SlideShare a Scribd company logo
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf
Visual Programming- Lecture 2 -Types of programming languages.pdf

More Related Content

More from StephenTec

Unit 3 - Lecture 4 - Object Oriented Design using UML.pdf
Unit 3 - Lecture 4 - Object Oriented Design using UML.pdfUnit 3 - Lecture 4 - Object Oriented Design using UML.pdf
Unit 3 - Lecture 4 - Object Oriented Design using UML.pdf
StephenTec
 
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdfUnit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
StephenTec
 
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdfUnit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
StephenTec
 
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
StephenTec
 
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdfUnit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
StephenTec
 
Unit 2 - Lecture 3 - The software requirements document.pdf
Unit 2 - Lecture 3 - The software requirements document.pdfUnit 2 - Lecture 3 - The software requirements document.pdf
Unit 2 - Lecture 3 - The software requirements document.pdf
StephenTec
 
Unit 2 - Lecture 2 -Requirements specification.pdf
Unit 2 - Lecture 2 -Requirements specification.pdfUnit 2 - Lecture 2 -Requirements specification.pdf
Unit 2 - Lecture 2 -Requirements specification.pdf
StephenTec
 
Unit 2 - Lecture 1 - Software Requirements Engineering.pdf
Unit 2 - Lecture 1 - Software Requirements Engineering.pdfUnit 2 - Lecture 1 - Software Requirements Engineering.pdf
Unit 2 - Lecture 1 - Software Requirements Engineering.pdf
StephenTec
 
unit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdfunit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdf
StephenTec
 
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdfunit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
StephenTec
 
unit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdfunit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdf
StephenTec
 
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdfunit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
StephenTec
 
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdfunit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
StephenTec
 
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdfDigital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
StephenTec
 
Digital Electronics - Lecture 2 - Number Systems.pdf
Digital Electronics - Lecture 2 - Number Systems.pdfDigital Electronics - Lecture 2 - Number Systems.pdf
Digital Electronics - Lecture 2 - Number Systems.pdf
StephenTec
 
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdf
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdfDigital Electronics - Lecture 1 - Digital and Analog Signal.pdf
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdf
StephenTec
 
Unit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec
 
Unit 1_Lecture 1_Introduction to Internet of Things.pdf
Unit 1_Lecture 1_Introduction to Internet of Things.pdfUnit 1_Lecture 1_Introduction to Internet of Things.pdf
Unit 1_Lecture 1_Introduction to Internet of Things.pdf
StephenTec
 
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdfVisual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
StephenTec
 

More from StephenTec (19)

Unit 3 - Lecture 4 - Object Oriented Design using UML.pdf
Unit 3 - Lecture 4 - Object Oriented Design using UML.pdfUnit 3 - Lecture 4 - Object Oriented Design using UML.pdf
Unit 3 - Lecture 4 - Object Oriented Design using UML.pdf
 
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdfUnit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
Unit 3 - Lecture 3 - Architectural patterns – Application Architectures.pdf
 
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdfUnit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
Unit 3 - Lecture 2 - Architectural design decisions - Architectural views.pdf
 
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
Unit 3 - Lecture 1 - Context Models – Interaction models – Structural models ...
 
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdfUnit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
Unit 2 - Lecture 4 - Requirements validation – Requirements management.pdf
 
Unit 2 - Lecture 3 - The software requirements document.pdf
Unit 2 - Lecture 3 - The software requirements document.pdfUnit 2 - Lecture 3 - The software requirements document.pdf
Unit 2 - Lecture 3 - The software requirements document.pdf
 
Unit 2 - Lecture 2 -Requirements specification.pdf
Unit 2 - Lecture 2 -Requirements specification.pdfUnit 2 - Lecture 2 -Requirements specification.pdf
Unit 2 - Lecture 2 -Requirements specification.pdf
 
Unit 2 - Lecture 1 - Software Requirements Engineering.pdf
Unit 2 - Lecture 1 - Software Requirements Engineering.pdfUnit 2 - Lecture 1 - Software Requirements Engineering.pdf
Unit 2 - Lecture 1 - Software Requirements Engineering.pdf
 
unit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdfunit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdf
 
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdfunit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
 
unit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdfunit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdf
 
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdfunit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
 
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdfunit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
 
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdfDigital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
Digital Electronics - Lecture 3 - Binary Arithmetic Operations.pdf
 
Digital Electronics - Lecture 2 - Number Systems.pdf
Digital Electronics - Lecture 2 - Number Systems.pdfDigital Electronics - Lecture 2 - Number Systems.pdf
Digital Electronics - Lecture 2 - Number Systems.pdf
 
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdf
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdfDigital Electronics - Lecture 1 - Digital and Analog Signal.pdf
Digital Electronics - Lecture 1 - Digital and Analog Signal.pdf
 
Unit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
 
Unit 1_Lecture 1_Introduction to Internet of Things.pdf
Unit 1_Lecture 1_Introduction to Internet of Things.pdfUnit 1_Lecture 1_Introduction to Internet of Things.pdf
Unit 1_Lecture 1_Introduction to Internet of Things.pdf
 
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdfVisual Programming - Lecture 1 - Why do we need programming languages.pdf
Visual Programming - Lecture 1 - Why do we need programming languages.pdf
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs