Dokumen tersebut berisi daftar nama 4 orang mahasiswa dan menyinggung topik rasuah. Ia mendefinisikan rasuah dan bagaimana rasuah dapat merugikan organisasi dan masyarakat. Dokumen tersebut juga memberikan contoh kes rasuah di Malaysia dan langkah untuk membendung rasuah.
This document discusses computer ethics and security. It covers netiquette, areas of computer ethics including information accuracy, green computing, codes of conduct, information privacy and intellectual property. It also discusses computer security risks such as malicious code, unauthorized access, hardware/software theft, information theft and system failure. Security measures to address these risks include data backup, cryptography, anti-virus software, firewalls and physical/digital access controls.
Ringkasan dokumen ini memberikan laporan sesi kaunseling individu antara seorang kaunselor dengan seorang pelajar wanita. Pelajar wanita ini menghadapi masalah tekanan akademik dan konflik dengan ibunya berkaitan keinginan ibunya untuk menjodohkannya pada usia muda ketika dia masih belajar. Melalui sesi kaunseling, pelajar wanita ini dibantu untuk berbincang dengan ibunya secara terbuka dan
Dokumen tersebut berisi daftar nama 4 orang mahasiswa dan menyinggung topik rasuah. Ia mendefinisikan rasuah dan bagaimana rasuah dapat merugikan organisasi dan masyarakat. Dokumen tersebut juga memberikan contoh kes rasuah di Malaysia dan langkah untuk membendung rasuah.
This document discusses computer ethics and security. It covers netiquette, areas of computer ethics including information accuracy, green computing, codes of conduct, information privacy and intellectual property. It also discusses computer security risks such as malicious code, unauthorized access, hardware/software theft, information theft and system failure. Security measures to address these risks include data backup, cryptography, anti-virus software, firewalls and physical/digital access controls.
Ringkasan dokumen ini memberikan laporan sesi kaunseling individu antara seorang kaunselor dengan seorang pelajar wanita. Pelajar wanita ini menghadapi masalah tekanan akademik dan konflik dengan ibunya berkaitan keinginan ibunya untuk menjodohkannya pada usia muda ketika dia masih belajar. Melalui sesi kaunseling, pelajar wanita ini dibantu untuk berbincang dengan ibunya secara terbuka dan
Dokumen tersebut membahas tentang asas kecemerlangan perkhidmatan pemandu, termasuk peranan dan tanggungjawab pemandu, ciri-ciri pemandu yang cemerlang, dan cara mencapai kecemerlangan diri dan kerjaya."
Dokumen tersebut membincangkan tiga jenis topologi rangkaian yaitu topologi bus, cincin dan bintang. Topologi bus menghubungkan semua komputer ke kabel utama tunggal, topologi cincin menghubungkan semua komputer secara bersebelahan membentuk lingkaran, sementara topologi bintang menghubungkan semua komputer ke peranti pusat seperti hub. Dokumen ini juga membandingkan ciri-ciri ketiga-tiga top
Ayat-ayat tersebut membahas tentang distribusi kekayaan dan hubungan antara orang kaya dan miskin. Ayat-ayat tersebut menganjurkan orang-orang yang mampu untuk memberikan sebagian kekayaannya kepada yang membutuhkan, serta larangan menimbun harta dan mengharapkan kemiskinan orang lain.
Pendekatan islam dalam komunikasi interpersonalAre Matt
Komunikasi berasal dari perkataan Yunani, iaitu communicare yang bermaksud menjadikan sesuatu itu milik bersama di mana penyampai menyampaikan sesuatu mesej kepada pendengar, pendengar pula bertindak dengan memberi maklumbalas yang bersesuaian. Bercakap, mendengar, menonton, membaca, menulis, berdoa, menilai diri dan sebagainya juga adalah aktiviti komunikasi.
Perkataan komunikasi juga mempunyai persamaan maksud dengan perkataan bahasa arab. Dalam Islam, perkataan dakwah, ittisal (menyampaikan) dan wasa’ili’lam (kaedah penyampaian) digunakan bagi menggambarkan maksud komunikasi dalam Islam.
Dokumen tersebut membahasakan bahaya merokok dan manfaat berhenti merokok. Merokok dikaitkan dengan penyakit jantung, kanser paru-paru, dan komplikasi kehamilan. Berhenti merokok membawa manfaat seperti tekanan darah dan denyutan jantung normal kembali, paru-paru bekerja lebih baik, dan risiko penyakit berkurang setelah beberapa tahun. Dokumen ini menganjurkan orang untuk berhent
Pemerintah mengumumkan paket stimulus ekonomi baru untuk menyelamatkan bisnis dan pekerjaan. Paket ini memberi insentif pajak dan bantuan tunai untuk UMKM. Tujuannya menjaga stabilitas ekonomi selama pandemi.
Dokumen ini merupakan rencana pelajaran Teknologi Maklumat dan Komunikasi untuk kelas 5 tentang perbandingan kebaikan dan keburukan situs web Facebook dan Youtube. Murid akan dibagi menjadi kelompok untuk menyenaraikan kebaikan dan keburukan masing-masing situs, lalu membandingkan dampaknya terhadap diri dan masyarakat menggunakan peta konsep ganda.
The document discusses starting a database project and provides guidance on key initial steps:
1. Explore the project scope and obtain information from stakeholders
2. Review the data to be modeled and develop a statement of work (SoW)
3. Develop an entity relationship diagram (ERD) and normalize the data model
It emphasizes the importance of understanding user needs through use cases and business rules. A use case describes how a user will interact with the system while business rules define constraints and policies. It also provides guidance on creating a data dictionary to document the database design as it is developed.
Dokumen tersebut membahas tentang asas kecemerlangan perkhidmatan pemandu, termasuk peranan dan tanggungjawab pemandu, ciri-ciri pemandu yang cemerlang, dan cara mencapai kecemerlangan diri dan kerjaya."
Dokumen tersebut membincangkan tiga jenis topologi rangkaian yaitu topologi bus, cincin dan bintang. Topologi bus menghubungkan semua komputer ke kabel utama tunggal, topologi cincin menghubungkan semua komputer secara bersebelahan membentuk lingkaran, sementara topologi bintang menghubungkan semua komputer ke peranti pusat seperti hub. Dokumen ini juga membandingkan ciri-ciri ketiga-tiga top
Ayat-ayat tersebut membahas tentang distribusi kekayaan dan hubungan antara orang kaya dan miskin. Ayat-ayat tersebut menganjurkan orang-orang yang mampu untuk memberikan sebagian kekayaannya kepada yang membutuhkan, serta larangan menimbun harta dan mengharapkan kemiskinan orang lain.
Pendekatan islam dalam komunikasi interpersonalAre Matt
Komunikasi berasal dari perkataan Yunani, iaitu communicare yang bermaksud menjadikan sesuatu itu milik bersama di mana penyampai menyampaikan sesuatu mesej kepada pendengar, pendengar pula bertindak dengan memberi maklumbalas yang bersesuaian. Bercakap, mendengar, menonton, membaca, menulis, berdoa, menilai diri dan sebagainya juga adalah aktiviti komunikasi.
Perkataan komunikasi juga mempunyai persamaan maksud dengan perkataan bahasa arab. Dalam Islam, perkataan dakwah, ittisal (menyampaikan) dan wasa’ili’lam (kaedah penyampaian) digunakan bagi menggambarkan maksud komunikasi dalam Islam.
Dokumen tersebut membahasakan bahaya merokok dan manfaat berhenti merokok. Merokok dikaitkan dengan penyakit jantung, kanser paru-paru, dan komplikasi kehamilan. Berhenti merokok membawa manfaat seperti tekanan darah dan denyutan jantung normal kembali, paru-paru bekerja lebih baik, dan risiko penyakit berkurang setelah beberapa tahun. Dokumen ini menganjurkan orang untuk berhent
Pemerintah mengumumkan paket stimulus ekonomi baru untuk menyelamatkan bisnis dan pekerjaan. Paket ini memberi insentif pajak dan bantuan tunai untuk UMKM. Tujuannya menjaga stabilitas ekonomi selama pandemi.
Dokumen ini merupakan rencana pelajaran Teknologi Maklumat dan Komunikasi untuk kelas 5 tentang perbandingan kebaikan dan keburukan situs web Facebook dan Youtube. Murid akan dibagi menjadi kelompok untuk menyenaraikan kebaikan dan keburukan masing-masing situs, lalu membandingkan dampaknya terhadap diri dan masyarakat menggunakan peta konsep ganda.
The document discusses starting a database project and provides guidance on key initial steps:
1. Explore the project scope and obtain information from stakeholders
2. Review the data to be modeled and develop a statement of work (SoW)
3. Develop an entity relationship diagram (ERD) and normalize the data model
It emphasizes the importance of understanding user needs through use cases and business rules. A use case describes how a user will interact with the system while business rules define constraints and policies. It also provides guidance on creating a data dictionary to document the database design as it is developed.
The document discusses the teaching scheme and contents for the Operating System subject for the fifth semester of the Diploma in Computer Engineering course. It provides an overview of the subject, including its objectives, topics to be covered, teaching hours allotted to each topic, and examination scheme. The key topics covered in the subject are introduction to operating systems, operating system structures, process management, scheduling, file systems and memory management, and a case study of UNIX operating system. Practical sessions focus on implementing programs and exploring concepts related to operating systems using languages like C and Lex/Yacc.
The document discusses the teaching scheme and contents for the Operating System subject for the fifth semester of the Diploma in Computer Engineering course. It provides an overview of the subject, including its objectives, topics to be covered, teaching scheme with hours and marks allotted to each topic, and list of practical exercises. The subject aims to develop skills in understanding operating system concepts like processes, scheduling, memory management, file systems etc. It also provides an introduction to the UNIX operating system. The teaching scheme allocates 48 hours of theory classes and 18 hours of practical sessions.
For more classes visit
www.snaptutorial.com
This Tutorial contains 2 Set of Papers for each Assignment
CIS 515 Week 1 Assignment 1 Accessing Oracle (2 Papers)
It 610 colorado university, RELATIONAL DATABASE MANAGEMENT SYSTEMS IT610 DQ1 ...Willy James
The document outlines the tasks and requirements for Phase 1 of an IT course project. It includes two main tasks:
1) A discussion board post responding to questions about the relational database application lifecycle.
2) The development of a database system plan for a company, which will be completed over several weeks. It will include a feasibility analysis, conceptual and entity relationship data models, SQL statements, and a database administration plan. Sources must be cited and the document saved with a specific file name for submission.
This document provides module descriptions for the Higher Certificate in Information Systems (Internet Development) program offered by CTI Education Group in South Africa. The modules cover topics like computer literacy, programming logic, program design, software engineering, database design, database management, web design, and creating web pages. The modules introduce fundamental concepts and teach practical skills for areas like word processing, spreadsheets, databases, presentations, programming logic, pseudocode, systems analysis, UML modeling, relational databases, and web development using technologies like HTML, CSS, JavaScript, and Flash.
If You want This Project Entittled "JPS-School Management System"
Contact - Sarthak Khabiya
Email :-sarthakkhabiya@gmail.com
Contact Number - +91-8717912597
This document outlines the teaching and evaluation scheme for the 3rd semester Information Technology program for the 2019-20 academic year. It includes:
- A list of 5 theory subjects and their credit hours, internal assessment marks, end semester exam marks, and total marks.
- A list of 4 practical subjects and their lab hours, internal assessment marks, and total marks.
- The total credit hours, internal assessment marks, end semester exam marks, and grand total marks for the semester.
- Minimum passing marks requirements and details on student centered activities.
- An outline of the curriculum for the 3rd semester Diploma in Information Technology program.
This document provides information for a database design concepts module, including the aims, objectives, content, learning outcomes and assessment criteria. The module will explore database architecture, design techniques, and applying design skills to create complex databases. Students will understand databases, data management systems, and design approaches. They will learn to design, create, document and evaluate a database containing multiple interrelated tables to address a case study on an art gallery. The module will be assessed through an individual report of approximately 4,500 words applying the concepts to design a database solution for the case study.
This chapter discusses systems analysis and design as a disciplined approach to developing information systems. It describes the roles and responsibilities in systems development, including systems analysts, programmers, and management. It also outlines the skills required for systems analysts and discusses different types of information systems. Finally, it introduces the systems development life cycle as a structured process and some alternative development approaches.
IRJET- Natural Language Query ProcessingIRJET Journal
The document discusses the development of a natural language query processing system that allows users to retrieve data from a database using simple English statements rather than SQL queries. It proposes a system that takes an English query as input, analyzes it to extract keywords, uses those keywords to generate an equivalent SQL query, executes the SQL query on the database, and returns the results to the user. The system is meant to make accessing database information easier for non-technical users by allowing them to use natural language instead of SQL.
This document provides information on the COMP 2010 Structured Systems Analysis and Design course. The course aims to teach methodological approaches to developing properly designed information systems using the structured approach. It will also help students learn to work as a team developing software systems for their group project. Upon completing the course, students should be able to describe system development processes, apply analysis techniques to understand requirements, and model and design systems based on requirements. Students will be continuously assessed on their understanding of analysis concepts and skills, and a final exam will evaluate their ability to apply techniques to business scenarios.
The document discusses the design phase of software development. It explains that design allows engineers to model the system or product to be built based on requirements. Good design establishes quality, is understandable, easy to implement, reliable, and allows for evolution. Poor design can result in an unstable system that is difficult to maintain and fails easily. The design process involves conceptual and technical design phases with top-level and detailed design. The output is a software design document containing modules, interfaces, data structures, and classes.
For more classes visit
www.snaptutorial.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
The systems analyst will research the current systems at Dar Es Salaam High School through distributing questionnaires, interviewing users, and examining documents. At the design stage, the analyst will need to consider items like hardware/software requirements, data collection formats, and report layouts. The factors influencing these designs include user requirements, data types, and output needs. Technical documentation produced after system development will include both user documentation describing how to use the system and program documentation explaining the code. Test results will be recorded in a table and compared to expected outcomes to evaluate the system.
75629 Topic prevention measures for vulneranbilitiesNumber of.docxsleeperharwell
75629 Topic: prevention measures for vulneranbilities
Number of Pages: 2 (Double Spaced)
Number of sources: 1
Writing Style: APA
Type of document: Editing
Academic Level:Undergraduate
Category: Computer Science
Language Style: English (U.S.)
Order Instructions: Attached
After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to protect those vulnerabilities.
Create a spreadsheet of vulnerabilities and prevention measures for your organization.
Categorize by people, process, or technology.
Provide 350- to 700-word paper onnext steps for each prevention measure based on the vulnerability, potential incident, environmental and security controls in SDLC.
Submit your spreadsheet and paper using the Assignment Files tab.
Data Flow Diagram (DFD) Tips
Processes: Verbs
Dataflows: Nouns
Data Stores: Nouns
External Entities: Nouns
1) Process’s input & output are different
2) Each data store should have at least
one data flow in and one data flow out
3) Each process should have at least one
data flow in and one data flow out
4) All inputs and outputs should be
labeled
5) Processes should have an identifier
(Ex., 1.0, 2.0, etc.)
Process Process
Process-to-Process
Process Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S toreData S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data StoreExternal Entity-to-Data Store
External
Entity
Data S tore
External
Entity
Data S tore
External
Entity
Data S tore
External Entity-to-Data Store
External
Entity
Data S toreProcess Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data Store
External
Entity
Data S tore
DFD_Rules.vsdxTop Process
Stage 2: Requirements Specification
Before you begin this assignment, be sure you have read the Case Study and all assignments for this class, especially Stage 4: Final System Report. The feedback you received on your Stage 1 assignment should be reviewed and used as you proceed with Stage 2.
Purpose of this Assignment
This assignment gives you the opportunity to specify clear and concise requirements, including the use of data and process models, for a system that enables a productive change in a way the business is conducted. This assignment specifically addresses the following course outcomes to enable you to:
· apply a systematic approach to .
Role of Computers in Research, Data Processing, Data AnalysisRKavithamani
The computers are indispensable throughout the research process. The role of computer becomes more important when the research is on a large sample. Data can be stored in computers for immediate use or can be stored in auxiliary memories like floppy discs, compact discs, universal serial buses (pen drives) or memory cards, so that the same can be retrieved later. The computers assist the researcher throughout different phases of research process.
The document discusses the types of information systems and the system development life cycle (SDLC). It defines various types of information systems including transaction processing systems (TPS), management information systems (MIS), decision support systems (DSS), executive support systems (ESS), and office automation systems (OAS). It describes the characteristics and users of each system. The document also outlines the five phases of the SDLC: planning, analysis, design, implementation, and maintenance.
The document provides an introduction to databases. It defines key database concepts including database, database management system (DBMS), table, record, and field. It explains that a database contains organized data stored in tables which contain records made up of related fields. An example is provided of a school database containing data about students, instructors, classes, and student schedules. Advantages of databases include data sharing, improved security and integrity, and reduced redundancy. Disadvantages include complex design, costs, and training needs. Primary keys uniquely identify each record in a table while foreign keys in one table match the primary key of another table to link the tables.
This document discusses the fundamentals of multimedia. It begins by outlining the learning outcomes, which are to define multimedia, describe its elements, and state its applications. It then defines each element of multimedia - text, graphics, video, audio, and animation. For each element, it provides examples and purposes. It discusses different types like bitmaps, vectors, digital/analog audio. Finally, it outlines some common applications of multimedia in education, entertainment, public places, and business.
1. To convert a binary number to decimal, write the binary number with an implied base 2, and multiply each bit by its place value (2^0, 2^1, 2^2 etc.), then sum the results.
2. To convert a decimal number to binary, repeatedly divide the decimal number by 2, with the remainders as the binary digits (least significant to most significant).
3. To convert between decimal and hexadecimal, use the same process as binary but with base 16 and hexadecimal digits (0-9 then A-F) instead of base 2 and binary digits (0-1).
The document discusses different types of system software, including operating systems and utility programs. It describes three types of operating systems - standalone, server, and embedded/mobile. It also lists 12 key functions of operating systems like starting and shutting down computers, managing programs and memory, and providing security. Finally, it identifies seven common types of utility programs such as file managers, disk cleanups, anti-virus software, and backup/restore utilities, and explains their basic functions.
Storage holds data, instructions, and information for future use on physical storage media like hard disks, optical discs, flash memory. There are three main types of storage media: magnetic storage including hard disks and floppy disks, optical storage like CDs and DVDs, and flash memory storage like solid state drives, memory cards, and USB flash drives. Storage capacity differs between media, with hard disks holding terabytes, optical discs holding gigabytes, and flash memory ranging from megabytes to gigabytes depending on the device. Memory and storage differ in that memory holds data temporarily during processing while storage holds data permanently when not in use.
1. The document discusses various computer input and output devices. It describes input devices like keyboards, pointing devices, microphones, scanners, and webcams that allow users to enter data. It also covers output devices such as displays, printers, speakers, projectors, and touchscreens that convey information to users.
2. The functions of common input devices like keyboards, mice, touchpads, microphones, and scanners are explained. Output devices and their uses are also outlined, including displays, printers, speakers, projectors, and interactive whiteboards.
3. Examples are given for many device types, along with diagrams and pictures to illustrate key points. Input and output are defined, and various devices are
This document discusses computer memory. It defines memory as electronic components that store instructions and data for the processor. Memory is either volatile, which loses its contents when power is removed, like RAM, or non-volatile, which retains data without power, like ROM. RAM is the most common type of volatile memory and usually resides on memory modules inserted into memory slots. There are three main types of RAM: DRAM, SRAM, and MRAM. The document also describes differences between volatile and non-volatile memory and lists some types of ROM, including PROM, EPROM, and EEPROM.
The document discusses the basic components of a motherboard. It identifies the processor slot, which houses the CPU and connects it electrically to the motherboard. It also mentions adapter card slots that hold additional cards to add functionality, and memory slots that hold RAM modules. The motherboard serves as the main circuit board containing integrated circuits and provides connection points for other computer components and peripherals.
This document provides information about logic gates and Boolean expressions:
- It defines common logic gates (AND, OR, NOT) and their truth tables. It also introduces more complex gates like NAND and NOR.
- It explains how to write Boolean expressions, evaluate them using truth tables, and draw the corresponding logic circuits.
- Examples are provided for writing Boolean expressions for given logic circuits, drawing circuits for given expressions, and evaluating expressions using truth tables.
- The purpose is for students to understand basic logic gates, Boolean expressions, and how to represent logic relationships in circuits.
The document discusses different coding schemes used in data processing, including ASCII, EBCDIC, and Unicode. ASCII uses 8 bits to represent characters and can represent 256 characters, while EBCDIC is traditionally used on mainframe computers. Unicode uses 16 or 32 bits and can represent over 65,000 characters to support different languages.
The document discusses number systems including binary, decimal, and hexadecimal. It provides examples of converting between these number systems. Key points covered include:
- Binary uses 0 and 1, decimal uses 0-9, and hexadecimal uses 0-9 and A-F
- Conversions can be done between any two number systems by placing the value in the appropriate column based on the system's base (e.g. binary is base 2, decimal is base 10, hexadecimal is base 16)
- Examples are provided for converting decimal to binary, binary to decimal, decimal to hexadecimal, hexadecimal to decimal, and between binary and hexadecimal.
This document discusses the information processing cycle of a computer system. It defines a computer system as including both hardware and software. It then explains the four main steps of the information processing cycle as: 1) input - entering data into memory, 2) process - transforming data, 3) output - conveying information to the user, and 4) storage - holding data, instructions, and information for future use. As an example, it explains how the information "8x2=16" would go through each step of the cycle.
This document describes five main types of websites:
1) Portal websites which offer a variety of internet services from a central location and have online communities. Popular examples include Yahoo and MSN.
2) Business/marketing websites which promote and sell products and services, often allowing online purchases.
3) Blog websites which are informal sites composed of timestamped articles or posts by an author in reverse chronological order, reflecting their interests and opinions. Examples include personal blogs and microblogs.
4) Wiki websites which allow users to collaboratively create and modify content via a web browser, open to the public. Wikipedia is a well-known example.
5) Online social networks which encourage members to share interests, ideas, media
This document provides information about various internet services, including e-mail, instant messaging, VoIP, message boards, and FTP. It defines each service and provides examples. For email, it describes what email is, email addresses, and mailing lists. For instant messaging, it defines IM as a real-time internet conversation. For VoIP, it describes making phone calls over the internet. Message boards and newsgroups are described as online areas for discussion on particular topics. Finally, FTP is defined as a protocol for uploading and downloading files between computers using an FTP program. Examples of FTP programs are also provided.
This document discusses various aspects of the World Wide Web including:
- Web browsers allow users to access web pages and web 2.0 programs with examples including Internet Explorer, Firefox, Opera, Safari, and Google Chrome.
- Web pages have unique addresses called URLs that identify their location and are composed of protocols, hostnames, domains, paths, and filenames.
- Users can navigate web pages through hyperlinks that connect related pages and allow nonlinear access to information.
- Web searching is done through search engines that use keyword queries or subject directories that categorize pages by topic.
The document provides an overview of the Internet, including its definition, evolution, advantages, and disadvantages. It discusses different types of Internet connections such as dial-up, broadband, DSL, fiber, wireless, cable, Wi-Fi, and satellite. It also describes an Internet service provider's role in providing access to the Internet and lists some examples of ISPs in Malaysia. Finally, it defines Internet Protocol (IP) addresses and their relationship to domain names in allowing users to locate and identify computers on the network.
This document discusses network topologies. It describes the bus, star, and ring network topologies. In a bus network, all computers and devices connect to a single central backbone cable. Data travels along the cable in both directions to all devices, but each device only accepts data addressed to it. Advantages are low cost and easy addition/removal of devices. A disadvantage is a cable break disables the whole network. Star and ring topologies are also introduced. The document focuses on network fundamentals including concepts, architectures, and layouts.
The document discusses different types of system software, including operating systems and utility programs. It describes three main types of operating systems - standalone, server, and embedded/mobile. It then lists 12 key functions of operating systems such as starting and shutting down the computer, providing a user interface, managing programs and memory, coordinating tasks, configuring devices, establishing internet connections, monitoring performance, providing utilities, automatically updating, controlling networks, and administering security. The document also discusses different types of utility programs and their functions, including file managers, disk cleanups, compression tools, anti-virus programs, spyware removers, disk defragmenters, and backup/restore utilities.
This document provides information on logic gates, Boolean expressions, and simple logic circuits. It defines common logic gates like AND, OR, and NOT. It explains how to write Boolean expressions, construct truth tables, and draw logic circuits. Examples are provided to demonstrate how to write Boolean expressions for given logic circuits, draw truth tables, and build logic circuits for Boolean expressions. The document aims to teach students to identify logical operators, write valid Boolean expressions, and evaluate expressions using truth tables.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
1. PROGRAM PEMANTAPAN
SAINS KOMPUTER SC025
FAIZAH IBRAHIM
PENSYARAH KANAN
KOLEJ MATRIKULASI PULAU PINANG
faizahibrahim@kmpp.matrik.edu.my
DEWAN KULIAH 5
KOLEJ MATRIKULASI PERAK
14 APRIL 2017
2.
3. Memerikan (describe) command words
yang digunakan
Memerikan jawapan berdasarkan
command words
Mengenal pasti jenis control structure
dalam masalah yang diberi
Menulis aturcara berdasarkan masalah
yang diberi
6. SOALAN SAINS KOMPUTER
Soalan 1 – Chap 5 (4 jam): 10 marks
Soalan 2 –Chap 6 (4 jam): 10 marks
Soalan 3 – Chap 7 (4 jam): 10 marks
Soalan 4,5,6,7,8 – Chap 8 (24 jam): 70
marks
:SOALAN STRUKTUR
: 2 jam
7. PEMBERAT
Jumlah markah : 100%
Pemberat: 70%
Contoh: 80/ 100 x 70 = 56% + PB
MARKS
70% OF FINAL MARKS
(30% FROM PB)
8. SCENARIO/PREAMBLE
beginning of each exam question
gives you the
context within which
all exam questions
are set
important that you
understand the scenario
9. SCENARIO/PREAMBLE
The figure below illustrates the shuffle icon in an
audio player application. Once the function is
activated, the sequence of the songs played is
randomly arranged.
Shuffle icon
10. COMMAND WORDS
Define
To give the meaning of a word term, distinguishing it
from closely related subjects, sometimes by examples
and illustrations.
List
Your answer should be a list – The number of items
you need to list depends on the number of marks
available e.g. 2 marks will require you to list 2 items.
State
Identify
Give
Name
Your answer should be a simple sentence - The
number of items you need to state/identify/give/
name depends on the number of marks available.
11. COMMAND WORDS
Describe Set out characteristics and features of a
subject
Explain
In your answer you should make a point and
then expand on each point (by giving examples
or reasons) to make sure you are explaining
the point
Discuss
You Should compare different points of view,
giving evidence to back up the points you
make; you should reach a conclusion about
the topic you have been discussing.
Remember to think about spelling, punctuation
12. COMMAND WORDS
Calculate
and display
Work out a process involving formula and display /
print the value of the variable.
Draw
Provide a complete drawing, example drawing of the
flow chart by using a correct symbols and labelling.
Differentiate
Make clear the differences between two or more
concepts/terms (Compare the same criteria).
14. MULTIMEDIA
Animation and video are two of the multimedia elements.
Give two (2) differences between these two elements. [ 4
M]
AnswerAnimation Video
Is a drawing sketches of object that
shows in series of frames so it looks
like a moving and living thing.
Is a recording of either still or
moving objects.
The file size is smaller compared to
video
The file size is bigger compared to
animation
Kesilapan Pelajar:
i. Tidak membanding berdasarkan kriteria yang sama
Cth: Jika bincangkan dari segi file size, kedua-dua elemen perlu
membincangkan file size
15. Explain two (2) modes of multimedia interactivity [4M]
Answer:
Linear interactivity: User have no control over the
progress and sequence of the content and they need to
follow the contents page by page.
Non Linear interactivity: User can control the progress and
sequence of the multimedia content by using buttons or
links.
Label the mode of interactiviti (1
M)
Explanation (1 M)
Kesilapan Pelajar:
• Menghuraikan mod interaktiviti tanpa menyatakan nama mod
interaktiviti
• Tidak ada perkataan progress and sequence
MULTIMEDIA
17. DATABASE
Identify two table names for this database and two attributes for table
2.
Answer:
TABLES NAME/ENTITY:
• BOOKING
• COURSE
• ACADEMIC
ATTRIBUTES/FIELD
NAME:
• Subject_name
• Code
• Type
Kesilapan Pelajar:
• Keliru untuk menentukan table names.
• Tidak mengambil kira case sensitive.
18. Refer to: Question 2 ( SC025 SESI 2016/2016)
Tips
1. Berdasarkan gambarajah: identify table name.
table name = file name = ENTITY
2. Mesti menyatakan table nama sama sebagaimana ejaan
dan case dalam soalan (case sensitive)
3. Beza field name (ATTRIBUTE) dan field.
4. Fahamkan konsep table name/ entities.
5. Fahamkan konsep attributes dan Field.
DATABASE
19. Refer to: Question 2 ( SC025 SESI 2016/2016)
Tips Kesilapan pelajar
Menentukan Primary key dan foreign key
1. Primary key adalah suatu yang unik dan tiada
pengulangan data di dalam table tersebut.
2. Primary key tidak semestinya berada di first
column
Tidak dapat
mengenal pasti
primary key dan
foreign key
2. Foreign key dalam satu table boleh ada
pengulangan tetapi dalam table yang lain ia
perlu jadi primary key dan unik dalam table
tersebut.
3. Foreign key : mesti ada sekurang-kurangnya
dua table
DATABASE
20. If the records in TABLE2
are arranged in
descending order based
on Code, What is the
value of the
Subject_name of the last
record?
Kesilapan Pelajar:
• Tidak membaca dengan teliti apa yang perlu di sort dan apa yang menjadi
output. Bezakan antara ascending dan descending
Answer:
Introduction to Microprocessor
DATABASE
22. Tips
Keywords/ mengambarkan keywork untuk setiap types of Information
System
Types keywords
TPS Day to day operation
MIS Generate report, view report
OAS Use of IT Application or IT equipment example: email, MS
Office, Internet browser, Video conference
DSS Help/aid/assist decision making in semi structured problem.
ESS Predict/ long term planning
INFORMATION SYSTEM
Kesilapan Pelajar:
• Kurang mahir mengenalpasti types of Information System berdasarkan
keyword yang diberi ataupun berdasarkan who is the user
23. Identify Type of Information System based on the following
description.
Description Type of Information
System
A system that support day to day operation by
maintaining detailed record of completed business
transaction.
A system that provides analysis tools that predicts
a series of performance outcomes over time using
the input data to be used by the executives to
make decision.
A system that collect, processes, stores and
transmits electronic messages. Word processing ,
document imaging or calendar are some of the
application used in this system.
Keywords: word
processing,
document imaging
Keywords predicts a
series of
performance
Keywords : day to
day operation
INFORMATION SYSTEM
24. Description Types of
IS
(i) This organization level is dominated by heads of
departments and usually oversee the activities of the users
at the operational management level
(ii) Generate Microsoft Word documents or business forms from
data stored in other applications such as Microsoft Access -
Microsoft Office Software
(iii) The operational level is concerned with performing day to
day business transactions of the organization.
(iv) The users at this level make unstructured decisions and
concerned with the long-term planning of the organization
(v) Used by senior management to make non-routine
decisions. The user needs input from internal systems
(transaction processing systems and management information
INFORMATION SYSTEM
MIS
OAS
TPS
ESS
ESS
25. Description Types of IS
This system’s users are usually senior management
and they are aided with sophisticated mathematical
models, and statistical techniques (probability,
predictive modeling, etc.) to provide solutions, and they
are very interactive.
Technology can be used to design and make products.
Computer-aided design (CAD) software, for instance,
enables designers to test computer models digitally
before moving new products into the prototype stage.
ESS
INFORMATION SYSTEM
OAS
26. Description Types of
Information
System
Awang checks his telco bill through Celcom
website.
Keyword: Usage of computer to perform tasks
Description Types of Information
System
Celcom prepares the customers bill by
the end of month.
Keyword: Bill prepared after a certain duration
OAS
TPS-
batch
processing
INFORMATION SYSTEM
27. Description Types of IS
Name the information system that will predict
what will be the return of investment if the
production were to be close down for 3
months during the flood seasons.
Name the information system that will show
the trend of interest for a certain population
that will help in decision making.
ESS
INFORMATION SYSTEM
ESS
28. Identify type of Information System based on the following
description.
Description Type of Information
System
A system that support day to day operation by
maintaining detailed record of completed business
transaction.
A system that provides analysis tools that predicts
a series of performance outcomes over time using
the input data to be used by the executives to
make decision.
A system that collect, processes, stores and
transmits electronic messages. Word processing ,
document imaging or calendar are some of the
application used in this system.
TPS
ESS
OAS
INFORMATION SYSTEM
29. Describe the purpose of the following information system.
[2M]
Types of Information system Purpose
Management Information system Generate accurate, timely and
organized information. So
manager and other user can
make decision to solve
problem, supervise activities
and track progress.
Decision Support System To help/aids/assist decision
making in less/semi structured
problems.
INFORMATION SYSTEM
31. Identify the steps of the SDLC for student information system based
on the activity below. [5M]
Activity SDLC steps
Write the C++ code
Identify problem statements and objectives of the
system.
Draw a complete flow chart
Amend the completed system to suit the users’ needs.
Make comparison between several current systems to
propose a new system.
Kesilapan Pelajar:
• Keliru antara SDLC dan Steps in problem solving
Implementation
Planning
Design
Maintenance
Analysis
INFORMATION SYSTEM
33. INTRO TO PROGRAMMING
Give one (2) difference between low level language and high
level language
Low level language High Level Language
Difficult to learn because
Instruction are written in binary
code or mnemonics.
Easy to learn because
instructions are written in
English like language
Machine dependent language
(runs only on one type of
computer)
Machine independent
language (run on different
types of computers and OS)Kesilapan Pelajar:
• Tidak memberikan perbezaan menggunakan kriteria
yang sama.
• Memberikan jawapan yang terlalu ringkas
34. Describe the function of the following:
i. Assembler
[Convert/translate assembly code] [into machine
language]
ii. Compiler
[Translate/convert entire source program (high level
language)][ into object program (machine language)]
iii. Interpreter
[Translate/convert the instruction] [line by line] as the
program is runningKesilapan pelajar:
• Tidak memasukkan keyword dalam jawapan
INTRO TO PROGRAMMING
35. INTRO TO PROGRAMMING
Describe five steps in problem solving
Steps in problem solving
Problem analysis
Design a solution
Implementation
Testing
Documentation
Kesilapan Pelajar:
• Keliru dengan SDLC.
• Memberikan jawapan mengikut turutan yang salah
(*jawapan perlu mengikut turutan yang betul)
36. IPO – algorithm diberi
Cth:
Given the following algorithm, identify the input, process and
output.
1. Tidak dapat mengenal pasti proses :
If integer mod 2 = 0 then
Display ‘the number is even”
Else
Display ‘the number is odd”
Start
Read integer
If integer mod 2 = 0 then
Display “the number is even”
Else
Display “the number is odd”
End
Menulis
semula
Apa
yang
37. IPO – algorithm diberi
Cth:
Given the following algorithm, identify the input, process and
output.
1. Tidak dapat mengenal pasti proses :
To determine whether the number is odd or even
2. Menulis output yang salah : “the number is even”,
“the number is odd”
Start
Read integer
If integer mod 2 = 0 then
Display “the number is even”
Else
Display “the number is odd”
End
Kenal pasti
jenis
Control
structure
38. IPO – algorithm diberi
Cth:
Given the following algorithm, identify the input, process and
output.
1. Tidak dapat mengenal pasti proses :
To determine whether the number is odd or even
2. Menulis output yang salah : “the number is
even”or “the number is odd”
Start
Read integer
If integer mod 2 = 0 then
Display “the number is even”
Else
Display “the number is odd”
End
Kenal pasti jenis
Control structure
39. IPO – given scenario
Cth:
By considering the following scenarios, identify the input,
process and output.
Scenario 1: Calculate and display the perimeter of cuboid.
Formula tidak diberi!!!!
1. Input berdasarkan kepada formula. Formula yang
simple mesti tahu
2. Kenalpasti proses : control structure yang
digunakan???
calculate perimeter of cuboid/calculate perimeter
40. IPO – given scenario
Cth:
By considering the following scenarios, identify the input,
process and output.
Scenario 2: Calculate and display Ahmad’s age.
Apa yang perlu tahu atau cari???
1. Kenalpasti proses : control structure yang
digunakan???
calculate perimeter of cuboid/calculate perimeter
2. Berapa output diperlukan
41. IPO – sequence control structure
I : Senaraikan apa yang diberi atau akan
digunakan bagi menyelesaikan masalah
P: To calculate…/ to compute….
O: Bergantung kepada hasil calculation/atau
dari soalan
42. IPO – selection control structure
I : Senaraikan apa yang diberi atau akan
digunakan bagi menyelesaikan masalah
P: To determine…
O: kemungkinan ada dua atau lebih output
output1 or output2
43. WRITE PSEUDOCODE
Waie bought several books from Popular Book Store.
Calculate the amount he needs to pay if each book offers
25% discount and 6% GST.
Kesilapan Pelajar:
• Formula silap. GST 6% sepatutnya dikenakan terhadap harga
selepas diskaun 25%
• Kesilapan mencari harga selepas diskaun dengan menggunakan
formula:
price after discount = total price x 0.25.
• Kesilapan mencari harga selepas GST dengan meggunakan
formula:
Amount paid= 0.06 x price after discount.
44. WRITE PSEUDOCODE
Given a list of daily temperature for a certain number of
days, design a program to determine the maximum
temperature. The first input is the number of days
Kesilapan Pelajar:
• Variable tidak diinitialized .Cth: max_temperature .
45. WRITE PSEUDOCODE
1. Kenalpasti jenis control structure dalam soalan.
Bagaimana??
Cth:
You are asked to calculate the area of shaded area of two circles
in FIGURE 1.
» Cari keyword dalam soalan: calculate shaded
area
» Diberi dua circles: cari circle besar tolak circle
kecil
» Kena cari area circle besar dan circle kecil
» Control structure??? Sequence
» Kenalpasti IPO
r1
r2
46. WRITE PSEUDOCODE
Identify what type of control structure for each of this
question
1. Calculate the perimeter of a circle.
2. Calculate the perimeter of two circles. Determine which
circle has the larger perimeter. Display appropriate
message.
3. Calculate the perimeter of 200 circles. Determine which
circle has the larger perimeter. Display appropriate
message.
Kenalpasti keyword- sequence, selection dan looping
Highlight keyword
47. DRAW FLOWCHART
1. Menggunakan simbol yang salah
2. Tidak membeza antara input dan output. Penulisan
read/input/get dan display/output/print
number
number
input number
48. DRAW FLOWCHART
3. Tidak menggunakan arrow untuk menunjukkan
flowline
4. Tidak melengkapkan flowchart untuk selection
control structure
5. Tidak menulis Y/N atau T/F pada decision
symbol bagi selection atau looping control
structure
6. Tidak membezakan antara display message dan
nilai
53. WRITE C++ STATEMENT
Cth:
Convert the temperature in Fahrenheit (F) to Celcius (C)
using the formula:
𝐶 =
5
9
(𝐹 − 32) [2 marks]
1. Terlupa memasukkan tanda * pada expression
2. Membahagikan 5/9 = 0 (integer/integer = integer)
3. Pelbagai jawapan boleh diterima - 5 ∗ (𝐹 − 32)/9 atau 5.0
9 * (F-
32)
4. Tidak meletakkan semicolon diakhir statement
Gantikan integer kepada float supaya hasil bahagi tidak menjadi 0
54. WRITE C++ STATEMENT
Cth:
Print “Too Many” if the variable count exceeds 100.
[2 marks]
1. Silap menulis nama variable – variable count
2. Tidak faham maksud exceeds 100
i. count >= 100
ii. count => 100
3. Tidak menggunakan “ “ bila menulis “Too Many”
4. Tidak meletakkan semicolon diakhir statement
Jumlah markah = 2 marks so ada dua statement sahaja
55. WRITE C++ STATEMENT
Declare a variable name sum to store a floating
point value and initialize it to 0
Initialize:
tentukan nilai
awal kepada
variable
tersebut.
Declare:
tentukan data
type kepada
variable yang
digunakan
56. WRITE C++ STATEMENT
Cth:
Declare a constant named PI, where the value is 3.14.
[2 marks]
1. Terlupa tulis perkataan const – const float PI =3.14;
2. Terlupa tulis data type - const float PI =3.14;
3. Menulis huruf kecil bagi perkataan pi - PI
4. Tidak meletakkan semicolon diakhir statement
Jumlah markah = 2 marks so ada dua statement sahaja
57. DETERMINE ERROR IN A PROGRAM
Type of errors:
1. Syntax errors : error that occurs during compilation.
Syntax errors result from errors in code construction such
as mistyping a keyword, omitting punctuation, missing one
of the braces.
2. Runtime errors: error that cause a program to terminate
abnormally. For example division by zero. When the
divisor is zero for integer division.
3. Logic errors: a program does not perform the way it
should be. For example you want to calculate the
perimeter of rectangle but instead you use formula to
58. COMMON ERRORS
1. Missing punctuation :
cout<<“total marks”
int num1, num2, num3
for (num1=1,num1<=10,num1=num1+1)
Missing curly braces : open/close (before end of program)
Missing # before include <iostream>
Missing double quote when using string: “Num” and Num
Missing single quote for a character: ‘s’ , ‘S’
2. Use different case for variable : num and Num
3. Does not declare all the variables used
4. Using wrong assignment statement: num1+num2 = num
59. SOLVE EXPRESSION BASED ON
PRECEDENCE
Suppose a, b and c are integer variables that have been
assigned values a =8, b = 3 and c = 5. Determine the value
of each of the following arithmetic expressions
1. 2 * b + 3 (a – c)
2. a * b / c
• Tentukan precedence dan data type bagi variable yang
diberi
• Selesaikan mengikut precedence yang telah ditentukan
• Jawapan akhir rujuk balik kepada soalan samada data
type adalah integer atau float.
2. 46 % 9 + 4 * 4 - 2
60. MATHEMATIC EXPRESSIONS IN C++
EXPRESSIONS
Write the following mathematic expressions in C++
expressions.
1. result =
𝑎
𝑏+𝑐+𝑑
2. value = x2 + y2
1. Selesaikan berdasarkan precedence dan associavity
2. Left to right jika sama precedence
3. Berhati-hati dengan penggunaan operator division
multiplication. Symbol yang digunakan adalah lain dari
matematik
61. CONVERT FOR LOOP TO WHILE
LOOP
int n;
int m = 10;
for ( n=1; n < m; n = n + 1)
{
cout << m << end;
m = m – 2;
}
62. CONVERT for LOOP TO while LOOP
int n;
int m = 10;
for ( n=1; n < m; n = n
+ 1)
cout << m << end;
m = m – 2;
63. CONVERT for LOOP TO while
LOOP
double total = 0.0, num;
for (int count = 0; count < 10; count++) {
cout << "Enter a number: ";
cin >> num;
total = total+num;
}
64. CONVERT while LOOP TO for
LOOP
int x = 50;
while (x > 0) {
cout << x << “ seconds to go.n”;
x=x -1;
}
65. FIND OUTPUT: SEQUENCE
cout<<"I love Computer Science"<<endl;
cout<<endl;
cout<<"I enjoy learning Computer Science"<<endl;
cout<<"n";
cout<<"n";
cout<<"n";
cout<<"Yeah!"<<endl;
* Penggunaan n dan endl
66. FIND OUTPUT: SEQUENCE
1. Tidak trace instruction by instruction
2. Tidak menunjukkan pengiraan pada instruction
berkenaan
3. Mengeluarkan output yang salah
4. Menggunakan data type yang
salah
Trace the following program and give the output.
68. FIND OUTPUT: SELECTION
What is the output for the following program segment?
int a =5, b=8, d=15, c=6, e=10, f=3, z;
z = (a * (b – (c – 11 /d) + (e % f * 5)));
cout<< z << endl;
if (z > pow (b, 2))
z = z + 1;
else
z = z -1;
cout << z;
69. FIND OUTPUT: LOOPING
Determine output of the following program segment.
int counter =0;
while (counter <= 7)
{
cout<<counter;
counter = counter + 2;
}
int counter =0;
while (counter <= 7)
counter = counter + 2;
cout<<counter;
* Perbezaan output disebabkan oleh curly braces
70. FIND OUTPUT LOOPING
m=0;
for ( i=1; i<=4; i = i + 1)
{
cout<< “Enter any number”;
cin>>n;
if ( m < n)
m=n;
}
cout << m;
What is the output if the following values are entered? Show your
working.
5, -4, 10, 3
Apa maksud ayat
ini?
72. WRITE PROGRAM
SEGMENT/FRAGMENT
1. Hanya tulis bermula dari body
Cth:
Write a program segment to find the remainder of two
numbers.
cout<<“Enter the 1st numbert”;
cin>>num1;
cout<<“Enter the 2nd numbert”;
cin>>num2;
cout<<“Remainder of “<<num1<<“ and “<<num2<<“ is
“<<rem;
73. WRITE PROGRAM
SEGMENT/FRAGMENT
1. Menulis full program – membuang masa
2. Tidak perlu buat declaration
3. Selalu terlupa menulis {} bila menggunakan
while/for loop dan selection
4. Nama variable tidak konsisten- case
sensitive
5. Penggunaan operator untuk multiplication
6. Terlupa menulis ; di setiap akhir C++
75. WRITE PROGRAM
SEGMENT/FRAGMENT
Using a single equal sign to check equality
Setting a variable that is not input yet
No input for a and b,
sum will equal an
unknown random
number, no matter
what the user inputs.
Use = (equal sign) assign the
value on the right side of the
expression to the variable on
the left hand side
Use == to check for equality
Berhati-hati dengan
penggunaan relational operator
76. WRITE PROGRAM
SEGMENT/FRAGMENT
Unit Cents per Unit
First 100 20
Next 200 25
Each extra unit 28
Your friend has to write a program to calculate electricity
bills. She asked for your help to draw the flowchart and
pseudocode. The payable sum is calculated using this
table.
Units used are based on meter reading.
Example: If previous reading is 2300, current reading is
2800, the payable sum is RM126.00. Help your friend solve
this problem.
77.
78.
79.
80.
81.
82. WRITE PROGRAM
SEGMENT/FRAGMENT
Questions:
1. Write a program segment that reads fifty
grades and calculates the average.
2. Write a program segment that reads
grades and calculates the average.
Program terminated when -1 entered.
83. WRITE A PROGRAM
1. Terlupa menulis declaration bagi semua variable yang
digunakan
2. Tidak initialize variable contohnya sum
3. Terlupa menulis update value apabila menggunakan
counter-controlled looping
4. Tidak dapat membezakan antara penggunaan if dan
while
5. TIDAK DAPAT MEMBEZAKAN CONTROL
STRUCTURE DALAM SOALAN