What we’ll Learn:Introduction to decision structures
If
If then
If else
Nested decision structures
The case structures – switch case
Logical operators – True or False
Boolean variables – 0 or 1
1 Introduction to Computers and Programming LanguageKwan Lee
What we’ll Learn:
Understanding Computer Systems
Simple programming logic
Program development cycle
Pseudocode statement and flowchart
Evolution of programming models
This document discusses file handling in C/C++. It begins by defining a computer file and explaining why file handling is important in programming. It then outlines the five main steps for file handling in C++, which are to include header files, declare file stream variables, associate streams with files, perform read/write operations, and close files. Various C++ file stream functions like open(), close(), getline(), and >> and << operators are described. Code snippets are provided as examples to read from and write to text files, appending data to files, and getting all data from a file.
Why we need open data? FMI Open Data on AWSRoope Tervo
Why we need open data and how should we provide it. FMI provides the same data in its own open data portal but also in AWS public dataset program. Different use cases require different services and channels.
Advanced Flink Training - Design patterns for streaming applicationsAljoscha Krettek
The document describes requirements for a platform to detect suspicious behavior in an organization. It involves three patterns:
1) Time-based aggregations to detect behaviors like many login failures within a short time. Windowing and aggregating events is needed.
2) Data enrichment to report details of alerts, like fetching user profiles to identify users. Side inputs allow querying external databases during event processing.
3) Dynamic processing since rules change over time. Broadcast state stores evolving rules and connects them to user event streams for continuous checking.
Greenplum: Driving the future of Data Warehousing and Analyticseaiti
Greenplum provides a massively parallel processing (MPP) database for data warehousing and analytics. Their Enterprise Data Cloud initiative aims to address the challenges of commodity hardware, massive data scales, and user expectations by providing a platform for extreme scale, self-service provisioning of databases, and unified data access across a company. This new architecture directly addresses customer needs around business issues and opportunities by enabling elastic expansion, rapid creation of data marts and warehouses, and easy publishing and sharing of enterprise data.
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...aOS Community
This document summarizes a presentation on data leak protection using Rights Management and Data Loss Prevention in Office 365. The presentation covered how RMS and DLP can help prevent sensitive data from being leaked outside an organization by encrypting and monitoring emails, documents and files. It provided examples of data breaches and demonstrated how to configure RMS and DLP policies in Exchange, SharePoint and OneDrive to control who can access and share sensitive content. The presenter also discussed creating custom sensitive information types for DLP policies.
What we’ll Learn:Introduction to decision structures
If
If then
If else
Nested decision structures
The case structures – switch case
Logical operators – True or False
Boolean variables – 0 or 1
1 Introduction to Computers and Programming LanguageKwan Lee
What we’ll Learn:
Understanding Computer Systems
Simple programming logic
Program development cycle
Pseudocode statement and flowchart
Evolution of programming models
This document discusses file handling in C/C++. It begins by defining a computer file and explaining why file handling is important in programming. It then outlines the five main steps for file handling in C++, which are to include header files, declare file stream variables, associate streams with files, perform read/write operations, and close files. Various C++ file stream functions like open(), close(), getline(), and >> and << operators are described. Code snippets are provided as examples to read from and write to text files, appending data to files, and getting all data from a file.
Why we need open data? FMI Open Data on AWSRoope Tervo
Why we need open data and how should we provide it. FMI provides the same data in its own open data portal but also in AWS public dataset program. Different use cases require different services and channels.
Advanced Flink Training - Design patterns for streaming applicationsAljoscha Krettek
The document describes requirements for a platform to detect suspicious behavior in an organization. It involves three patterns:
1) Time-based aggregations to detect behaviors like many login failures within a short time. Windowing and aggregating events is needed.
2) Data enrichment to report details of alerts, like fetching user profiles to identify users. Side inputs allow querying external databases during event processing.
3) Dynamic processing since rules change over time. Broadcast state stores evolving rules and connects them to user event streams for continuous checking.
Greenplum: Driving the future of Data Warehousing and Analyticseaiti
Greenplum provides a massively parallel processing (MPP) database for data warehousing and analytics. Their Enterprise Data Cloud initiative aims to address the challenges of commodity hardware, massive data scales, and user expectations by providing a platform for extreme scale, self-service provisioning of databases, and unified data access across a company. This new architecture directly addresses customer needs around business issues and opportunities by enabling elastic expansion, rapid creation of data marts and warehouses, and easy publishing and sharing of enterprise data.
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...aOS Community
This document summarizes a presentation on data leak protection using Rights Management and Data Loss Prevention in Office 365. The presentation covered how RMS and DLP can help prevent sensitive data from being leaked outside an organization by encrypting and monitoring emails, documents and files. It provided examples of data breaches and demonstrated how to configure RMS and DLP policies in Exchange, SharePoint and OneDrive to control who can access and share sensitive content. The presenter also discussed creating custom sensitive information types for DLP policies.
What we’ll Learn:
How you design a program
Declaring and using variables and constants
Assigning values to variables
Named constants
The need for good planning and design
1. The document provides answers to various tasks and concepts related to system analysis and design. It includes context diagrams, data flow diagrams, decision trees, input/output forms, and reflective thinking.
2. Answers include a context diagram showing data sources and outputs, a decision tree table for 8 conditions and 4 actions, and IPO charts for input/output forms like applications for average calculation and donor applications.
3. The reflective thinking answer discusses learning system analysis and design concepts over two semesters and how they will be useful for both career and everyday life.
Risk Analytics Using Knowledge Graphs / FIBO with Deep LearningCambridge Semantics
This EDM Council webinar, sponsored by Cambridge Semantics Inc. and featuring FI Consulting, explores the challenges common to a risk analytics pipeline, application of graph analytics to mortgage loan data and use cases in adjacent areas including customer service, collections, fraud and AML.
Modern data ecosystems require new paradigms to address diverse data sources and user needs. Traditional assumptions about data originating from internal systems and a single data warehouse no longer apply. A new model called "Data Regions" establishes multiple environments for different data usage scenarios, including source onboarding, exploration, reporting, analytics and more. By supporting varied access, structures, domains and integrity across regions, Data Regions can address today's complex data challenges and modernize companies' data ecosystems.
Why we need open data and how should we provide it. FMI provides the same data in its own open data portal but also in AWS public dataset program. Different use cases require different services and channels. Presentation kept in AWS pop-up loft in Stockholm 2018.
This document provides an overview of a lecture on big data analytics given by Dr. Ching-Yung Lin. The key points covered in the lecture include:
- Definitions and characteristics of big data based on the 3V's of volume, velocity and variety.
- Techniques used for big data such as massive parallelism, distributed storage and processing, machine learning and data visualization.
- Factors that have enabled big data to become prominent in recent years like greater data collection, open source software and commodity hardware.
- Examples of big data platforms, databases and analytics techniques including Hadoop, Spark, NoSQL databases and graph databases.
- The large and growing market for big data
Cruise, Eat, Sleep, Repeat Best Practices on Setup and Customizing Your Case ...Ipro Tech
The document discusses best practices for customizing case templates in Eclipse. It provides examples of customizing processing templates to set expectations for document handling, and review templates to save time when creating future cases. The hands-on sections demonstrate how to modify settings for a new employment case, create additional processing cases for different file types, and edit review settings like tags, coding forms and saved searches.
Many companies face the challenge of building up a data science team from scratch and it can be hard to figure out how to start. In 2016, I was the first hire of a new data science team, with little infrastructure or strategy in place. Over the years, there were many different challenges for us to solve and mistakes to learn from as the team got more and more mature. This talk is about what I learned about the process of building up a data science team, from both my own experience in the past years and conversations with other data scientists in a similar situation.
This document provides lessons learned and best practices for document production, administration, and review in electronic discovery. It outlines checklists and steps to take before running a production to ensure quality. It also describes how to interpret error logs and potential issues that may occur with native file ingestion, PDF ingestion, and during the review process. Handouts are provided with samples, checklists, and descriptions of common error messages.
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Jim Kaplan CIA CFE
Importing Data - The Complete Course in All File Types and Data Tricks to Get Your Data Ready for Analysis
This course will teach you to import, combine, and define various types of data into IDEA SoftwareTM and understand the difference between the tables and implications for the import process.
The specific learning topics are:
Importing a number of different data types and formats
Access the Import Assistant Select the File to Import
File Type
Specify Record Length
Specify Field Delineators
Field Details
Create Fields
Import Criteria
Appending a Virtual Field
This document discusses data binding in XPages, which allows the user interface to be separated from the data by connecting the backend Notes data to the XPage through server-side JavaScript or EL. It provides examples of binding form fields and view data, and steps for binding a custom control to a form, including selecting the data source and fields. Resources for further information on XPages and data binding are also listed.
This document provides information about file handling in C++. It discusses key concepts like input/output streams, opening and closing files, and different file types. Specifically, it covers:
- The different stream classes like fstream, ifstream, and ofstream that are used for file input/output.
- Opening and closing files using functions like open() and close(), and specifying open modes like ios::out.
- The two main types of files - text files that use character translations and binary files that store raw bytes.
- Basic file operations in C++ like reading, writing, and manipulating files using functions like read(), write(), seekp() etc.
- Examples of opening
The document discusses input and output streams in programming, specifically:
1. Streams provide an abstract representation of input/output sources and hide underlying details from programs. Programs treat streams as data sources/destinations.
2. Standard streams include cin for input and cout for output, which are automatically included. File streams require opening/closing and come in input, output, and combined varieties.
3. Files provide permanent storage of related data and are treated as input/output streams by programs via file stream objects. Text files store human-readable data with special characters like newlines.
The document describes an automated file loading process for forecast, budget, and earned hours data in WorkBrain. Files with specific names saved in a network directory will be picked up every 5 minutes between 3pm-9:45pm and loaded into WorkBrain. An email will be sent when file processing begins and ends. Steps are provided for formatting excel data into the required csv/txt files with the correct formatting to be placed in the network directory folder for loading.
"We're all in this together" - educating users on the importance of cyber sec...Jisc
The document discusses educating university users on the importance of cyber security. It describes how the university initially struggled with frequent ransomware attacks until implementing mandatory cyber security training for staff and establishing an information security group. Regular security updates were sent to staff to raise awareness in a non-technical way. This helped reduce incidents and improved staff understanding of secure practices like not using personal passwords for work accounts. Educating users was found to be important for improving the overall security of the university's IT networks and data.
The document discusses the benefits of data driven web design over static HTML pages. It explains that a data driven approach involves storing information in databases and using programming languages like PHP to dynamically generate pages based on the database content. This allows websites to have customized, up-to-date content and interactive features like discussion boards that can be easily managed and updated.
The document describes 10 case studies of Axsys Technologies Limited providing document management and digitization services to various clients:
1) ABS reduced document retrieval time from 3 days to 30 seconds by digitizing over 16 million engineering drawings and hosting them online.
2) SPi Global outsourced conversion of over 200,000 pages of technical journals into XML and TIFF files for e-book publishing.
3) ESIC had Axsys digitize insured persons' records to produce 1.5 million permanent identity cards.
4) Foster Wheeler shipped over 1,000 boxes of documents and drawings to Axsys for digitization in a continuing project.
The document discusses using files for input/output in C++ programs. It outlines the 5-step process: 1) include fstream header, 2) declare file stream variables, 3) associate variables with files, 4) use stream variables for input/output, 5) close files. It provides examples of opening files for input/output, reading/writing data, seeking to different positions in a file, and challenges the reader to process Dr. King's speech stored in a file.
77% of companies that use a SaaS application lose data over a 12-month period. If you were to lose your Salesforce data tomorrow, how would you respond and recover it? Utilizing the Salesforce Weekly Export can be cumbersome, tedious, and a manual process. In this presentation given at the Salesforce World Tour London on 17 May 2018, Taylor Patterson, Spanning's technical marketing manager, discussed the primary reasons for data loss in Salesforce, the native data protection offerings provided by Salesforce. Check out his deck to learn how to implement the best strategies for protecting your organization against future data disasters. https://spanning.com/products/salesforce-backup/
This document discusses file management functions in C++. It introduces file streams/file handling using the <fstream> header file. The header file supports ofstream for writing, ifstream for reading, and fstream for both. Common file operations include creating/opening a file using open(), reading data with read(), writing with write(), and closing a file with close(). The document provides examples of opening files for writing, reading, appending, and truncating and using extraction and insertion operators to read from and write to files.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
What we’ll Learn:
How you design a program
Declaring and using variables and constants
Assigning values to variables
Named constants
The need for good planning and design
1. The document provides answers to various tasks and concepts related to system analysis and design. It includes context diagrams, data flow diagrams, decision trees, input/output forms, and reflective thinking.
2. Answers include a context diagram showing data sources and outputs, a decision tree table for 8 conditions and 4 actions, and IPO charts for input/output forms like applications for average calculation and donor applications.
3. The reflective thinking answer discusses learning system analysis and design concepts over two semesters and how they will be useful for both career and everyday life.
Risk Analytics Using Knowledge Graphs / FIBO with Deep LearningCambridge Semantics
This EDM Council webinar, sponsored by Cambridge Semantics Inc. and featuring FI Consulting, explores the challenges common to a risk analytics pipeline, application of graph analytics to mortgage loan data and use cases in adjacent areas including customer service, collections, fraud and AML.
Modern data ecosystems require new paradigms to address diverse data sources and user needs. Traditional assumptions about data originating from internal systems and a single data warehouse no longer apply. A new model called "Data Regions" establishes multiple environments for different data usage scenarios, including source onboarding, exploration, reporting, analytics and more. By supporting varied access, structures, domains and integrity across regions, Data Regions can address today's complex data challenges and modernize companies' data ecosystems.
Why we need open data and how should we provide it. FMI provides the same data in its own open data portal but also in AWS public dataset program. Different use cases require different services and channels. Presentation kept in AWS pop-up loft in Stockholm 2018.
This document provides an overview of a lecture on big data analytics given by Dr. Ching-Yung Lin. The key points covered in the lecture include:
- Definitions and characteristics of big data based on the 3V's of volume, velocity and variety.
- Techniques used for big data such as massive parallelism, distributed storage and processing, machine learning and data visualization.
- Factors that have enabled big data to become prominent in recent years like greater data collection, open source software and commodity hardware.
- Examples of big data platforms, databases and analytics techniques including Hadoop, Spark, NoSQL databases and graph databases.
- The large and growing market for big data
Cruise, Eat, Sleep, Repeat Best Practices on Setup and Customizing Your Case ...Ipro Tech
The document discusses best practices for customizing case templates in Eclipse. It provides examples of customizing processing templates to set expectations for document handling, and review templates to save time when creating future cases. The hands-on sections demonstrate how to modify settings for a new employment case, create additional processing cases for different file types, and edit review settings like tags, coding forms and saved searches.
Many companies face the challenge of building up a data science team from scratch and it can be hard to figure out how to start. In 2016, I was the first hire of a new data science team, with little infrastructure or strategy in place. Over the years, there were many different challenges for us to solve and mistakes to learn from as the team got more and more mature. This talk is about what I learned about the process of building up a data science team, from both my own experience in the past years and conversations with other data scientists in a similar situation.
This document provides lessons learned and best practices for document production, administration, and review in electronic discovery. It outlines checklists and steps to take before running a production to ensure quality. It also describes how to interpret error logs and potential issues that may occur with native file ingestion, PDF ingestion, and during the review process. Handouts are provided with samples, checklists, and descriptions of common error messages.
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Jim Kaplan CIA CFE
Importing Data - The Complete Course in All File Types and Data Tricks to Get Your Data Ready for Analysis
This course will teach you to import, combine, and define various types of data into IDEA SoftwareTM and understand the difference between the tables and implications for the import process.
The specific learning topics are:
Importing a number of different data types and formats
Access the Import Assistant Select the File to Import
File Type
Specify Record Length
Specify Field Delineators
Field Details
Create Fields
Import Criteria
Appending a Virtual Field
This document discusses data binding in XPages, which allows the user interface to be separated from the data by connecting the backend Notes data to the XPage through server-side JavaScript or EL. It provides examples of binding form fields and view data, and steps for binding a custom control to a form, including selecting the data source and fields. Resources for further information on XPages and data binding are also listed.
This document provides information about file handling in C++. It discusses key concepts like input/output streams, opening and closing files, and different file types. Specifically, it covers:
- The different stream classes like fstream, ifstream, and ofstream that are used for file input/output.
- Opening and closing files using functions like open() and close(), and specifying open modes like ios::out.
- The two main types of files - text files that use character translations and binary files that store raw bytes.
- Basic file operations in C++ like reading, writing, and manipulating files using functions like read(), write(), seekp() etc.
- Examples of opening
The document discusses input and output streams in programming, specifically:
1. Streams provide an abstract representation of input/output sources and hide underlying details from programs. Programs treat streams as data sources/destinations.
2. Standard streams include cin for input and cout for output, which are automatically included. File streams require opening/closing and come in input, output, and combined varieties.
3. Files provide permanent storage of related data and are treated as input/output streams by programs via file stream objects. Text files store human-readable data with special characters like newlines.
The document describes an automated file loading process for forecast, budget, and earned hours data in WorkBrain. Files with specific names saved in a network directory will be picked up every 5 minutes between 3pm-9:45pm and loaded into WorkBrain. An email will be sent when file processing begins and ends. Steps are provided for formatting excel data into the required csv/txt files with the correct formatting to be placed in the network directory folder for loading.
"We're all in this together" - educating users on the importance of cyber sec...Jisc
The document discusses educating university users on the importance of cyber security. It describes how the university initially struggled with frequent ransomware attacks until implementing mandatory cyber security training for staff and establishing an information security group. Regular security updates were sent to staff to raise awareness in a non-technical way. This helped reduce incidents and improved staff understanding of secure practices like not using personal passwords for work accounts. Educating users was found to be important for improving the overall security of the university's IT networks and data.
The document discusses the benefits of data driven web design over static HTML pages. It explains that a data driven approach involves storing information in databases and using programming languages like PHP to dynamically generate pages based on the database content. This allows websites to have customized, up-to-date content and interactive features like discussion boards that can be easily managed and updated.
The document describes 10 case studies of Axsys Technologies Limited providing document management and digitization services to various clients:
1) ABS reduced document retrieval time from 3 days to 30 seconds by digitizing over 16 million engineering drawings and hosting them online.
2) SPi Global outsourced conversion of over 200,000 pages of technical journals into XML and TIFF files for e-book publishing.
3) ESIC had Axsys digitize insured persons' records to produce 1.5 million permanent identity cards.
4) Foster Wheeler shipped over 1,000 boxes of documents and drawings to Axsys for digitization in a continuing project.
The document discusses using files for input/output in C++ programs. It outlines the 5-step process: 1) include fstream header, 2) declare file stream variables, 3) associate variables with files, 4) use stream variables for input/output, 5) close files. It provides examples of opening files for input/output, reading/writing data, seeking to different positions in a file, and challenges the reader to process Dr. King's speech stored in a file.
77% of companies that use a SaaS application lose data over a 12-month period. If you were to lose your Salesforce data tomorrow, how would you respond and recover it? Utilizing the Salesforce Weekly Export can be cumbersome, tedious, and a manual process. In this presentation given at the Salesforce World Tour London on 17 May 2018, Taylor Patterson, Spanning's technical marketing manager, discussed the primary reasons for data loss in Salesforce, the native data protection offerings provided by Salesforce. Check out his deck to learn how to implement the best strategies for protecting your organization against future data disasters. https://spanning.com/products/salesforce-backup/
This document discusses file management functions in C++. It introduces file streams/file handling using the <fstream> header file. The header file supports ofstream for writing, ifstream for reading, and fstream for both. Common file operations include creating/opening a file using open(), reading data with read(), writing with write(), and closing a file with close(). The document provides examples of opening files for writing, reading, appending, and truncating and using extraction and insertion operators to read from and write to files.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
2. What we’ll learn
• Introduction to file input and output
• Using loops to process files
• Using files and arrays
• Processing records
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
2
3. File Input And Output
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
3
4. Three Steps using a File
• Open the file
• Opening a file – create a connection between the file and the program
• Opening an output file – creates the file on the disk and allows the program to
write data to it
• Opening an input file – allows the program to read data from the file
• Process the file – either written to the file (if it is an output file) or
read from the file (if it is an input file)
• Close the file – when the program is finished using the file, the file
must be closed
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
4
5. Two Types of files
• Text – contains data that has been encoded as text, using a scheme
such as ASCII or Unicode
• Binary - contains data that has not been converted to text
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
5
8. Two Ways of Accessing a File
• Sequential access
• You access data from the beginning of the file to the end of the file
• Example: cassette tape players. If you want to listen to the last song on a
cassette tape, you have to either fast-forward over all of the songs that come
before it or listen to them
• There is no way to jump directly to a specific song
• Direct access / random access file
• You can jump directly to any piece of data in the file without reading the data
that comes before it
• Example: MP3 player. You can jump directly to any song that you want to
listen to
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
8
11. Five Operations
• Declaring a file
• Opening a file
• Reading a file
• Writing a file
• Closing a file
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
11
12. Concept File – Declaring
• Most languages support several types of fi les, but the broadest types
are fi les that can be used for input and fi les that can be used for
output.
• Each type of file has a data type defined in the language you are using.
• You declare files in the same way you declare variables and
constants—by giving each file a data type and an identifier.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
12
13. Declaration File – Declaring
fileMode fileName
fileMode fileName
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
13
14. Example File – Declaring
inputFile employeeData
outputFile updateData
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
14
15. File – Opening
• In most programming languages, before an application can
use a data file, it must open the file.
• Opening a file locates it on a storage device and associates a
variable name within your program with the file.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
15
16. Declaration File – Opening
Open filename “File Location”
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
16
17. Example File – Opening
Open employeeData “EmployeeData.dat”
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
17
18. File – Reading
• Before you can use stored data within a program, you must load the
data into computer memory.
• You never use the data values that are stored on a storage device
directly.
• Instead, you use a copy that is transferred into memory. When you
copy data from a file on a storage device into RAM, you read from
the file.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
18
19. Declaration of File – Reading
Read variable from fileData
Read variable from fileData
Read variable from fileData
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
19
20. Example File – Reading
Read name from employeeData
Read address from employeeData
Read payRate from employeeData
OR
Read name, address, payRate from employeeData
Read EmployeeRecord from employeeData
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
20
21. File – Writing
• When you store data in a computer fi le on a persistent
storage device, you write to the file.
• This means you copy data from RAM to the file.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
21
22. Declaration of File – Writing
Write variable to filename
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
22
23. Example File – Writing
write name, address, payRate to updatedData
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
23
24. File – Close
• When you finish using a fi le, the program should close the file - that
is, the file is no longer available to your application.
• Failing to close an input file (a file from which you are reading data)
usually does not present serious consequences; the data still exists in
the file.
• However, if you fail to close an output file (a file to which you are
writing data), the data might become inaccessible
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
24
25. Declaration of File – Close
Close filename
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
25
26. Example File – Close
Close inventoryFile
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
26
27. Example Use Case File Open, Write, Close
• A program that opens two fi les, reads employee data from
the input fi le, alters the employee’s pay rate, writes the
updated record to an output fi le, and closes the fi les.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
27
28. Pseudocode
Start
Declarations
InputFile employeeData
OutputFile updatedData
string name
string address
num payRate
num RAISE = 2.00
housekeeping()
while not eof
detailLoop()
Endwhile
finish()
End
housekeeping()
open employeeData "EmployeeData.dat"
open updatedData "UpdatedData.dat"
input name, address, payRate from employeeData
Return
detailLoop()
payRate = payRate + RAISE
output name, address, payRate to updatedData
input name, address, payRate from employeeData
Return
finish()
close employeeData
close updatedData
Return18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
28
29. Flowchart
Start
Declare
InputFile employeeData
OutputFilie updatedData
String name, address
Num payRate
Num RAISE = 2.00
housekeeping()
Not eof? detailLoop()
finish()
End
finish()
Close
employeeData
Close updatedData
Return
housekeeping()
Open employeeData
“EmployeeData.dat”
Open updatedData
“UpdatedData.dat”
Input name, address,
payRate from
employeeData
Return
detailLoop()
payRate = payRate + RAISE
Output name, address,
payRate to
updatedData
Input name, address,
payRate from
employeeData
Return
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
29
31. Concept Using Loop to Process Files
• Files usually hold large amounts of data, and programs
typically use a loop to process the data in a file
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
31
32. Example Using Loop to Process Files
// Variable to hold the number of days
Declare Integer numDays
// Counter variable for the loop
Declare Integer counter
// Variable to hold an amount of sales
Declare Real sales
// Declare an output file.
Declare OutputFile salesFile
// Get the number of days.
Display "For how many days do you have
sales?"
Input numDays
// Open a file named sales.dat.
Open salesFile "sales.dat"
// Get the amount of sales for each day and
write it to the file.
For counter = 1 To numDays
// Get the sales for a day.
Display "Enter the sales for day #",
counter
Input sales
// Write the amount to the file.
Write salesFile sales
End For
// Close the file.
Close salesFile
Display "Data written to sales.dat."
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
32
33. Flowchart Start
Declare
Integer numDays,
counter
Real sales
outputFile salesFile
Display “For how
many days do you
have sales?”
Input numDays
Open salesFile “sales.dat”
A
A
Set counter = 1
Counter <=
numDays
Close salesFile
Display “Data
written to sales.dat”
End
Display “Enter the
sales for day #”,
counter
Input sales
Write slesFile sales
Set counter = counter + 1
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
33
34. Reading A File With A Loop And Detecting
The End of the File (EoF)
• Program needs some way of knowing when the end of the file has
been reached so it will not try to read beyond it
• Most programming languages provide a library function for this
purpose
• Eof function
• Accepts a file’s internal name as an argument, and returns True if the end of
the file has been reached or False if the end of the file has not been reached
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
34
36. Example EoF
// Declare an input file.
Declare InputFile salesFile
// Declare a variable to hold a sales amount
// that is read from the file.
Declare Real sales
// Open the sales.dat file.
Open salesFile "sales.dat"
Display "Here are the sales amounts:"
// Read all of the items in the file
// and display them.
While NOT eof(salesFile)
Read salesFile sales
Display currencyFormat(sales)
End While
// Close the file.
Close salesFile
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
36
37. Flowchart Start
Declare
InputFile salesFile
Real sales
Open salesFile “sales.dat”
Not
eof(salesFile)
Close salesFile
End
Read slesFile sles
Display
currencyFormat(sales)
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
37
39. Concept Files + Arrays
• For some algorithms, files and arrays can be used together effectively.
• You can easily write a loop that saves the contents of an array to a file,
and vice versa.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
39
40. Example Files + Arrays: Open Writes Close
Constant Integer SIZE = 5
Declare Integer numbers[SIZE] = 10, 20, 30, 40, 50
// Counter variable to use in the loop.
Declare Integer index
// Declare an output file.
Declare OutputFile numberFile
// Open the values.dat file.
Open numberFile "values.dat“
// Write each array element to the file.
For index = 0 To SIZE - 1
Write numberFile numbers[index]
End For
// Close the file.
Close numberFile
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
40
41. Example Files + Arrays: Open Read Close
Constant Integer SIZE = 5
Declare Integer numbers[SIZE]
// Counter variable to use in the loop, initialized
// with 0.
Declare Integer index = 0
// Declare an input file.
Declare InputFile numberFile
// Open the values.dat file.
Open numberFile "values.dat“
// Read the contents of the file into the array.
While (index <= SIZE – 1) AND (NOT eof(numberFile))
Write numberFile numbers[index]
Set index = index + 1
End While
// Close the file.
Close numberFile
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
41
42. Processing and Managing Record
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
42
43. Concepts Processing & Managing Records
• The data that is stored in a file is frequently organized in records
• A record is a complete set of data about an item
• A field is an individual piece of data within a record
• Example, we want to store data about employees in a file
• The file will contain a record for each employee
• Each record will be a collection of fields, such as name, ID number, and
department
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
43
44. Type of Processing and Managing Record
• Adding records
• Displaying records
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
44
45. Example Use Case Records Adding and
Displaying
• Midnight Coffee Roasters, Inc. is a small company that imports raw
coffee beans from around the world and roasts them to create a variety
of gourmet coffees.
• Julie, the owner of the company, has asked you to design a series of
programs that she can use to manage her inventory. After speaking
with her, you have determined that a file is needed to keep inventory
records.
• Each record should have two fields to hold the following data:
• Description: a string containing the name of the coffee
• Quantity in inventory: the number of pounds in inventory, as a real number
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
45
46. Pseudocode
// Variables for the fields
Declare String description
Declare Real quantity
// A variable to control the loop.
Declare String another = "Y"
// Declare an output file in append mode.
Declare OutputFile AppendMode coffeeFile
// Open the file.
Open coffeeFile "coffee.dat"
While toUpper(another) == "Y"
// Get the description.
Display "Enter the description."
Input description
// Get the quantity on hand.
Display "Enter the quantity on hand ", "(in pounds)."
Input quantity
// Append the record to the file.
Write coffeeFile description, quantity
// Determine whether the user wants to enter another
record.
Display "Do you want to enter another record? ",
Display "(Enter Y for yes, or anything else for no.)"
Input another
// Display a blank line.
Display
End While
// Close the file.
Close coffeeFile
Display "Data appended to coffee.dat."
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
46
47. // Variables for the fields
Declare String description
Declare Real quantity
// Declare an input file.
Declare InputFile coffeeFile
// Open the file.
Open coffeeFile "coffee.dat"
While NOT eof(coffeeFile)
// Read a record from the file.
Read coffeeFile description, quantity
// Display the record.
Display "Description: ", description, "Quantity: ", quantity, "
pounds"
End While
// Close the file.
Close coffeeFile
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
47
49. Example Use Case Searching for a Record
• Julie has been using the first two programs that you designed for her.
• She now has several records stored in the coffee.dat file, and has asked you to
design another program that she can use to search for records.
• She wants to be able to enter a string and see a list of all the records containing
that string in the description field.
• For example, suppose the file contains the following records:
• If she enters “Sumatra” as the value to search for, the program should display all
of these records.
Description Quantity
Sumatra Dark Roast 12
Sumatra Medium Roast 30
Sumatra Decaf 20
Sumatra Organic Medium Roast 15
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
49
50. Pseuducode
// Variables for the fields
Declare String description
Declare Real quantity
// A variable to hold the search value.
Declare String searchValue
// A Flag to indicate whether the value was found.
Declare Boolean found = False
// Declare an input file.
Declare InputFile coffeeFile
// Get the value to search for.
Display "Enter a value to search for."
Input searchValue
// Open the file.
Open coffeeFile "coffee.dat"
While NOT eof(coffeeFile)
// Read a record from the file.
Read coffeeFile description, quantity
// If the record contains the search value, then display it.
If contains(description, searchValue) Then
// Display the record.
Display "Description: ", description, "Quantity: ",
quantity, " pounds"
// Set the found flag to true.
Set found = True
End If
End While
// If the value was not found in the file,
// display a message indicating so.
If NOT found Then
Display searchValue, " was not found."
End If
// Close the file.
Close coffeeFile
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
50
52. Example Use Case Modifying for a Record
• Julie is very happy with the programs that you have designed so far. Your
next job is to design a program that she can use to modify the quantity field
in an existing record.
• This will allow her to keep the records up to date as coffee is sold or more
coffee is added to inventory.
• To modify a record in a sequential file, you must create a second temporary
file. You copy all of the original file’s records to the temporary file, but
when you get to the record that is to be modified, you do not write its old
contents to the temporary file. Instead, you write its new modified values to
the temporary file. Then, you finish copying any remaining records from the
original file to the temporary file.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
52
53. • The temporary file then takes the place of the original file. You delete
the original file and rename the temporary file, giving it the name that
the original file had on the computer’s disk. Here is the general
algorithm for your program:
1. Open the original file for input and create a temporary file for output.
2. Get the description field of the record to be modified and the new value for
the quantity field.
3. While not at the end of the original file:
Read a record.
If this record’s description field matches the description entered, then:
Write the new data to the temporary file.
Else write the existing record to the temporary file.
4. Close the original file and the temporary file.
5. Delete the original file.
6. Rename the temporary file, giving it the name of the original file.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
53
54. • Notice that at the end of the algorithm you delete the original file and then
rename the temporary file. Most programming languages provide a way to
perform these operations. In pseudocode we will use the Delete statement to
delete a file on the disk. You simply provide a string containing the name of
the file that you wish to delete, such as:
Delete "coffee.dat“
• To change the name of a file, we will use the Rename statement. For
example,
Rename "temp.dat", "coffee.dat“
• indicates that we are changing the name of the file temp.dat to coffee.dat.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
54
55. Pseudocode
// Variables for the fields
Declare String description
Declare Real quantity
// A variable to hold the search value.
Declare String searchValue
// A variable to hold the new quantity.
Declare Real newQuantity
// A Flag to indicate whether the value was found.
Declare Boolean found = False
// Declare an input file.
Declare InputFile coffeeFile
// Declare an output file to copy the original file to.
Declare OutputFile tempFile
// Open the original file.
Open coffeeFile "coffee.dat"
// Open the temporary file.
Open tempFile "temp.dat"
// Get the value to search for.
Display "Enter the coffee you wish to update."
Input searchValue
// Get the new quantity.
Display "Enter the new quantity."
Input newQuantity
While NOT eof(coffeeFile)
// Read a record from the file.
Read coffeeFile description, quantity
// Write either this record to the temporary
// file, or the new record if this is the
// one that is to be changed.
If description == searchValue Then
Write tempFile description, newQuantity
Set found = True
Else
Write tempFile description, quantity
End If
End While
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
55
56. // Close the original file.
Close coffeeFile
// Close the temporary file.
Close tempFile
// Delete the original file.
Delete "coffee.dat"
// Rename the temporary file.
Rename "temp.dat", "coffee.dat"
// Indicate whether the operation was successful.
If found Then
Display "The record was updated."
Else
Display searchValue, " was not found in the file."
End If
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
56
58. Example Use Case Deleting a Record
• Your last task is to write a program that Julie can use to delete records
from the coffee.dat file. Like the process of modifying a record, the
process of deleting a record from a sequential access file requires that
you create a second temporary file.
• You copy all of the original file’s records to the temporary file, except
for the record that is to be deleted. The temporary file then takes the
place of the original file.
• You delete the original file and rename the temporary file, giving it the
name that the original file had on the computer’s disk.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
58
59. • Here is the general algorithm for your program:
1. Open the original file for input and create a temporary file for output.
2. Get the description field of the record to be deleted.
3. While not at the end of the original file:
Read a record.
If this record’s description field does not match the description entered, then:
Write the record to the temporary file.
4. Close the original file and the temporary file.
5. Delete the original file.
6. Rename the temporary file, giving it the name of the original file.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
59
60. Pseuducodeo
// Variables for the fields
Declare String description
Declare Real quantity
// A variable to hold the search value.
Declare String searchValue
// Declare an input file.
Declare InputFile coffeeFile
// Declare an output file to copy the original file to.
Declare OutputFile tempFile
// Open the files.
Open coffeeFile "coffee.dat"
Open tempFile "temp.dat"
// Get the value to search for.
Display "Enter the coffee you wish to delete."
Input searchValue
While NOT eof(coffeeFile)
// Read a record from the file.
Read coffeeFile description, quantity
// If this is not the record to delete, then
// write it to the temporary file.
If description != searchValue Then
Write tempFile description, quantity
End If
End While
// Close the two files.
Close coffeeFile
Close tempFile
// Delete the original file.
Delete "coffee.dat"
// Rename the temporary file.
Rename "temp.dat", "coffee.dat"
Display "The file has been updated."
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
60
62. Summary
• A computer fi le is a collection of data stored on a non-volatile device
in a computer system. Although the contents of files differ, each file
occupies space on a section of a storage device, and each has a name
and a specific time of creation or last modification.
• When you use a data fi le in a program, you must declare it and open
it; opening a fi le associates an internal program identifier with the
name of a physical fi le on a storage device. When you read from a fi
le, the data is copied into memory. When you write to a fi le, the data
is copied from memory to a storage device. When you are done with a
fi le, you close it.
18/9/2018
CSWD1001 @ Kwan Lee First City Unversity Malaysia
(FCUC)
62