Looping and input validation concepts

Assignment Help Basic Computer Science
Reference no: EM131446374

1. Forum Description

This is your chance to become the instructor.  After learning the looping and input validation concepts, create a problem to give to your students to allow them to practice the looping and input validation concepts. The problem should include at least two different decision structures and a loop. The number of times to process the loop is stated in the problem definition. The decision structures should be chosen from the simple, combined, nested and CASE structures. Use the Programming Exercise problems at the end of Chapter 5 as an example.

The problem description should include:

  • The input into the problem.
  • The output from the problem.
  • The generic processing necessary to solve the problem. (do not give too much information away)

    The solution should include: 

  • Input validation statements.
  • The solution should include the exact calculations need to solve the problem.
  • The solution cannot be similar to a problem posted by another student, located on the Internet or located in another textbook.

Type the problem definition and the pseudocode solution into a word processing document.

Reference no: EM131446374

Questions Cloud

Discuss advantages and disadvantages-wireless communication : Discuss the advantages and disadvantages of wireless communication, such as Bluetooth and wireless LANs, compared to wired communication. Using your knowledge and your personal crystal ball, will wireless communication become more or less importan..
Soft and self-management skills : A common perception is that soft and self-management skills such as listening, communication, an stress management are innate. In other words, you are either born with them or you are not. Do you agree or disagree? Explain why.
Discuss an ethical dilemma that you are aware of : Read the article by Schafer (2011) and discuss an ethical dilemma that you are aware of. Describe how it was an ethical trap and how it could be avoided. Be cautious to avoid using names. Refer to terms as used in the textbook.
Write a paper on either learning or cognition : A scholarly research paper focused on either learning or cognition, minimum of 12 pages in paper body length (not including the cover page or references page), double-spaced with 1" margins on all sides of each page, is required for this course. A..
Looping and input validation concepts : This is your chance to become the instructor.  After learning the looping and input validation concepts, create a problem to give to your students to allow them to practice the looping and input validation concepts.
Explain the concept of cloud computing : Explain, in your own words, the concept of cloud computing. Do you believe that cloud computing will have a major impact on the IT function in organizations? Why or why not? In your opinion, what are some factors that will hold back the growth of ..
Analyze the role that setting and character play : Analyze the ways in which setting is essential to the plot of the story. For example, in an adventure story the plot events might hinge on severe weather conditions, high altitude, or heavy snowfall.
How can programming benefit you in your chosen career field : What are the general benefits to learning how to program? (Hint - look at music and arts education.)How can programming benefit you in your chosen career field? What types of coding skills are being required by employers?
Specific needs and requirements for users : Over the years, different port connection types have been developed in response to specific needs and requirements for users. While it appears the trend is leaning towards an approach favoring USB connections, why do you suppose it is important fo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Combination of java and the android api

Android provides the Dalvik Virtual Machine, which allows native Android apps to be developed using a combination of Java and the Android API. Apple's iOS does not provide a Java Virtual Machine;

  Confirm graphically that the solution

Confirm graphically that the solution from part a maximizes the farmer's profit from his land.

  List of security activities or controls

List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data.

  Implement policies for packet filtering and forwarding

All routers today implement policies for packet filtering and forwarding and most of them use what are called Access Control Lists (ACLs) to configure these policies.

  Create a program that reads number of dooflingies

The shipping clerk at Rinky Dooflingy Corporation is faced with the problem: Dooflingies are very deilicate and must be shipped in special containers.

  Design a database for public libraries

John works for an IT service company as a senior database designer. His company just won a few contracts to serve several public library systems within the state of Maryland. Each library system operates independently though John is in charge to d..

  Determining contents of memory of specified address

Find the contents of memory from address 0x1800 up to, but not including, 0x1809, after this code is executed.

  Define the purpose of the systems analyst

Define the purpose of the systems analyst and why it is important in the overall systems analysis process. Write this post to an audience of IT specialists.

  Benefits and drawbacks of using software development

Explain the benefits and drawbacks of using software development tools provided by cloud vendors to develop cloud-based solutions for an organization.

  What do you mean by cyclic redundancy checking

Which error detection method consists of just one redundant bit per data unit? In cyclic redundancy checking, what is CRC? In cyclic redundancy checking, the divisor is the CRC.

  What is the command you would use to compile the file

What is the command you would use to compile the file Addition.java?

  Expected cost of an unsuccessful search

Under certain assumptions, the expected cost of an insertion into a hash table with secondary clustering is given by 1/(1-λ)-λ-ln(1-λ). Unfortunately, this formula is not accurate for quadratic probing. However, assuming that it is, determine the ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd