the value at the beginning of a financial transaction 3. Function to calculate value of the end of a financial transaction 4. Function to calculate periodic payments in or out of a financial transaction 5. Function to calculate the number of compounding periods in a financial transaction 6. Use a “1” for this argument to indicate that interest will be paid at the beginning of each compounding period 7. This type of interest is calculated based on original principal regardless of the previous interest earned 8. This type of interest is calculated based on principal and previous interest earned 9. Function to calculate straight line depreciation based on the initial capital investment, number...

Words: 622 - Pages: 3

Premium Essay

Pt1420 Unit 8 Assignment 1: Homework

...Short Answer Review Questions: 6. What is an infinite loop? Write the code for an infinite loop. An infinite loop is a sequence of instructions in a computer program which loops endlessly. Example of an infinite loop: Set k = 1 While k < = 5 Display k End While 7. A FOR loop looks like what other loop in a flowchart? A For loop looks like a count-controlled loop. 8. Why is it critical that accumulator variables are properly initialized? An accumulator is used to keep a running total of numbers. In a loop, a value is usually added to the current value of the accumulator. If it is not properly initialized, it will not contain the correct total. 9. What is the advantage of using a sentinel? The advantage of using a sentinel is that when you are processing a long list of values with a loop a sentinel marks the end of a list of items. There is no limit to how many times a loop can execute. 10. Why must the value chosen for use as a sentinel be carefully selected? The value of a sentinel needs to be carefully selected because it can’t be mistaken as a regular value in the list. Algorithm Workbench: 3. // Declare a counter variable. Declare Integer // Constant for the maximum value Constant Integer MAX_VALUE = 100 //Display the multiples of 10 from 0 through 100 For counter = 0 to MAX_VALUE Display counter End For   4. //Declare Integer number Declare an accumulator variable Declare Integer total =......

Words: 303 - Pages: 2

Premium Essay

Unit 6 Assignment 1

...IS3340-WINDOWS SECURITY | Minimizing Recovery Time Strategies | Unit 6 Assignment 1 | | | 5/5/2014 | | This document outlines the required steps to follow, in-order to properly scan the necessary servers and workstations in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA(Microsoft Baseline Security Anaylizer) •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. *......

Words: 487 - Pages: 2

Premium Essay

Unit 2 Assignment 1 Pt1420

...Unit 2 Assignment 1: Homework Kenneth D. Davis Intro to Programming Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Interview the customer 2. What is pseudocode? Fake Code 3. Computer programs typically perform what three steps? 1. Input is received. 2. Some process is performed on the input. 3. Output is produced. 4. What does the term “user- friendly” mean? The term user- friendly is commonly used in the software business to describe pro-grams that are easy to use. Programs that do not display adequate or correct instruc-tions are frustrating to use, and are not considered user- friendly. One of the simplest things that you can do to increase a program’s user- friendliness is to make sure that it displays clear, understandable prompts prior to each statement that reads keyboard input. 5. What two things must you normally specify in a variable declaration? You must specify the variable type and an identifier 6. What value is stored in uninitialized variables? Some languages assign a default value as 0 to uninitialized variables. In many languages, however, uninitialized variables hold unpredictable values. Algorithm Workbench 1. Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height. Set height = 72” Display ‘Enter your Height at Age 21’ Input hEIGHT Display ‘Enter your Height at Age 22’ Input......

Words: 458 - Pages: 2

Premium Essay

Nt Unit 6 Assignment 1

...Unit 6. Assignment 1. AD User/Group Design Scenario Dear Junior Admin, I received your E-mail and in response I recommend that you do the following. Since there is a domain for each department, such as Marketing, accessing one printer is rather easy. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the marketing domain local group. For HR, you will need to take all of the users within the forest and add them to a global then universal group. Proceed to take the universal group and add it to the domain local group within their domain. These users will then have access to whatever is in that universal group, therefore you must make sure that you assign the printer for them to print vacation requests to the HR department. You must take a slightly different approach for R&D. To allow access to only the server, you must first create a domain local group that has some administrative rights. Add them to a customized admins group that you have control of. You can assign these rights and permissions as you create and assign them. Remember to limit their access to their local machines only. You can do all of this through the desktop local user account settings. You may also take a different route if you choose to. This is one of the approaches you may......

Words: 288 - Pages: 2

Premium Essay

Unit 6 Assignment 1

...Used to connect devices that contained DB9 pin connections usually mouse’s and keyboards. In todays computers Serial Ports have all been upgraded to USB ports. • Parallel Port- Used to connect printers or external devices such as hard disk drives. Parallel Parts are unique with a DB25 pin connection. They call it DSUB or DB25 cause the connection looks like a D • SRAM- also known as (Static random access memory) is a type of semiconductor memory where the word static indicates that, unlike dynamic ram or DRAM, it doesn’t need to be periodically refreshed. • DRAM- also known as (Dynamic Random Access Memory), DRAM is one of the most commonly found memory modules in PC compatible personal computers and workstations. Though out the assignment I have learned and gave my self a clear understanding on what certain terms and well older technology that has paved the way for our new technology to exist. The information in the video clips provided was very informative with helpful hints on what to expect from the A+ certification exam. We will use this information when we build our own system....

Words: 340 - Pages: 2

Free Essay

Unit 6 Assignment 1

...correctly to the correct pin at each end.” The second tool is the tone generator. A tone generator is a two-piece unit that consists of a tone generator and a probe. This type of tester's primary function, amongst installers, is to identify specific locations in a punch-down block then label accordingly. According to Oliviero and Woodward (2011, p.442-443), these testers “Transmit[s] a signal, or, with an alligator clip, you connect the unit to an individual wire. The other unit is an inductive amplifier, which is a pen-like probe that emits an audible tone when touched to the other end of the conductor.” Primary functions are identify a particular cable within a bundle and to test for opens, shorts, and miswires of individual wires. Unfortunately, there is a disadvantage to using this device; time consuming. The third and final tester to be discussed are Multifunction Cable Scanners (commonly referred to as a certification tool). Alarmingly, these devices are highly expensive but are available for both copper and fiber-optic networks. Multifunction Cable Scanners (MCS) perform a series of basic tests on a cable run. These test's include wire-mapping, length, attenuation, and NEXT for copper cabling. As for fiber-optic cabling, these scanners perform optical power and signal loss tests. One great advantage to using an MCS is anyone can use it. Connect the unit to a cable, press a button and read off message after tests are completed. On the other hand, the......

Words: 399 - Pages: 2

Premium Essay

Pt1420 Unit 1 Assignment 1 Homework

... The typical hardware associated with a computer includes but are not limited to input devices such as mice, keyboards and webcams. Output devices like monitors, speakers and printers and your different types of memory (CPU, RAM, SSDs.) The computer’s data storage process consists of tiny electrical power charges in microscopic capacitors. When a computer is turned off the capacitors that your data is stored on lose their charge which is why computer memory goes blank when it is off. For data that is stored for longer periods of time, it is stored as a magnetic pattern on a spinning disk. A program is a set of instructions that a computer follows in order to perform a task. A program is run by the computer’s CPU or Central Processing Unit. Each instruction in a program tells the CPU to perform a specific operation. Machine Language: Language that CPU understands. It is always written in binary. Assembly Language: Language that consists of short words known as mnemonics. It was created because it was impractical for people to write programs in machine language. High-Level Language: Allows people to create powerful and complex programs without knowing how the CPU works, and without writing large numbers of low-level instructions. Compiler: Program that translates a high-level language into a separate machine language program. Interpreter: Program that both translates and executes the instructions in a high-level program. As described earlier in this paper, I......

Words: 287 - Pages: 2

Free Essay

Is3340 Unit 6 Assignment 1

... IS3340 Unit 6 Assignment 1 1. How much data has been modified between the last backup and the time of failure? No data should have been lost since nothing was change since the last backup and the backup would have been completed before the error occurred. 2. What images are necessary to recover the workstation? The images that are necessary would be the reimaging image along with the latest back up image available. 3. What are the steps necessary to fix the problem that cause the data loss? Verify what caused the loss by reading the logs. Determine the fix for the issue. Reimage the computer. Restore the computer to last backup state and disable the issue that caused the data loss. 4. What steps should Ken 7 take to avoid a reoccurrence of this issue in the future? Read the logs to find out what caused the issue that caused the data lose.   Right a procedure guide to prevent the issue from occurring. Alert users of the occurrence of the issue and the way to prevent the issue. (Soloman, 2001) Procedure Guide: 1. Read logs to decide what cause the issue to occur. 2. Re-Image the computer to default configuration. 3. Restore to first available backup of the system. Restore Process: 1. Right-click on your Computer desktop icon (or click Start and right-click on the Computer tab on the right pane of the menu). 2. Click on Properties. 3. Locate the System protection tab in the System Properties menu. 4. Select the hard disk that......

Words: 393 - Pages: 2

Free Essay

Unit 6 Assignment 1

...Unit 6 Assignment 1: Cable Testers In almost every application in dealing with cable installations, cable testing is a must. Some methods of testing cables include testing for attenuation, continuity testers, DC Resistance, a wire mapper and cable length. In all cable types- copper or fiber, 10BASE-T or 100BASEFX, the standards are constantly being changed and developed into a new standard for all future technologies. When testing cable, you can guarantee that the users will be satisfied when all connections prove effective for not just uninterrupted transmission but correct bandwidths to support. A wire mapper is the most common tool. It simply provides a test of a standard Cat5 cable to ensure each individual wire not only carries a strong signal through the entire length of the route, but it proves if each wire ends up in the correct pin number on the opposite end to receive the transmission. It will give the technician an idea if a cable has a short, or if it is a crossover cable. It is also very useful with telephone connections. It should be a part of each cable installation kit. Another common tool is a continuity tester. It shows if there is a direct connection between two points. If there is a closed electrical pathway for the tester to detect, then the device will make a sound. This is useful not only to test for a short, but also to determine and identify which cable is which in a closet full of many cables. This is also a very important tool in any......

Words: 437 - Pages: 2

Premium Essay

Unit 6 Assignment 1 Questions

...Unit 6 Assignment 1: Homework Learning Objectives and Outcomes Name the main events in the development of SQL statements. Run SELECT queries with wild cards, DISTINCT key word, calculations, sorting and aliasing. Run queries with the WHERE clause to filter the result sets. Use the Aggregate functions COUNT, AVG, SUM, MIN, and MAX. Assignment Requirements Answer the true-or-false questions on the next page by filling out the answer sheet. Required Resources Textbook Submission Requirements Submit your completed answer sheet to your instructor at the beginning of Unit 7. Unit 6 True/False Questions Indicate whether the following statements are true or false on the student answer sheet. 1) SQL is the programming language used to manipulate data and data objects in a relational database management system. 2) SQL is a procedural language. 3) A declarative language is a language in which you tell the computer what to do not how. 4) DML, or Data Manipulation Language, contains all the commands for selecting and modifying data. 5) DDL, or Data Definition Language, contains all the commands for selecting and modifying data. 6) The * in SELECT * clause of an SQL statement is a wildcard for returning all columns in a table. 7) The DISTINCT keyword in a SELECT statement returns only unique rows. 8) The FROM keyword is used in a SELECT clause to determine which columns are included in the query. 9) An alias in SQL is a......

Words: 363 - Pages: 2

Premium Essay

Home Page » Computers and Technology Pt1420 Unit 1 in: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” Itt Technical Institute Intro to Programming – Pt1420 Unit 1 Assignment 1 Short Answer Questions 1.

...Home Page » Computers and Technology Pt1420 Unit 1 In: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An......

Words: 393 - Pages: 2

Premium Essay

Unit 6 Research Assignment 1

...PT2520 Database Concepts Unit 6 Research Assignment 1: Explore the latest ANSI and ISO Standard True/False 23-Jul-2016 Tim Church Daigre ANSI- The American National Standards Institute (ANSI) oversees the creation, promulgation and use of thousands of norms and guidelines that directly impact businesses in nearly every sector: from acoustical devices to construction equipment, from dairy and livestock production to energy distribution, and many more. ANSI is also actively engaged in accreditation - assessing the competence of organizations determining conformance to standards. To enhance both the global competitiveness of U.S. business and the U.S. quality of life by promoting and facilitating voluntary consensus standards and conformity assessment systems, and safeguarding their integrity. ISO- International Organization for Standardization (ISO) is an independent, non-governmental international organization with a membership of 163 national standards bodies. Through its members, it brings together experts to share knowledge and develop voluntary, consensus-based, market relevant International Standards that support innovation and provide solutions to global challenges. Part II- The latest SQL standard was adopted in July 2003 and is often called SQL:2003. One part of the SQL standard, Part 14, SQL/XML (ISO/IEC 9075-14) was revised in 2006 and is often referenced as "SQL/XML:2006". ANSI/ISO/IEC 9075:2003, "Database Language SQL", Parts 1......

Words: 278 - Pages: 2

Free Essay

Unit 6 Pt1420 Introprogramming

...Delvon Frye 7/26/2016 PT1420 Unit 6 Assignment Algorithm Workbench pg. 159 6-10 6. Select number Case 1: Display “You selected A.” Case 2: Display “You selected 2.” Case 3: Display “You selected 3.” Case 4: Display “You selected 4.” Default: Display “Not good with numbers, eh?” End Select 7. If Speed 24 > and Speed < 56 Display “Speed is normal.” Else Display “Speed is abnormal.” 8. If points are < 9 and >51 Display “Invalid points.” Else 9. Display “Valid points.” Select testMonth Case value_1: Display “January has 31 days.” Case value_2: Display “February has 28 days.” Case value_3: Display “March has 31 days.” Default: Display “Invalid selection.” End select 10. If hours==10 THEN Programming Exercises 5 and 8 pg. 160 5. Dim color1 as string Dim color2 as string Display (“Please enter two primary colors.”) Display (“The color you made is Purple”) Else Display (“The color you made is Purple”) Else Display (“The color you made is Orange”) Else Display (“The color you made is Orange”) Else Display (“The color you made is Green”) Else Display (“The color you made is Green”) Else If color1 = else or color2 = else then Display (“You failed to enter a valid color!”) End if 8. //This is a program asks the user to enter the number of coins required to make exactly one dollar. //Declare the variables Declare Real pennies Declare Real nickels Declare Real dimes......

Words: 533 - Pages: 3