SlideShare a Scribd company logo
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf

More Related Content

More from StephenTec

Unit 3 - Lecture 4 - Object Oriented Design using UML.pdf
Unit 3 - Lecture 4 - Object Oriented Design using UML.pdfUnit 3 - Lecture 4 - Object Oriented Design using UML.pdf
Unit 3 - Lecture 4 - Object Oriented Design using UML.pdf
StephenTec
 
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdfUnit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
StephenTec
 
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdfUnit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
StephenTec
 
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
StephenTec
 
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdfUnit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
StephenTec
 
Unit 2 - Lecture 3 - The software requirements document.pdf
Unit 2 - Lecture 3 - The software requirements document.pdfUnit 2 - Lecture 3 - The software requirements document.pdf
Unit 2 - Lecture 3 - The software requirements document.pdf
StephenTec
 
Unit 2 - Lecture 2 -Requirements specification.pdf
Unit 2 - Lecture 2 -Requirements specification.pdfUnit 2 - Lecture 2 -Requirements specification.pdf
Unit 2 - Lecture 2 -Requirements specification.pdf
StephenTec
 
Unit 2 - Lecture 1 - Software Requirements Engineering.pdf
Unit 2 - Lecture 1 - Software Requirements Engineering.pdfUnit 2 - Lecture 1 - Software Requirements Engineering.pdf
Unit 2 - Lecture 1 - Software Requirements Engineering.pdf
StephenTec
 
unit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdfunit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdf
StephenTec
 
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdfunit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
StephenTec
 
unit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdfunit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdf
StephenTec
 
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdfunit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
StephenTec
 
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdfunit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
StephenTec
 
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdfDigital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
StephenTec
 
Digital Electronics - Lecture 2 - Number Systems.pdf
Digital Electronics - Lecture 2 - Number Systems.pdfDigital Electronics - Lecture 2 - Number Systems.pdf
Digital Electronics - Lecture 2 - Number Systems.pdf
StephenTec
 
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdf
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdfDigital Electronics - Lecture 1 - Digital and Analog Signal.pdf
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdf
StephenTec
 
Unit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec
 
Unit 1_Lecture 1_Introduction to Internet of Things.pdf
Unit 1_Lecture 1_Introduction to Internet of Things.pdfUnit 1_Lecture 1_Introduction to Internet of Things.pdf
Unit 1_Lecture 1_Introduction to Internet of Things.pdf
StephenTec
 
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdfVisual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
StephenTec
 

More from StephenTec (19)

Unit 3 - Lecture 4 - Object Oriented Design using UML.pdf
Unit 3 - Lecture 4 - Object Oriented Design using UML.pdfUnit 3 - Lecture 4 - Object Oriented Design using UML.pdf
Unit 3 - Lecture 4 - Object Oriented Design using UML.pdf
 
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdfUnit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
 
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdfUnit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
 
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
 
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdfUnit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
 
Unit 2 - Lecture 3 - The software requirements document.pdf
Unit 2 - Lecture 3 - The software requirements document.pdfUnit 2 - Lecture 3 - The software requirements document.pdf
Unit 2 - Lecture 3 - The software requirements document.pdf
 
Unit 2 - Lecture 2 -Requirements specification.pdf
Unit 2 - Lecture 2 -Requirements specification.pdfUnit 2 - Lecture 2 -Requirements specification.pdf
Unit 2 - Lecture 2 -Requirements specification.pdf
 
Unit 2 - Lecture 1 - Software Requirements Engineering.pdf
Unit 2 - Lecture 1 - Software Requirements Engineering.pdfUnit 2 - Lecture 1 - Software Requirements Engineering.pdf
Unit 2 - Lecture 1 - Software Requirements Engineering.pdf
 
unit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdfunit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdf
 
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdfunit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
 
unit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdfunit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdf
 
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdfunit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
 
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdfunit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
 
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdfDigital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
 
Digital Electronics - Lecture 2 - Number Systems.pdf
Digital Electronics - Lecture 2 - Number Systems.pdfDigital Electronics - Lecture 2 - Number Systems.pdf
Digital Electronics - Lecture 2 - Number Systems.pdf
 
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdf
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdfDigital Electronics - Lecture 1 - Digital and Analog Signal.pdf
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdf
 
Unit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
 
Unit 1_Lecture 1_Introduction to Internet of Things.pdf
Unit 1_Lecture 1_Introduction to Internet of Things.pdfUnit 1_Lecture 1_Introduction to Internet of Things.pdf
Unit 1_Lecture 1_Introduction to Internet of Things.pdf
 
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdfVisual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx