Preview

Topic 1 Basic Programming Concepts

Powerful Essays
Open Document
Open Document
3042 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Topic 1 Basic Programming Concepts
Introduction to Programming (ITE3101)

Topic 1 –
Basic Programming Concepts
ITE3101 Introduction to
Programming

Basic Programming Concepts
© VTC 2012

Topic 1, p.1

Introduction to Programming (ITE3101)

Lesson Intended Learning Outcomes
• Upon completion of this lesson, you should be able to:
– Identify input, output and processing from a problem description
– Design solution algorithms in pseudocode for simple problems with appropriate control structures Basic Programming Concepts
© VTC 2012

Topic 1, p.2

Introduction to Programming (ITE3101)

Lecture 1
Steps in Program Development
Characteristics of Good Programs
Algorithms and Algorithm Development
Basic Programming Concepts
© VTC 2012

Topic 1, p.3

Introduction to Programming (ITE3101)

Important Definitions
• A program is a sequence of instructions for computer data processing
• A machine language is low-level instructions executed by computer hardware
• A high-level programming language (e.g. Java, C,
C#) is human understandable, usually English-like
• A programmer is a person who solves problems and writes programs
• A user is a person who uses programs
Basic Programming Concepts
© VTC 2012

Topic 1, p.4

Introduction to Programming (ITE3101)

Computer Programming
• Computer Programming
– The development of a related series of instructions to an identified problem to direct computer to produce the desired results

• Computer programming is an art
• Given the right tools and steps, anyone can write well-designed programs

Basic Programming Concepts
© VTC 2012

Topic 1, p.5

Introduction to Programming (ITE3101)

Steps in Program Development

Basic Programming Concepts
© VTC 2012

Topic 1, p.6

Introduction to Programming (ITE3101)

Seven Basic Steps in Program Development
1.
2.
3.
4.
5.

Define the problem
Outline the solution
Develop the outline into an algorithm
Test the algorithm for correctness
Code the algorithm into a targeted programming language
6. Run the program on the computer
7.



References: – Robertson, L.A. (2006). Simple Program Design (5th ed.). Boyd & Fraser Publishing Company – Liang, D.Y. (2009). Introduction to Java Programming (8th ed.). Pearson Education, Chapter 1 • Internet – Topic about pseudocode on Wikipedia Basic Programming Concepts © VTC 2012 Topic 1, p.62

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Newport News County has a T-Ball league in Hampton, VA situated in the Mallory community. . This is a part of a large community of the local T-Ball and youth league programs offered in the area. The league is for young children between the ages of four and seven. The league is for building character, teaching team work and development. Each T-ball team consists of 12-14 kids from all the surrounding cities. The league allows for parents to come in and volunteer as a means to save cost. Though all cities don't have a team, those that have teams are named after current MLB team names.…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Garbage Collector in C#: Runtime has a Garbage Collector Which cleans the objects that are not in use.…

    • 485 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This is our first individual assignment for Programming unit this semester. This assignment was given in December 2013, and submission date is on 10th February 2014.…

    • 1859 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    IT/210 Appendix D

    • 453 Words
    • 4 Pages

    Up to this point, you have identified the processes the program must perform, but you have not given any consideration to exactly how the processes work together to solve the problem. At this point, you must generate a description of the processing using pseudocode, a natural language description of the processing the application must perform.…

    • 453 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Venit, S., & Drake, E. (2011). Prelude to Programming Concepts and Design (5th ed.). Boston, MA: Addison-Wesley.…

    • 1800 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Structured Query Language (SQL) is a standard database computer language used for querying, modifying and managing data in Relational Database Management Systems (RDBMS). SQL was developed in the 1970's by IBM to initially manipulate and retrieve data in IBM System R. The SQL language was standardized in 1986 by the American National Standards Institute (ANSI); however, later releases were released as International Organization for Standardization (ISO) standards.…

    • 612 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Programing Problems

    • 721 Words
    • 3 Pages

    IT 210 13 Programming Problems Pseudocode for chapter 2 checkpoint Frank T. Hartman IT 210 13 Programming Problems Pseudocode for chapter 2 checkpoint Frank T. Hartman Programming Problem 1 Main Module Declare SalesAmount As Real Declare CommissionRate As Real Declare CommissionEarned…

    • 721 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Intro to Unix Project 2

    • 636 Words
    • 3 Pages

    2- Description of pipes: The symbol | is the Unix pipe symbol that is used on the command line. What it means is that the standard output of the command to the left of the pipe gets sent as standard input of the command to the right of the pipe. Note that this functions a lot like the > symbol used to redirect the standard output of a command to a file. However, the pipe is different because it is used to pass the output of a command to another command, not a file.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ms Project Lesson 3

    • 298 Words
    • 2 Pages

    When you do not want the duration of a certain task to change. If you have a four day review for everyone on the project, when you assign more resources to that task, the days decrease, this is when you do not want effort driven scheduling. You want it to stay at 4 days.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    c. Modify the program of Part b so that at the option of the user, it displays…

    • 300 Words
    • 2 Pages
    Good Essays
  • Better Essays

    1) You can call the module several times instead of writing it out each time.…

    • 1580 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Cs Programming Chapter 1

    • 2450 Words
    • 10 Pages

    ____ data items may involve organizing or sorting them, checking them for accuracy, or performing calculations with them.…

    • 2450 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a.x is available to code that is written outside the Sphere class. b.radius is not available to code written outside the Sphere class. c.radius, x, y, and z are called members of the Sphere class. d.z is available to code that is written outside the Sphere class.…

    • 1368 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Intro to programming

    • 534 Words
    • 3 Pages

    Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height.…

    • 534 Words
    • 3 Pages
    Good Essays