SlideShare a Scribd company logo
1 of 18
Introduction to Computers Module 1. ECE –B
Contents Definition of data. Information and Processing. Basic Computer Operations. Applications of information systems. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 2
Definition of Data Usually the term 'data' suggests something raw and unrefined. Its the most fundamental form of information. Information in raw or unorganized form (such as alphabets, numbers, or symbols) that refer to, or represent, conditions, ideas, or objects.  Data is limitless and present everywhere in the universe. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 3
Information Data that   has been verified to be accurate and timely,   is specific and organized for a purpose,    is presented within a context that gives it meaning and relevance, and    that can lead to an increase in understanding and decrease in uncertainty. 	The value of information lies solely in its ability to affect a behavior, decision, or outcome. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 4
Processing Process or processing typically describes the action of taking something through an established and usually routine set of procedures  It can be the steps to convert the action from one form to another, such as processing paperwork to grant a mortgage loan, processing milk into cheese, or converting computer data from one form to another.  A process involves steps and decisions in the way work is accomplished 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 5
Processing in technically refers to any process that a computer program does to enter data and summarise, analyse or otherwise convert data into usable information.  The process may be automated and run on a computer. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 6
Applications of Information systems Information Systems  is an academic/professional discipline bridging the business field and the well-defined computer science field that is evolving toward a new scientific area of study.  Some of its applications include: Geographic information system Hospital information system Airline information system Hotel information system 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 7
Introduction to structured programming Flow Chart Pseudo code 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 8
What is a Flow Chart? A flow chart is a graphical or symbolic representation of a process.  Each step in the process is represented by a different symbol and contains a short description of the process step.  The flow chart symbols are linked together with arrows showing the process flow direction.  01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 9
A really simplistic flow chart showing the flow chart symbols described above can be seen above. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 10
A Note on Flowchart Symbols Different flow chart symbols have different meanings. The most common flow chart symbols are: Terminator: An oval flow chart shape indicating the start or end of the process. Process: A rectangular flow chart shape indicating a normal process flow step. Decision: A diamond flow chart shape indication a branch in the process flow. Connector: A small, labeled, circular flow chart shape used to indicate a jump in the process flow. Data: A parallelogram that indicates data input or output (I/O) for a process. Document: used to indicate a document or report. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 11
01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 12
Pseudocode An outline of a program, written in a form that can easily be converted into real programming statements. Pseudocode cannot be compiled nor executed, and there are no real formatting or syntax rules 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 13
Why use pseudocode? Once pseudocode is created, it is simple to translate it into real programming code. Opportunity to detect any logic error prior to actual coding, which is a lot more expensive and time consuming. Used for planning the programming.  01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 14
Example Read student name. Get system date . Read student ID number. Get order for the books. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 15
Mathematical symbols in Pseudocode: 	The following symbols can be used in pseudocode:  + for Add,  - for Subtract,  * for Multiply,  / for Divide,  ( ) for Parentheses  Compute C = (F - 32) * 5 / 9  01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 16
Common Action Keywords 	Several keywords are often used to indicate common input, output, and processing operations. 	Input: READ, OBTAIN, GET Output: PRINT, DISPLAY, SHOW Compute: COMPUTE, CALCULATE, DETERMINE Initialize: SET, INIT Add one: INCREMENT, BUMP 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 17
Revision

More Related Content

Similar to Data, Information System, Processing

Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computersnirupam16
 
It 302 computerized accounting (week 2) - sharifah
It 302   computerized accounting (week 2) - sharifahIt 302   computerized accounting (week 2) - sharifah
It 302 computerized accounting (week 2) - sharifahalish sha
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business IntelligenceSukirti Garg
 
Module 3 SLP will introduce the basic concepts of computer network.docx
Module 3 SLP will introduce the basic concepts of computer network.docxModule 3 SLP will introduce the basic concepts of computer network.docx
Module 3 SLP will introduce the basic concepts of computer network.docxraju957290
 
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...Bryan Guibijar
 
Accountants can use data flow diagrams (DFDs) to depict the physical.docx
Accountants can use data flow diagrams (DFDs) to depict the physical.docxAccountants can use data flow diagrams (DFDs) to depict the physical.docx
Accountants can use data flow diagrams (DFDs) to depict the physical.docxrenatas0nie
 
Data information and information system
Data information and information systemData information and information system
Data information and information systemnripeshkumarnrip
 
System analysis ITM3.pptx
System analysis ITM3.pptx System analysis ITM3.pptx
System analysis ITM3.pptx Aram Mohammed
 
Anomalous symmetry succession for seek out
Anomalous symmetry succession for seek outAnomalous symmetry succession for seek out
Anomalous symmetry succession for seek outiaemedu
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle shefali mishra
 
Sap Interview Questions - Part 1
Sap Interview Questions - Part 1Sap Interview Questions - Part 1
Sap Interview Questions - Part 1ReKruiTIn.com
 
An overview of popular analytics toolkits
An overview of popular analytics toolkitsAn overview of popular analytics toolkits
An overview of popular analytics toolkitsRamkumar Ravichandran
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptxamitparashar42
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptxamitparashar42
 

Similar to Data, Information System, Processing (20)

Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
It 302 computerized accounting (week 2) - sharifah
It 302   computerized accounting (week 2) - sharifahIt 302   computerized accounting (week 2) - sharifah
It 302 computerized accounting (week 2) - sharifah
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Module 3 SLP will introduce the basic concepts of computer network.docx
Module 3 SLP will introduce the basic concepts of computer network.docxModule 3 SLP will introduce the basic concepts of computer network.docx
Module 3 SLP will introduce the basic concepts of computer network.docx
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
 
Accountants can use data flow diagrams (DFDs) to depict the physical.docx
Accountants can use data flow diagrams (DFDs) to depict the physical.docxAccountants can use data flow diagrams (DFDs) to depict the physical.docx
Accountants can use data flow diagrams (DFDs) to depict the physical.docx
 
Data information and information system
Data information and information systemData information and information system
Data information and information system
 
MIS.ppt
MIS.pptMIS.ppt
MIS.ppt
 
System analysis ITM3.pptx
System analysis ITM3.pptx System analysis ITM3.pptx
System analysis ITM3.pptx
 
Anomalous symmetry succession for seek out
Anomalous symmetry succession for seek outAnomalous symmetry succession for seek out
Anomalous symmetry succession for seek out
 
Notacd11
Notacd11Notacd11
Notacd11
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle
 
Sap Interview Questions - Part 1
Sap Interview Questions - Part 1Sap Interview Questions - Part 1
Sap Interview Questions - Part 1
 
Dbms_class _14
Dbms_class _14Dbms_class _14
Dbms_class _14
 
An overview of popular analytics toolkits
An overview of popular analytics toolkitsAn overview of popular analytics toolkits
An overview of popular analytics toolkits
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptx
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptx
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Data, Information System, Processing

  • 1. Introduction to Computers Module 1. ECE –B
  • 2. Contents Definition of data. Information and Processing. Basic Computer Operations. Applications of information systems. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 2
  • 3. Definition of Data Usually the term 'data' suggests something raw and unrefined. Its the most fundamental form of information. Information in raw or unorganized form (such as alphabets, numbers, or symbols) that refer to, or represent, conditions, ideas, or objects. Data is limitless and present everywhere in the universe. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 3
  • 4. Information Data that has been verified to be accurate and timely, is specific and organized for a purpose, is presented within a context that gives it meaning and relevance, and that can lead to an increase in understanding and decrease in uncertainty. The value of information lies solely in its ability to affect a behavior, decision, or outcome. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 4
  • 5. Processing Process or processing typically describes the action of taking something through an established and usually routine set of procedures It can be the steps to convert the action from one form to another, such as processing paperwork to grant a mortgage loan, processing milk into cheese, or converting computer data from one form to another. A process involves steps and decisions in the way work is accomplished 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 5
  • 6. Processing in technically refers to any process that a computer program does to enter data and summarise, analyse or otherwise convert data into usable information. The process may be automated and run on a computer. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 6
  • 7. Applications of Information systems Information Systems is an academic/professional discipline bridging the business field and the well-defined computer science field that is evolving toward a new scientific area of study. Some of its applications include: Geographic information system Hospital information system Airline information system Hotel information system 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 7
  • 8. Introduction to structured programming Flow Chart Pseudo code 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 8
  • 9. What is a Flow Chart? A flow chart is a graphical or symbolic representation of a process. Each step in the process is represented by a different symbol and contains a short description of the process step. The flow chart symbols are linked together with arrows showing the process flow direction. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 9
  • 10. A really simplistic flow chart showing the flow chart symbols described above can be seen above. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 10
  • 11. A Note on Flowchart Symbols Different flow chart symbols have different meanings. The most common flow chart symbols are: Terminator: An oval flow chart shape indicating the start or end of the process. Process: A rectangular flow chart shape indicating a normal process flow step. Decision: A diamond flow chart shape indication a branch in the process flow. Connector: A small, labeled, circular flow chart shape used to indicate a jump in the process flow. Data: A parallelogram that indicates data input or output (I/O) for a process. Document: used to indicate a document or report. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 11
  • 12. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 12
  • 13. Pseudocode An outline of a program, written in a form that can easily be converted into real programming statements. Pseudocode cannot be compiled nor executed, and there are no real formatting or syntax rules 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 13
  • 14. Why use pseudocode? Once pseudocode is created, it is simple to translate it into real programming code. Opportunity to detect any logic error prior to actual coding, which is a lot more expensive and time consuming. Used for planning the programming. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 14
  • 15. Example Read student name. Get system date . Read student ID number. Get order for the books. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 15
  • 16. Mathematical symbols in Pseudocode: The following symbols can be used in pseudocode: + for Add, - for Subtract, * for Multiply, / for Divide, ( ) for Parentheses Compute C = (F - 32) * 5 / 9 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 16
  • 17. Common Action Keywords Several keywords are often used to indicate common input, output, and processing operations. Input: READ, OBTAIN, GET Output: PRINT, DISPLAY, SHOW Compute: COMPUTE, CALCULATE, DETERMINE Initialize: SET, INIT Add one: INCREMENT, BUMP 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 17