The advantages and disadvantages of using functions

Assignment Help Computer Engineering
Reference no: EM1326995

1. What are the advantages and disadvantages of using functions, in your software code, in a software development project? Give some examples.

2. Notice that the main program is initiated like a function:
int main(void)

Is the main program a function? If so, how is it used like a function by other programs? Give examples

3. Show how you might write a "case" statement using only the "if" statement instead of an actual case statement. Hint: Nested if statements. Explain your code

4. How would you error check the users' input to make sure the input was a number, letter, or string?
(In your final IA program you will prompt the user to select a currency to be converted. They will have the options of picking one of five currencies.)

Example:

Please enter a '1' for Canada Dollars

Please enter a '2' for Aus Dollars

Please enter a '3' for Japan Yen

Please enter a '4' for Euros

Please enter a '5' for British Pound

How would I know if the user entered an 'A' for example instead of a '1'?

Reference no: EM1326995

Questions Cloud

Attributes described by tichy developed a team : Analyze and explain how a leader with the attributes described by Tichy developed a team.
Rules for governmen employment strike : What would be the strongest reasons in support of no-strike rules for government workers?
Why do systems deployments or implementations fail : Why do systems deployments or implementations succeed.
Explaining leadership and management : In a 3 page paper define leadership and management.
The advantages and disadvantages of using functions : Show how you might write the "case" statement using only the "if" statement in its place an actual case statement. Hint: Nested if statements. Explain your code.
Explaining autocratic decision-style methods : Research and discuss a leader, executive, or manager who is famous for theory X, autocratic decision-style methods.
Does not economic growth and the innovation that generates : Does not economic growth and the innovation that generates it, produce more and more substitutes or new discoveries of reserves
Explaining the employee privacy rights : Public sector employees and private sector employees with regard to employee privacy rights?
Explain protocol and architecture : define Connection Oriented Protocol and Connectionless Protocol.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discussing code segments

Consider the following declarations (that are used in order to process singly-linked lists as explained in this section).Explain what will be displayed by each of following code segments or discuss why an error occurs.

  What occurs in an infinite loop

What occurs in an infinite loop? Create your own Repeat-until repetition arrangement.

  Transmitting image through raster scan

If we were to transmit this image utilizing the raster scan order, after 15 seconds how many rows of image will the user have received? To what fraction of the image does this correspond?

  Describe the mechanics of Buffer overflows

Prepare a complete tutorial, including an analogy to describe the mechanics and a graphic to support your analogy, on one of the subsequent areas

  Use electronic monitoring to measure employee productivity

assume that you are an IT consultant who has been given the task of preparing a report for the management board of a software house that is currently thinking of implementing electronic monitoring throughout its operations.

  Describing the car structure

Write down a definition statement which describes a Car structure variable initialized along with the following information: Make: Ford Model: Mustang.

  Discuss how the topology can be used

Discuss how the topology can be used

  Global economy

Explain why is the global economy so vital today? Explain how the global economy has altered since the mid-twentieth century.

  Describe a wireless network card

Describe a wireless network card

  Transmition of the packet

An Ethernet MAC sub layer receives the 1510 bytes of the data from LLC layer. Explain whether the data encapsulation can be within one frame?

  Describe what you consider to be some attributes

explain what you consider to be some attributes of a well-written program. What would you look for when reviewing a programmer's code during a quality assurance review.

  Finding most effective it projects

What will you recommend they do in order to find the most effective IT projects?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd