Coding involves writing step-by-step instructions for computers to complete tasks. These instructions are written in programming languages that computers can understand. We encounter coding everywhere as it controls devices like computers, phones, washing machines, and more. Coding tells the operating system how to start up a computer and work, and it programs washing machines to follow different cycles by controlling things like water temperature and cycle length.
This document outlines information regarding a course on tender evaluation processes. It discusses the course objectives, which are to understand the tender evaluation process and criteria. It describes the typical evaluation process, which involves 6 stages from issuing the tender to acceptance of bids. It also outlines the criteria used, which differ based on project size. The document provides details on the typical information and documents required for bid submissions and evaluates the bidder. It describes the multi-stage evaluation process used to assess bids for compliance, completeness, financial capacity, and experience.
1. A tender is an invitation from an owner to contractors to bid on a construction project within a specified timeframe and cost. Tenders can be open, sealed, limited, or single and are classified based on bidding requirements and contractor selection.
2. The tender process involves preparing tender documents, publishing a notice inviting bids, submitting and evaluating bids, accepting a tender, and awarding a contract. Key information provided includes project details, completion timeline, earnest money deposits, and bid evaluation criteria.
3. For a contract to be valid, it requires a definite offer from the owner and acceptance from the contractor to complete the specified work, as defined in the contract documents signed by both parties.
Tender Process | A Complete Procurement GuideTender Process
All about Tenders and its Process | Here you will get all the information regarding tenders (Procurement) like what is tender, what is its process, types of tender, how to search tenders, what to do and what not to do in tendering, how to search tenders and more.... you can check our website for more details which is : http://tenderprocess.weebly.com/
Introduction to Computer and Programming - Lecture 01hassaanciit
This document provides an introduction to the Introduction to Computers and Programming (CSC103) course. It outlines the course structure including marks distribution, textbooks, requirements and examinations. It then provides an overview of what a computer is, its basic components, types of software, and different categories of computers including servers, mainframes and supercomputers.
This document provides an overview of air barrier systems in buildings. It discusses how air barriers control air, heat, and moisture movement across building envelopes. It describes causes of infiltration and exfiltration such as wind pressure, stack effect, and mechanical systems. The construction of effective air barriers is explained, including requirements for materials to be impermeable, continuous, and durable. Case studies of the Illinois Passivhaus and Saskatchewan House demonstrate real-world applications of air barrier systems and super insulation. The conclusion reinforces how air barriers can improve building performance and reduce moisture issues.
Coding involves writing step-by-step instructions for computers to complete tasks. These instructions are written in programming languages that computers can understand. We encounter coding everywhere as it controls devices like computers, phones, washing machines, and more. Coding tells the operating system how to start up a computer and work, and it programs washing machines to follow different cycles by controlling things like water temperature and cycle length.
This document outlines information regarding a course on tender evaluation processes. It discusses the course objectives, which are to understand the tender evaluation process and criteria. It describes the typical evaluation process, which involves 6 stages from issuing the tender to acceptance of bids. It also outlines the criteria used, which differ based on project size. The document provides details on the typical information and documents required for bid submissions and evaluates the bidder. It describes the multi-stage evaluation process used to assess bids for compliance, completeness, financial capacity, and experience.
1. A tender is an invitation from an owner to contractors to bid on a construction project within a specified timeframe and cost. Tenders can be open, sealed, limited, or single and are classified based on bidding requirements and contractor selection.
2. The tender process involves preparing tender documents, publishing a notice inviting bids, submitting and evaluating bids, accepting a tender, and awarding a contract. Key information provided includes project details, completion timeline, earnest money deposits, and bid evaluation criteria.
3. For a contract to be valid, it requires a definite offer from the owner and acceptance from the contractor to complete the specified work, as defined in the contract documents signed by both parties.
Tender Process | A Complete Procurement GuideTender Process
All about Tenders and its Process | Here you will get all the information regarding tenders (Procurement) like what is tender, what is its process, types of tender, how to search tenders, what to do and what not to do in tendering, how to search tenders and more.... you can check our website for more details which is : http://tenderprocess.weebly.com/
Introduction to Computer and Programming - Lecture 01hassaanciit
This document provides an introduction to the Introduction to Computers and Programming (CSC103) course. It outlines the course structure including marks distribution, textbooks, requirements and examinations. It then provides an overview of what a computer is, its basic components, types of software, and different categories of computers including servers, mainframes and supercomputers.
This document provides an overview of air barrier systems in buildings. It discusses how air barriers control air, heat, and moisture movement across building envelopes. It describes causes of infiltration and exfiltration such as wind pressure, stack effect, and mechanical systems. The construction of effective air barriers is explained, including requirements for materials to be impermeable, continuous, and durable. Case studies of the Illinois Passivhaus and Saskatchewan House demonstrate real-world applications of air barrier systems and super insulation. The conclusion reinforces how air barriers can improve building performance and reduce moisture issues.
The power point presentation describes about the Procurement- Contract Management in detail. Some important points are covered here that will help you know, why contract management is necessary.
Risk Assessment, Mitigation And Management In Epc Projects With Case Study By...HIMADRI BANERJI
Risk Assessment, Analysis, Mitigation and Management of EPC is therefore, of prime importance today especially with newer risks thrown open by the global economic meltdown related risks, risk related liabilities for performance are allocated to the EPC contractor, with instruments as Liquidated Damages, Extended Guarantees, Latent Defect Liabilities etc.
This document provides an overview of procurement and contract processes. It discusses key procurement concepts like the procurement cycle, methods of procurement for goods, works and services. The principles of public procurement are described as economy, efficiency, fairness and transparency. Contract administration responsibilities of the architect/project engineer are also outlined, such as ensuring construction follows plans and specifications, authorizing personnel, studying documents for errors or omissions, and addressing any delays. Standard bidding and contract documents from organizations like FIDIC, ADB and PPMO are also referenced.
This document discusses contract management. It defines a contract and contract management, and outlines the key elements and lifecycle of effective contract management. These include planning, performance monitoring, relationship management, governance, knowledge management, change management, contingency planning, and ongoing review. Issues at each stage of the contract management lifecycle are also examined, from procurement to closure. The document emphasizes that contract management aims to ensure all parties fully meet obligations to satisfy operational objectives and strategic goals.
The document discusses the history and development of artificial intelligence over the past 70 years. It outlines some of the key milestones in AI research from the early work in the 1950s to modern advances in machine learning using neural networks. While progress has been made, fully general human-level artificial intelligence remains an ongoing challenge being worked on by researchers.
Construction Project Managment Techniquesguestc8140fe
The document provides an overview of project management and different project management techniques. It discusses what a project is and defines project management. It then summarizes different project management methods including critical path method (CPM) and Program Evaluation and Review Technique (PERT). CPM uses fixed time estimates while PERT allows for uncertainty in activity times. The document also outlines the basic steps for using CPM and PERT in project planning and management.
The document discusses tendering processes for construction projects. It defines tendering as sending drawings and bills of quantities to contractors to receive price estimates. The purpose of tendering is to select a main contractor. Different procurement methods are described such as traditional where the client separately selects a designer and contractor, or design-build where one company handles both. Factors like project size and economic climate affect the tendering method choice. Students are tasked to discuss tendering purposes and objectives, and select a method for a given project by considering build type.
The document provides guidelines for entering tender notices into a database. It describes the important fields that should be included such as organization name and address, project details, estimated costs, bid bonds, tender values, deadlines, and notice types. Fields should be accurately completed and formatting checked. International and national tenders should be distinguished. Only tenders with sufficient deadline periods should be entered.
In less than 30 minutes, this Guide to Contract Management clarifies how to manage contracts. Follow practical steps to control contract risk and improve financial performance. The Guide provides specific recommendations about what contract data to track.
Learn about the 5 principles of contract management. These principles elevate contract management from an administrative burden to a vital risk management function.
The Project Management Process - Week 2Craig Brown
This document discusses various aspects of project and portfolio management. It covers strategic planning, identifying projects, project proposals, selection methods, and factors that contribute to project success. Key points include the importance of aligning projects with organizational strategy, using techniques like cost-benefit analysis and weighted scoring to select projects, and how project management processes have improved over time, leading to higher success rates.
The document provides an overview of contract law in India according to the Indian Contract Act of 1872. It defines key terms like contract, agreement, and promise. A contract is an agreement that is enforceable by law, containing an offer, acceptance, and consideration. The document outlines the essential elements of a valid contract and classifications of contracts based on enforceability, formation, performance, and obligations. It provides examples to illustrate different types of contracts.
The document discusses the tender process for construction projects. It involves project definition, selecting tenderers, issuing tender documentation, criteria for selection, calling for tenders, tender meetings, amendments, submission and closing, tender analysis of work experience, price, company finances and personnel, ongoing projects, and conformity to conditions. Selection criteria include conformity, capability, innovation, price and construction period. Tenders can be rejected for noncompliance, incomplete details, too high or low prices, too much work in progress, insufficient finances, or unsatisfactory records.
A contract is a legally binding agreement between two or more parties that creates obligations that are enforceable in a court of law. There are several essential elements for a valid contract, including agreement between the parties, consideration or an exchange of promises, intention to create a legal relationship, capacity to contract, and absence of factors that could invalidate the contract like duress or illegality. Contracts can be written, oral, or partly written and oral, and they create rights and obligations for the contracting parties that define their relationship.
Types of Contract in Construction ManagementShahin MB
This document describes several types of construction contracts: lump-sum, cost plus fixed fee, cost plus bid fee, guaranteed maximum, negotiated, unit-price, design-build, and turn-key. Lump-sum contracts establish a fixed total price upfront, while cost plus contracts reimburse the contractor's costs plus a fixed or percentage-based fee. Guaranteed maximum contracts set a ceiling on costs. Negotiated, unit-price, design-build, and turn-key contracts vary in responsibilities and payment structures.
Types of contract in Project managementAli Heydari
The document discusses different types of contracts that may be used in project management. It describes fixed price/lump sum contracts where a specific deliverable is agreed to for a set price, carrying more risk for the seller. Cost-reimbursable contracts reimburse the seller for all allowable costs and come in forms like cost plus fee or cost plus fixed fee. Time and materials contracts bill the buyer based on hours worked and materials used by the seller.
You may be chomping at the bit to get started with contract management, but without the proper building blocks in place, implementations can lead to problems like protracted go-lives, poor system adoption, and runaway project costs. This guide will shed light on the most common implementation pitfalls companies face and suggest strategies and tactics to prevent them.
There are several types of construction contracts. Price-based contracts include lump sum contracts, where the contractor is paid a fixed price for the entire project, and unit price contracts, where payment is made based on rates for individual work units. Cost-based contracts include cost plus contracts, where the contractor is reimbursed for costs plus a fee or percentage, and guaranteed maximum price contracts, where the owner's liability is capped but the contractor can retain savings if the project costs less than estimated. The appropriate contract type depends on factors like project scope definition and risk allocation between owner and contractor.
The document discusses the phases of algorithm analysis and design. It begins by defining an algorithm as a finite set of instructions to carry out a sequence of operations. It then outlines the four main phases: 1) Design - identifying the problem and designing a solution using flowcharts or pseudocode. 2) Analyze - analyzing the efficiency of the designed algorithm. 3) Implement - coding the algorithm. 4) Experiment - testing the algorithm and improving its design. Examples are given of algorithms like directions to a home or adding two numbers. The document ends noting analysis of algorithms studies program performance, resources used, correctness, time/space efficiency, security, and other characteristics.
Here are the steps to solve the problems using IPO table, pseudo code and flowchart:
1. Define the problem and understand requirements
2. Make IPO table:
- Input, Process, Output
3. Write pseudo code using proper indentation and comments
4. Draw flowchart using standard symbols
5. Test and debug the program
This systematic approach helps analyze the problem, design the algorithm and implement it properly. The key is breaking down the problem into smaller understandable steps.
The document discusses an algorithms analysis and design course. The major objectives are to design and analyze modern algorithms, compare their efficiencies, and solve real-world problems. Students will learn to prove algorithm correctness, analyze running times, and apply techniques like dynamic programming and graph algorithms. While algorithms can differ in efficiency, even on faster hardware, the computational model used makes reasonable assumptions for comparing algorithms asymptotically.
The power point presentation describes about the Procurement- Contract Management in detail. Some important points are covered here that will help you know, why contract management is necessary.
Risk Assessment, Mitigation And Management In Epc Projects With Case Study By...HIMADRI BANERJI
Risk Assessment, Analysis, Mitigation and Management of EPC is therefore, of prime importance today especially with newer risks thrown open by the global economic meltdown related risks, risk related liabilities for performance are allocated to the EPC contractor, with instruments as Liquidated Damages, Extended Guarantees, Latent Defect Liabilities etc.
This document provides an overview of procurement and contract processes. It discusses key procurement concepts like the procurement cycle, methods of procurement for goods, works and services. The principles of public procurement are described as economy, efficiency, fairness and transparency. Contract administration responsibilities of the architect/project engineer are also outlined, such as ensuring construction follows plans and specifications, authorizing personnel, studying documents for errors or omissions, and addressing any delays. Standard bidding and contract documents from organizations like FIDIC, ADB and PPMO are also referenced.
This document discusses contract management. It defines a contract and contract management, and outlines the key elements and lifecycle of effective contract management. These include planning, performance monitoring, relationship management, governance, knowledge management, change management, contingency planning, and ongoing review. Issues at each stage of the contract management lifecycle are also examined, from procurement to closure. The document emphasizes that contract management aims to ensure all parties fully meet obligations to satisfy operational objectives and strategic goals.
The document discusses the history and development of artificial intelligence over the past 70 years. It outlines some of the key milestones in AI research from the early work in the 1950s to modern advances in machine learning using neural networks. While progress has been made, fully general human-level artificial intelligence remains an ongoing challenge being worked on by researchers.
Construction Project Managment Techniquesguestc8140fe
The document provides an overview of project management and different project management techniques. It discusses what a project is and defines project management. It then summarizes different project management methods including critical path method (CPM) and Program Evaluation and Review Technique (PERT). CPM uses fixed time estimates while PERT allows for uncertainty in activity times. The document also outlines the basic steps for using CPM and PERT in project planning and management.
The document discusses tendering processes for construction projects. It defines tendering as sending drawings and bills of quantities to contractors to receive price estimates. The purpose of tendering is to select a main contractor. Different procurement methods are described such as traditional where the client separately selects a designer and contractor, or design-build where one company handles both. Factors like project size and economic climate affect the tendering method choice. Students are tasked to discuss tendering purposes and objectives, and select a method for a given project by considering build type.
The document provides guidelines for entering tender notices into a database. It describes the important fields that should be included such as organization name and address, project details, estimated costs, bid bonds, tender values, deadlines, and notice types. Fields should be accurately completed and formatting checked. International and national tenders should be distinguished. Only tenders with sufficient deadline periods should be entered.
In less than 30 minutes, this Guide to Contract Management clarifies how to manage contracts. Follow practical steps to control contract risk and improve financial performance. The Guide provides specific recommendations about what contract data to track.
Learn about the 5 principles of contract management. These principles elevate contract management from an administrative burden to a vital risk management function.
The Project Management Process - Week 2Craig Brown
This document discusses various aspects of project and portfolio management. It covers strategic planning, identifying projects, project proposals, selection methods, and factors that contribute to project success. Key points include the importance of aligning projects with organizational strategy, using techniques like cost-benefit analysis and weighted scoring to select projects, and how project management processes have improved over time, leading to higher success rates.
The document provides an overview of contract law in India according to the Indian Contract Act of 1872. It defines key terms like contract, agreement, and promise. A contract is an agreement that is enforceable by law, containing an offer, acceptance, and consideration. The document outlines the essential elements of a valid contract and classifications of contracts based on enforceability, formation, performance, and obligations. It provides examples to illustrate different types of contracts.
The document discusses the tender process for construction projects. It involves project definition, selecting tenderers, issuing tender documentation, criteria for selection, calling for tenders, tender meetings, amendments, submission and closing, tender analysis of work experience, price, company finances and personnel, ongoing projects, and conformity to conditions. Selection criteria include conformity, capability, innovation, price and construction period. Tenders can be rejected for noncompliance, incomplete details, too high or low prices, too much work in progress, insufficient finances, or unsatisfactory records.
A contract is a legally binding agreement between two or more parties that creates obligations that are enforceable in a court of law. There are several essential elements for a valid contract, including agreement between the parties, consideration or an exchange of promises, intention to create a legal relationship, capacity to contract, and absence of factors that could invalidate the contract like duress or illegality. Contracts can be written, oral, or partly written and oral, and they create rights and obligations for the contracting parties that define their relationship.
Types of Contract in Construction ManagementShahin MB
This document describes several types of construction contracts: lump-sum, cost plus fixed fee, cost plus bid fee, guaranteed maximum, negotiated, unit-price, design-build, and turn-key. Lump-sum contracts establish a fixed total price upfront, while cost plus contracts reimburse the contractor's costs plus a fixed or percentage-based fee. Guaranteed maximum contracts set a ceiling on costs. Negotiated, unit-price, design-build, and turn-key contracts vary in responsibilities and payment structures.
Types of contract in Project managementAli Heydari
The document discusses different types of contracts that may be used in project management. It describes fixed price/lump sum contracts where a specific deliverable is agreed to for a set price, carrying more risk for the seller. Cost-reimbursable contracts reimburse the seller for all allowable costs and come in forms like cost plus fee or cost plus fixed fee. Time and materials contracts bill the buyer based on hours worked and materials used by the seller.
You may be chomping at the bit to get started with contract management, but without the proper building blocks in place, implementations can lead to problems like protracted go-lives, poor system adoption, and runaway project costs. This guide will shed light on the most common implementation pitfalls companies face and suggest strategies and tactics to prevent them.
There are several types of construction contracts. Price-based contracts include lump sum contracts, where the contractor is paid a fixed price for the entire project, and unit price contracts, where payment is made based on rates for individual work units. Cost-based contracts include cost plus contracts, where the contractor is reimbursed for costs plus a fee or percentage, and guaranteed maximum price contracts, where the owner's liability is capped but the contractor can retain savings if the project costs less than estimated. The appropriate contract type depends on factors like project scope definition and risk allocation between owner and contractor.
The document discusses the phases of algorithm analysis and design. It begins by defining an algorithm as a finite set of instructions to carry out a sequence of operations. It then outlines the four main phases: 1) Design - identifying the problem and designing a solution using flowcharts or pseudocode. 2) Analyze - analyzing the efficiency of the designed algorithm. 3) Implement - coding the algorithm. 4) Experiment - testing the algorithm and improving its design. Examples are given of algorithms like directions to a home or adding two numbers. The document ends noting analysis of algorithms studies program performance, resources used, correctness, time/space efficiency, security, and other characteristics.
Here are the steps to solve the problems using IPO table, pseudo code and flowchart:
1. Define the problem and understand requirements
2. Make IPO table:
- Input, Process, Output
3. Write pseudo code using proper indentation and comments
4. Draw flowchart using standard symbols
5. Test and debug the program
This systematic approach helps analyze the problem, design the algorithm and implement it properly. The key is breaking down the problem into smaller understandable steps.
The document discusses an algorithms analysis and design course. The major objectives are to design and analyze modern algorithms, compare their efficiencies, and solve real-world problems. Students will learn to prove algorithm correctness, analyze running times, and apply techniques like dynamic programming and graph algorithms. While algorithms can differ in efficiency, even on faster hardware, the computational model used makes reasonable assumptions for comparing algorithms asymptotically.
This document provides an overview of problem solving using computers. It discusses the 7 stages of problem solving: 1) problem analysis, 2) algorithm development, 3) flowcharting, 4) coding, 5) compilation and execution, 6) debugging and testing, and 7) documentation. It also covers computer programs, programming languages, and the basic structure of a C program, which typically includes documentation, include libraries, definitions, global declarations, the main function, and subprograms.
This document defines key concepts in object oriented programming including programs, algorithms, pseudo code, and flowcharts. A program is a set of instructions that tells a computer what to do, and is written by a programmer. An algorithm is a step-by-step procedure to solve a problem. Algorithms are written in pseudo code, a language similar to simple English, before being coded. A flowchart uses standard symbols to visually represent an algorithm's logic and steps.
The document summarizes the topics covered in an introduction to programming and problem solving lecture, including: 1) the six basic computer operations, 2) what programming is and the steps of program development, 3) structured programming and the three main control structures (sequence, selection, repetition), 4) data and data structures, and 5) two examples (calculating the area and circumference of a circle and solving a payroll problem) to illustrate the concepts.
The document provides an introduction to the C programming language and algorithms. It begins with an overview of C and its history. It then defines key concepts like keywords, data types, qualifiers, loops, storage classes, decision statements, and jumps. Examples of algorithms are provided for common problems like adding two numbers. Pattern printing algorithms are given as homework exercises. The document discusses where C is used and explains what a programming language and algorithms are. It emphasizes the importance of understanding requirements before implementation.
Computational thinking involves breaking down complex problems into smaller, more manageable parts through decomposition. It utilizes concepts like pattern recognition, abstraction, algorithms, and evaluation. The key aspects of computational thinking are decomposing problems, recognizing patterns within data, abstracting away unnecessary details, designing algorithms to describe solutions, and evaluating whether the solution meets the problem's requirements.
Algorithm and C code related to data structureSelf-Employed
Everything lies inside an algorithm in the world of coding and algorithm formation which is the basis of data structure and manipulation of the algorithm in computer science and information technology which is ultimately used to find a particular problems solution
Computer programs contain instructions that tell computers what to do. Programs are written using programming languages as computers only understand machine code. There are different types of programming languages including machine language, assembly language, and high-level languages. High-level languages are easier for humans to read but must be compiled into machine code for computers to execute. Programming involves defining a problem, describing inputs and outputs, developing an algorithmic solution, and testing the program.
This document provides an introduction to algorithms and programming. It defines an algorithm as a finite set of steps to solve a problem and lists key characteristics like input, output, definiteness, and finiteness. It discusses common algorithm design tools like flowcharts and pseudocode. The document then explains the process of designing a program, including analyzing the problem, designing a solution, coding, testing, and evaluating. It also discusses some tips for programming like planning, writing out logic on paper, using indentation and comments.
1. An algorithm is a step-by-step procedure to solve a problem using a finite number of well-defined instructions and inputs. An algorithm must be unambiguous, have a finite number of steps, and be feasible with available resources.
2. Pseudo code is used to represent algorithms without using a specific programming language syntax. It uses common programming constructs like loops and conditionals. Pseudo code improves readability and acts as a bridge between algorithms and programs.
3. The time and space complexity of an algorithm measures how resources grow as the input size increases. Time complexity is evaluated based on the number of steps, while space complexity depends on memory usage. Common complexities include constant, linear, quadratic, and
The document discusses strategies for code tuning to improve performance. It covers identifying areas of inefficiency through profiling, focusing on "hot spots" that consume the most runtime. Common sources of inefficiency include input/output, paging, system calls and interpreted languages. The document recommends an iterative process of measurement, optimization of hot spots, and remeasurement to evaluate improvements. It also cautions that code tuning should only be done after establishing correctness, quality and design to avoid detracting from the primary goals of development.
The document provides an overview of problem solving and C programming at a basic knowledge level. It covers various topics including introduction to problem solving, programming languages, introduction to C programming, selection structures, arrays and strings, pointers, functions, structures and unions, and files. The objective is to understand problem solving concepts, appreciate program design, understand C programming elements, and write effective C programs. It discusses steps in program development, algorithms, modular design, coding, documentation, compilation and more.
Programming requirements for beginning in software engineering.pptxTeddyDaka
This document provides an introduction to algorithms and programming. It begins by defining what a computer is and its basic components. It then discusses why computers are used and the need for programming. The document outlines the different types of programming languages and defines key terms like data, information, knowledge, programs, and programmers. It describes the basic steps involved in programming like requirements, analysis, design, testing, and documentation. Finally, it introduces algorithms and the common tools used to represent them, flowcharts and pseudocode, describing the basic symbols and syntax used for each.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
2. Nadim Ahmed
Introduction
• You must bring a pen and some paper
with you to write notes from the board.
• This is a challenging subject, so do come
to all lectures and labs, and make plenty
of notes.
• If you have any questions, then please
ask.
3. Nadim Ahmed
How to Learn
• I will give you exercises to do, so please
do them.
• You will NEVERNEVERNEVERNEVER learn programming by
memorising!
• Make sure you understandunderstandunderstandunderstand what is
happening.
• You must attempt the exercises by
yourself.
4. Nadim Ahmed
What is a Computer?
“They don’t get angry, they don’t get
happy, they don’t get sad, they don’t
laugh at your jokes. They just run
programs.”
Paraphrased from “Short Circuit”
5. Nadim Ahmed
What is a Computer?
• Let us start at the beginning and see
what is a computer.
• A computer is a machine that can
calculate and use logic to carry out
tasks.
6. Nadim Ahmed
What is a Computer
• Computers take in inputinputinputinput.
– This is data that is given to the computer.
• They processprocessprocessprocess the input.
– This is when they manipulate/use the data.
• They produce an outputoutputoutputoutput.
– This is the result of manipulating the input.
7. Nadim Ahmed
What is Programming?
• To get a computer to carry out different
tasks, we have to be able to give it
specific instructions.
• This is programming.
• Before we start programming, we have
to look at something else.
8. Nadim Ahmed
Algorithms
• Before writing a program, the
programmer must understand what the
result should be and how the program
will produce it.
• It is important to know that a computer
program describes a computational
procedure called an algorithm.
9. Nadim Ahmed
Algorithms
• An algorithm is a step by step sequence
of instructions that describes how to
perform a computation.
• An algorithm answers the question
– “What method will you use to solve this
computational problem?”
10. Nadim Ahmed
Algorithms
• Only after
– we clearly understand the desired result,
– we clearly understand the algorithm and
– know the specific steps required to produce
the desired result
• we can write the program.
13. Nadim Ahmed
Programming a Sponge Cake
• Switch oven on at 180°C
• Cream together 225g softened butter
and 225g of sugar
• Whisk 4 eggs and add to mixture slowly
• Add 225g of sifted self raising flour and
fold.
• Grease two cake tins and add mixture.
• Bake for 20 – 30 minutes until golden
brown.
14. Nadim Ahmed
Programmable Computer
• Can provide a computer a sequence of
instructions describing the process I
want it to execute.
• Have a fixed set of primitives, can
program almost anything.
– In our sponge cake, the primitives are
commands like
•Cream, whisk, fold, grease.
15. Nadim Ahmed
Programming and Algorithms
• To illustrate an algorithm, we will
consider a simple requirement.
• Assume that a program must calculate
the average of three numbers.
• Most people do not think
algorithmically;
– They tend to think intuitively.
16. Nadim Ahmed
Programming and Algorithms
• If your car tyre needs changing,
– you will not think of all the steps required,
– you will either simply change the tyre or
– call someone else to do the job.
• This is an example of intuitive thinking.
17. Nadim Ahmed
Programming and Algorithms
• Unfortunately, computers do not
respond to intuitive commands.
• A general statement such as “find
average of three numbers” means
nothing to a computer.
– This is because computers can only respond
to algorithmic commands written in an
acceptable language such as C.
18. Nadim Ahmed
Programming and Algorithms
• To program a computer successfully, you
must clearly understand the difference
between algorithmic and intuitive
commands.
• You must give the computer a detailed,
step-by-step set of instructions that
forms an algorithm.
19. Nadim Ahmed
Average of Three Numbers
• We have to understand what the
requirements are, and what the result
will be.
• To make it easier, let us identify the
three numbers to use as an example.
20. Nadim Ahmed
Average of Three Numbers
• We have chosen the numbers
• 2, 3 and 10
Class Discussion:Class Discussion:Class Discussion:Class Discussion:
What do we mean by “find the average of
2, 3 and 10”?
21. Nadim Ahmed
Average of Three Numbers
• To find the average, we add up 2, 3 and
10.
• Then we divide that by three.
• 2 + 3 + 10 = 15
• 15 ÷ 3 = 5
• Therefore the average is 5.
22. Nadim Ahmed
Average of Three Numbers
• We now know how to find the average of
three specific numbers.
• How are we going to make it a bit more
general?
• Think of what steps you will take to get
the average of three numbers.
23. Nadim Ahmed
Average of Three Numbers
Class Discussion:Class Discussion:Class Discussion:Class Discussion:
What do we need to make a generic
program to find the average of three
numbers?
24. Nadim Ahmed
Average of Three Numbers
• We need to get our three numbers.
• We need to add the three numbers
• We need to divide the total by 3.
25. Nadim Ahmed
Code Modularity
• When programming, we break our large
problem into modules
– where each module can be thought of as a
single task.
• These modules make it easier to break
down programming problems.
26. Nadim Ahmed
Making Pizza
When making pizza, we have four basic tasks.
• Make pizza base.
• Make pizza topping.
• Assemble topping on the base.
• Bake pizza in oven.
Each of these tasks can be thought of as a
modulemodulemodulemodule, as they perform one task each.
27. Nadim Ahmed
Why Modules?
• Programs that use modules are known as
modular programsmodular programsmodular programsmodular programs.
• Modular programs are easier to develop,
correct and modify.
– Since they split the tasks into separate
modules, you can deal with each module
individually.
– If you have a mistake in one module, you
don’t worry about it affecting other modules.
28. Nadim Ahmed
Modules
• Each module is actually a small
subprogram.
• We break our module into smaller tasks.
• Each module
– InputInputInputInputs some data.
– ProcessProcessProcessProcesses the data.
– OutputOutputOutputOutputs the processed data.
29. Nadim Ahmed
A Pizza Module
• For our pizza making program, let’s see
our module “Make pizza topping”.
• Let’s say the topping will be a “cheese
and tomato” topping.
• What will the input, process and output
of the module be?
30. Nadim Ahmed
Make Pizza Topping
• Input
– Cheese
– Tomato
– Garlic
– Green Peppers
– Basil
– Onion
31. Nadim Ahmed
Make Pizza Topping
• Process
– Gently heat up tomato, garlic, green
peppers, basil and onion.
– Blend the mixture
– Grate the cheese and keep aside.
• Output
– Tomato sauce
– Grated cheese
32. Nadim Ahmed
Add Module
Class DiscussionClass DiscussionClass DiscussionClass Discussion
• If we have a module that adds two
numbers.
• What are the
– Inputs?
– Processes?
– Outputs?
33. Nadim Ahmed
Add Module
• Inputs
– Our two numbers that we want to add.
– Let’s call them a and b
• Process
– Add the two numbers and keep the result
safe.
c = a + b
• Output
– The result which is stored in c
34. Nadim Ahmed
Modules
Class DiscussionClass DiscussionClass DiscussionClass Discussion
• We have a program that can convert between
different types of distances.
• These can be
– kilometres to miles,
– miles to kilometres,
– inches to centimetres,
– centimetres to inches.
• If we have a program that converts different
types of distances then we should break it
down into modules.
– What modules do we use?
35. Nadim Ahmed
Programming and Modules
• We can have one module that converts
from kilometres to miles, and another
one to convert from miles to kilometres.
• Also, we can have one module that
converts from centimetres to inches and
vice versa.
• In other words, one module for each
task.
36. Nadim Ahmed
How Will We Program the
Computer?
• We will now look at how we will
program the computer.
• We need to communicate with the
computer so then we are understood by
the computer.
• I am speaking to you in English, which
some of you understand.
• We will now explore languages that
humans can use with computers.
37. Nadim Ahmed
Levels of Languages
• Computers work in binary
– 0, 1
– Not very human readable.
• To make things easier, we have various
levels of languages.
• These levels range from
– HighHighHighHigh to
– LowLowLowLow
38. Nadim Ahmed
Levels of Languages
• Machine code is the lowest level of
programming language.
– This is the language that the CPU uses.
– Tailored for each individual CPU.
– If you write something for an ARM
processor, it will not work on an Intel
processor.
39. Nadim Ahmed
Multiplying in Low Level
• This is an example of multiplying two
numbers in a low level language.
• It has been written for the Zilog Z80
microprocessor, which was very popular
in the late 1970s until late 1980s.
• There was no multiply command, so we
had to add numbers several times.
40. Nadim Ahmed
Multiplying Two Numbers
org &4000 ; store in memory location 4000
ld b,3 ; load register b with 3
ld a,0 ; load register a with 0
; The following line is in memory location 4004
add a,2 ; add 2 to register a
dec b ; decrement register b by 1.
jp nz,&4004 ; jump if not zero to memory location 4004
ld (&400f),a ; Copy content of register a to location 400f
end ; End of program
44. Nadim Ahmed
High Level Languages
• In order to make programming easier,
we use a high level language.
• When we use a high level language, we
need to convert it to machine code.
– This is called compilingcompilingcompilingcompiling.
– We use a compilercompilercompilercompiler to compile the sourcesourcesourcesource
codecodecodecode into machine code.
– Source code is our original high level code.
45. Nadim Ahmed
Multiplying in High Level
• You saw just how much effort was
required to multiply 3 by 2 in low level.
• In a high level language, we can just do
the following:
3*2
46. Nadim Ahmed
Syntax
• Syntax deals with the grammar of the
language.
– So, if you are speaking English, and say:
Cat ball hit.
– You have a syntax error.
•The cat hit the ball.
• The compiler will tell you about syntax
errors.
47. Nadim Ahmed
Semantic
• However, if your grammar is correct, but
the meaning is wrong, then you have a
semantic error.
The cat cooked some dolma.
• The grammar is correct, but I very much
doubt that a cat can actually cook dolma.
48. Nadim Ahmed
Semantic
• Let’s say you wrote down that the area
of a triangle is worked out by the
following equation:
length of base * height of triangle
• You have a semantic error.
• The compiler will not tell you that you
have a mistake in the equation.
49. Nadim Ahmed
C
• We will be using C as our high level
programming language.
• I have chosen ANSI C as it is a well
known standard that can be used by
most C compilers for different operating
systems.
• It is used widely by programmers and
academics in systems and graphics
programming.
50. Nadim Ahmed
In Summary
• We have seen
– What is a computer and programming.
– The basics of what is an algorithm.
– How programming is a form of recipe.
– Different levels of languages.
– Syntax and Semantics.