SlideShare a Scribd company logo
Name: Stromiles Dira, Vidal DATE: September 18, 2022
Course: BS Computer Science
Professor: Sherie Anne Llanes, MPA
QUIZ 1
ENUMERATION: List down the other term or calls of the five generations.
1. Machine Language (First generation of computer) 1GL
2. Assembly Language (Second generation of computer) 2GL
3. High-level of Language (Third generation of computer) 3GL
4. Very high-level of Language ( Fourth generation of computer) 4GL
5. Artificial Intelligence Language or commonly know as AI (Fifth generation of
computer) 5GL
IDENTIFICATION
1. It is considered a very high-level programming language that requires a lot of
time and effort that affects the productivity of a programmer.
- Fourth Generation Language
2. A code represents text, computer processor instructions, or any other data
using a two symbols system which is 0 and 1.
- Binary code
3. A language that is closer to the understanding of computers than to humans.
Machine Language (First generation computer)
ESSAY
1. In your own word, explain what is programming languages.
Programming language is basically a set of instruction which the developer use to
create software and is a way to communicate to computer to perform specific task
through expressing algorithm precisely
Example of programming language
Java, JavaScript, C and C++, SQL
These are some of the popular and common use of computer programming this day to
perform and create software
2. Explain what is the difference between 3GL and 4GL.
The Third generation of computers was designed to concentrate only on the logic of
the programs without considering the internal architecture of the computer system
while the fourth generation of computers is more focused on designing and
developing to reduce the time, cost, and effort needed to develop a different type of
software application although they have the same purpose as a programming language
itself to create various type of program these two have a difference when it comes in a
specific field, for example, 3GL requires specification on how to perform the task
while 4GL requires what task is to be done and 4GL is easy to read the code and
maintain it while 3GL is difficult to understand and 3GL requires a large number of
instruction while 4GL require far few instructions and when it comes of primary 3GL
are typically a file-oriented while 4GL are database oriented

More Related Content

Similar to Program-logic-formulation.docx

Grade 8: Introduction To Java
Grade 8: Introduction To JavaGrade 8: Introduction To Java
Grade 8: Introduction To Java
nandanrocker
Ā 
Introduction To Computer Programming
Introduction To Computer ProgrammingIntroduction To Computer Programming
Introduction To Computer Programming
Hussain Buksh
Ā 
Bluej
BluejBluej
Generation of Computer language by arya dutta (1).pptx
Generation of Computer language by arya dutta (1).pptxGeneration of Computer language by arya dutta (1).pptx
Generation of Computer language by arya dutta (1).pptx
AryaDutta4
Ā 
Generations Of Programming Languages
Generations Of Programming LanguagesGenerations Of Programming Languages
Generations Of Programming Languages
py7rjs
Ā 
ITELOG113_CHAPTER_I_Introduction_to_Computing.pptx
ITELOG113_CHAPTER_I_Introduction_to_Computing.pptxITELOG113_CHAPTER_I_Introduction_to_Computing.pptx
ITELOG113_CHAPTER_I_Introduction_to_Computing.pptx
MarkJarusTTalanquine
Ā 
Programming Part 01
Programming Part 01Programming Part 01
Programming Part 01
zakri zakaria
Ā 
Computer Science Is The Study Of Principals And How The...
Computer Science Is The Study Of Principals And How The...Computer Science Is The Study Of Principals And How The...
Computer Science Is The Study Of Principals And How The...
Laura Martin
Ā 
INTRODUCTION TO SOFTWARE, PROGRAMMING LANGUAGES.pdf
INTRODUCTION TO SOFTWARE, PROGRAMMING LANGUAGES.pdfINTRODUCTION TO SOFTWARE, PROGRAMMING LANGUAGES.pdf
INTRODUCTION TO SOFTWARE, PROGRAMMING LANGUAGES.pdf
Kakai Catalan
Ā 
Nota programming
Nota programmingNota programming
Nota programmingAzmiah Mahmud
Ā 
Chapter 5
Chapter 5Chapter 5
Chapter 5
meisaina
Ā 
Programming assignment-help at myassignmenthelp.net
Programming assignment-help at myassignmenthelp.netProgramming assignment-help at myassignmenthelp.net
Programming assignment-help at myassignmenthelp.net
www.myassignmenthelp.net
Ā 
Computer Software and It's Development
Computer Software and It's DevelopmentComputer Software and It's Development
Computer Software and It's Development
Rabin BK
Ā 
Itc chapter # 8
Itc   chapter # 8Itc   chapter # 8
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1Cma Mohd
Ā 
Ict topic 5
Ict topic 5Ict topic 5
Ict topic 5
kwongliik
Ā 
Programming languages
Programming languagesProgramming languages
Programming languagesAkash Varaiya
Ā 
Trend of Visual Programming Language
Trend of Visual Programming LanguageTrend of Visual Programming Language
Trend of Visual Programming Language
Teddy Marcus
Ā 

Similar to Program-logic-formulation.docx (20)

Grade 8: Introduction To Java
Grade 8: Introduction To JavaGrade 8: Introduction To Java
Grade 8: Introduction To Java
Ā 
Introduction To Computer Programming
Introduction To Computer ProgrammingIntroduction To Computer Programming
Introduction To Computer Programming
Ā 
Bluej
BluejBluej
Bluej
Ā 
Generation of Computer language by arya dutta (1).pptx
Generation of Computer language by arya dutta (1).pptxGeneration of Computer language by arya dutta (1).pptx
Generation of Computer language by arya dutta (1).pptx
Ā 
Generations Of Programming Languages
Generations Of Programming LanguagesGenerations Of Programming Languages
Generations Of Programming Languages
Ā 
Notacd071
Notacd071Notacd071
Notacd071
Ā 
ITELOG113_CHAPTER_I_Introduction_to_Computing.pptx
ITELOG113_CHAPTER_I_Introduction_to_Computing.pptxITELOG113_CHAPTER_I_Introduction_to_Computing.pptx
ITELOG113_CHAPTER_I_Introduction_to_Computing.pptx
Ā 
Programming Part 01
Programming Part 01Programming Part 01
Programming Part 01
Ā 
Computer Science Is The Study Of Principals And How The...
Computer Science Is The Study Of Principals And How The...Computer Science Is The Study Of Principals And How The...
Computer Science Is The Study Of Principals And How The...
Ā 
INTRODUCTION TO SOFTWARE, PROGRAMMING LANGUAGES.pdf
INTRODUCTION TO SOFTWARE, PROGRAMMING LANGUAGES.pdfINTRODUCTION TO SOFTWARE, PROGRAMMING LANGUAGES.pdf
INTRODUCTION TO SOFTWARE, PROGRAMMING LANGUAGES.pdf
Ā 
Notacd07
Notacd07Notacd07
Notacd07
Ā 
Nota programming
Nota programmingNota programming
Nota programming
Ā 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Ā 
Programming assignment-help at myassignmenthelp.net
Programming assignment-help at myassignmenthelp.netProgramming assignment-help at myassignmenthelp.net
Programming assignment-help at myassignmenthelp.net
Ā 
Computer Software and It's Development
Computer Software and It's DevelopmentComputer Software and It's Development
Computer Software and It's Development
Ā 
Itc chapter # 8
Itc   chapter # 8Itc   chapter # 8
Itc chapter # 8
Ā 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1
Ā 
Ict topic 5
Ict topic 5Ict topic 5
Ict topic 5
Ā 
Programming languages
Programming languagesProgramming languages
Programming languages
Ā 
Trend of Visual Programming Language
Trend of Visual Programming LanguageTrend of Visual Programming Language
Trend of Visual Programming Language
Ā 

More from StromilesDira

midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
StromilesDira
Ā 
midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
StromilesDira
Ā 
midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
StromilesDira
Ā 
midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
StromilesDira
Ā 
midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
StromilesDira
Ā 
Intro to graphics and design
Intro to graphics and design Intro to graphics and design
Intro to graphics and design
StromilesDira
Ā 
Introduction to computing
Introduction to computing Introduction to computing
Introduction to computing
StromilesDira
Ā 
Intro to graphics and design.pptx
Intro to graphics and design.pptxIntro to graphics and design.pptx
Intro to graphics and design.pptx
StromilesDira
Ā 

More from StromilesDira (8)

midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
Ā 
midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
Ā 
midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
Ā 
midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
Ā 
midterm-exam.docx
midterm-exam.docxmidterm-exam.docx
midterm-exam.docx
Ā 
Intro to graphics and design
Intro to graphics and design Intro to graphics and design
Intro to graphics and design
Ā 
Introduction to computing
Introduction to computing Introduction to computing
Introduction to computing
Ā 
Intro to graphics and design.pptx
Intro to graphics and design.pptxIntro to graphics and design.pptx
Intro to graphics and design.pptx
Ā 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
Ā 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
Ā 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
Ā 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
Ā 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-UniversitƤt
Ā 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
Ā 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Ā 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
Ā 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
Ā 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
Ā 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
Ā 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā„¢
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā„¢Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā„¢
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā„¢
UiPathCommunity
Ā 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ā 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
Ā 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
Ā 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Ā 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Ā 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ā 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Ā 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Ā 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Ā 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
Ā 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
Ā 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā„¢
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā„¢Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā„¢
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā„¢
Ā 

Program-logic-formulation.docx

  • 1. Name: Stromiles Dira, Vidal DATE: September 18, 2022 Course: BS Computer Science Professor: Sherie Anne Llanes, MPA QUIZ 1 ENUMERATION: List down the other term or calls of the five generations. 1. Machine Language (First generation of computer) 1GL 2. Assembly Language (Second generation of computer) 2GL 3. High-level of Language (Third generation of computer) 3GL 4. Very high-level of Language ( Fourth generation of computer) 4GL 5. Artificial Intelligence Language or commonly know as AI (Fifth generation of computer) 5GL IDENTIFICATION 1. It is considered a very high-level programming language that requires a lot of time and effort that affects the productivity of a programmer. - Fourth Generation Language 2. A code represents text, computer processor instructions, or any other data using a two symbols system which is 0 and 1. - Binary code 3. A language that is closer to the understanding of computers than to humans. Machine Language (First generation computer) ESSAY 1. In your own word, explain what is programming languages. Programming language is basically a set of instruction which the developer use to create software and is a way to communicate to computer to perform specific task through expressing algorithm precisely Example of programming language Java, JavaScript, C and C++, SQL These are some of the popular and common use of computer programming this day to perform and create software 2. Explain what is the difference between 3GL and 4GL. The Third generation of computers was designed to concentrate only on the logic of the programs without considering the internal architecture of the computer system while the fourth generation of computers is more focused on designing and developing to reduce the time, cost, and effort needed to develop a different type of software application although they have the same purpose as a programming language itself to create various type of program these two have a difference when it comes in a specific field, for example, 3GL requires specification on how to perform the task while 4GL requires what task is to be done and 4GL is easy to read the code and maintain it while 3GL is difficult to understand and 3GL requires a large number of instruction while 4GL require far few instructions and when it comes of primary 3GL are typically a file-oriented while 4GL are database oriented