Preview

It 210 Week 4 Control Flow Diagram and Code

Satisfactory Essays
Open Document
Open Document
389 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 210 Week 4 Control Flow Diagram and Code
Control Flow Diagram—Main Control
[pic]

Control Flow Diagram—Display Menu
| |
|[pic] |

Control Flow Diagram—Get_Int_Value
| |
|[pic] |

Control Flow Diagram—Convert Currency
| |
|[pic] |

Control Flow Diagram—Display_Results
|[pic] |

Pseudocode Example

Main Module Declare currencyType as Integer Declare internationalValue as real Declare USValue as real

currencyType = 1 \ Comment: set currencyType to some number less than 6 \ to drop into the Do While loop below

Do While currencyType < 6 Call Display Menu \Comment: if the user selects 6 in the Display Menu \ module then the user wants to Quit. If currencyType >= 1 and currencyType 6 \ to drop into the Do While loop)

Do While (currencyType < 1 OR currencyType > 6) Display "Currency conversion program" Display "Please make a selection" Display "1: Canadian Dollars" Display "2: Mexican Pesos" Display "3: English Pounds" Display "4: Japanese Yen"

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It 237 Toolwire Tutorial

    • 287 Words
    • 2 Pages

    Bent Brick has been the leader in selling brick, stone, and other masonry in the Atlanta area for more than 50 years. Of course, we are known throughout this area as being the primary seller of our special preformed curved brick. Our products are noted not only for their beauty, but also for their durability. We offer a 20-year guarantee on every product we sell.† We don't just sell the finest brick and stone, we also install it. We will come to your site and plan your project from start to finish. Let our expert designers and masons take care of every detail of your project. We know that these days both residential and commercial properties have both eyes on the budget, so we will work with you to create a package that meets not only your structural needs, but also your financial needs as well.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Axia College Material Appendix I Currency Conversion Development Assignment—Flowcharts Complete the flowcharts for the assignment above by typing into the textboxes below. Week 4 IT/210 Control Flow Diagram—Main Control ------------------------------------------------- Begin You are entering the currency converter Quit ?…

    • 585 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pt1420 Unit 6 Programming

    • 420 Words
    • 5 Pages

    print (” These are not primary colors . I can ’ t mix them !”)…

    • 420 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    It210 Week 4 Psuedocode

    • 584 Words
    • 3 Pages

    No || no Then Write: “Let’s start then.” Call Display_Menu End If End Quit_Program Display_Menu Module Write: “*Welcome to the Currency Convertor*” Write: “Please select the currency you would like to convert to U.S. Dollars.”…

    • 584 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1110 Unit 2 Analysis

    • 1366 Words
    • 6 Pages

    Computer Shopper: the Student, the Gamer and BusinessmanWhat is usually required with someone’s profession? Technology has evolved and changed throughout history and the world. In the 80’s and even early 90’s, type writers and the mail man were highly relied on when it came to communication. Today when it comes to communication now we have e-mail and text messaging. Presently different professions use computer but with different configurations. So what I did was take three known professions business, student and professional gamer. To describe what functions…

    • 1366 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    IT104 Assignment Unit 5

    • 307 Words
    • 2 Pages

    1) What does a professional programmer usually do first to gain an understanding of a problem?…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mgmt 520 - Homework

    • 459 Words
    • 2 Pages

    In nowadays, background check of hiring employee is practicing by almost all agencies. Point is that, the skills of the applicant can be, somehow, figured out. It is much more difficult to assess the level of trust, honesty, mental toughness, and loyalty. Reading through chapter 9, and conducting a slight research, my answers to the questions of the given scenario are as follows:…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It237 Week 2 Checkpoint

    • 414 Words
    • 2 Pages

    Throughout this paper I will be describing external, embedded, and inline types of cascading style sheets. Also, I will be providing a pro and a con for each type of cascading style sheet.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ITT Tech EN3220_Analysis1

    • 696 Words
    • 2 Pages

    Critical and creative thinking skills are a must when you have a family with two working parents and two children. This past year my wife and I have had to become very creative with our budgeting to keep our family on a clear financial track. Raising a family can be tricky for anyone but when financial problems unexpectedly arise it really throws a curve ball in the mix. We had to do some quick thinking and come up with some unusual methods to keep our family on track with the holidays quickly approaching. We used creative thinking to look around for the ideas and critical thinking to put those creative ideas out and decide which ones would work best for our situation.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    How to challenge information, documents, systems, structures, procedures and practices that are discriminatory, especially in relation to individuals’ communication and information needs.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The U.S. Federal and State compliance laws in regards to data protection affect all financial institutions in that non-compliance will result in fines and penalties. ABS Financial Solutions handles sensitive data for many credit unions and without regulations governing data security there would be no repercussions when private information is mishandled, lost or stolen. ABS understands their responsibility for protecting their client’s data and the threat of the retribution both federal and civil for non-compliance ensures they take appropriate security precautions.…

    • 407 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    deployment flow chart

    • 1271 Words
    • 6 Pages

    “The clinical microsystem is the place where patients, families, and caregivers meet. It is the lotus of value creation in healthcare.”(Nelson, Batalden, et.al, 2011)…

    • 1271 Words
    • 6 Pages
    Good Essays