# IT104 Assignment Unit 5

Satisfactory Essays
307 Words
Grammar
Plagiarism
Writing
Score
IT104 Assignment Unit 5
1) What does a professional programmer usually do first to gain an understanding of a problem?
A professional programmer will work with the customer to see what the problem is.

2) What is pseudocode? Pseudocode is an informal language that has no syntax rules, and is not meant to be compiled or executed.

3) Computer programs typically perform what three steps?
Input, process is performed on the input and Output is produced.

4) What does the term "user-friendly mean?
User-friendly means easy to understand.

Algorithm Workbench

1)
1) Tell user to enter his/her height
2) Have user enter his/her height
3) Store the value in variable called height
2)
1) Tell user to enter his/her favorite color
2) Have user enter his/her favorite color
3) Store the value in variable called color

Programming Exercise

Input name
Input address, with city state and ZIP
Input telephone number
Display “Enter college major”
Input collegeMajor
Display “My phone number is”, telephoneNumber
Display “My college major is”, collegeMajor

2) Display "Enter projected amount of the total sales"
Input totalSales
Set percent = .23 profit = totalSales * percent
Display "My total profit is ", profit

3) Display "Enter total square feet of land: "
Input total square feet
Set acre = 43560
Display "My Total acres is ", totalsquarefeet/Acre

4) Display “Enter the price of item1”
Input item1
Display “Enter the price of item2”
Input item2
Display “Enter the price of Item3”
Input item3
Display “Enter the price of Item4”
Input item4
Display “Enter the price of Item5”
Input item5
Set subtotal= item1+ item2 + item3 + item4 +item5
Display “The subtotal for the 5 items is”, subtotal
Set salesTax = .06
Set

## You May Also Find These Documents Helpful

• Satisfactory Essays

The company I choose is a small IT company. The company offers all the big major companies technical support. They have to backup client information, finical records, and employee’s information. The company would use the GFS scheme for backing up their information. The GFS scheme comes with a full month backup which is stored offsite, and a weekly and daily backup that is kept onsite as well as offsite. The weekly and daily backups are kept onsite for 30 days then are reused and recycled daily and weekly at the offsite location. The monthly backup that is secured offsite is kept for 3 years depending on the client. Presently for the…

• 409 Words
• 2 Pages
Satisfactory Essays
• Satisfactory Essays

What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand.…

• 309 Words
• 2 Pages
Satisfactory Essays
• Good Essays

In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

• 4837 Words
• 20 Pages
Good Essays
• Satisfactory Essays

The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

• 426 Words
• 2 Pages
Satisfactory Essays
• Satisfactory Essays

cout << "You are in factorial program of C++. Please enter a +ve integer:- ";…

• 426 Words
• 2 Pages
Satisfactory Essays
• Satisfactory Essays

1. Home use for a family of four people who have broadband Internet access (e.g., DSL or cable)…

• 256 Words
• 4 Pages
Satisfactory Essays
• Good Essays

Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? ( choose two answers)…

• 957 Words
• 4 Pages
Good Essays
• Powerful Essays

i. WU HIPAA Security Policy requires procedures to ensure that access to a system that contains EPHI and is used to provide patient treatment is made available to any caregiver in the case of an emergency if the denial or strict access to that EPHI could inhibit or negatively affect patient care. During extreme emergency conditions, RO would rely upon BJH electronic access to the IMPAC electronic medical record as well as BJH Health Informations Management (HIM) for access to the physical medical record.…

• 1549 Words
• 6 Pages
Powerful Essays
• Satisfactory Essays

When addressing system performance, a key element that is often overlooked is Disk Fragmentation. Even on a brand new system with plenty of RAM and processing speed, the performance of the hard disk may be a bottleneck causing issues. It takes time to load large data files into memory - issues become particularly noticeable when dealing with movies, video clips, database files or image files which may easily be several gigabytes in size. On a freshly formatted disk, these files load fairly quickly. Over time, however you may start to notice performance issues - caused by disk fragmentation.…

• 356 Words
• 1 Page
Satisfactory Essays
• Good Essays

An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

• 553 Words
• 3 Pages
Good Essays
• Powerful Essays

From the knowledge gained, the student are requires to draft a new version of OS that include a new name for the OS , LOGO, design principles and so on and prepare for the Report and presentation…

• 4503 Words
• 19 Pages
Powerful Essays
• Satisfactory Essays

1. What does a professional programmer usually do first to gain an understanding of a problem?…

• 848 Words
• 4 Pages
Satisfactory Essays
• Satisfactory Essays

2. Display the contents of the file GRADES created in Problem 1. Each student’s record should appear on a separate line and include the total score (the sum of the three tests) for that student. For example, a line of output might be as follows:…

• 286 Words
• 2 Pages
Satisfactory Essays
• Good Essays

I had a great freshman year at IU where I could take almost any class and enjoy it, unlike high school where you had to take the exact same curriculum as your peers. After wrapping up my first year of college, one class especially stood out from many good courses that not only grabbed my attention but let my personality flourish, I101. I enrolled in this class because I’ve been interested in computers and technology from a young age. Little did I know, the course not only encompassed my fascination of computers, but dove into ethics and implications, subjects that I read about regularly and let me solve problems scientifically in a way that uniquely suited me. I enjoyed my time in the class learning topics such as python and databases. There…

• 1542 Words
• 7 Pages
Good Essays
• Satisfactory Essays

Chapter 5: Computer Programming 5.1 Introduction to Programming 1. Define Programming? 2. What is Computer programming? 3.…

• 719 Words
• 3 Pages
Satisfactory Essays