Repetition Using the End of File Condition
|
|
- Ethan Floyd
- 7 years ago
- Views:
Transcription
1 Repetition Using the End of File Condition Quick Start Compile step once always g++ -o Scan4 Scan4.cpp mkdir labs cd labs Execute step mkdir 4 Scan4 cd 4 cp /samples/csc/155/labs/4/*. Submit step emacs Scan4.cpp & submit csc155abc 4 Problem Statement and Specifications This assignment continues our study of string and double objects as well as the use of input files. This program will use repetition, but not selection. Files come in two varieties: sequential access files and direct access files. Basically, the files used in this course (for input, output or source code) are sequential access files. These files have their data separated into records or lines and we process the records (lines) in the order in which they are stored. Databases use direct access files. These files have their data separated into records, but we access the records in a random order. Think of the database that contains student data for enrollment at our school. The staff member at the registration window has no knowledge of how registrants will approach the window, and so the records in the database are accessed in an unpredictable order. The means by which we implement these features into our files is that with direct access files, we require that every record be the same size. Since this must be large enough to accommodate the largest record, each record must be the same size as the largest record regardless of how much or how little data is stored in that record. Sequential access files do not require this feature, so every line in our input or source files can have a different length than every other line. Direct access files are beyond the scope of our course, but databases are the original computer application and they have continued to play an important role in computing from its earliest days to the present. Assignment 4 Statement: Write a program in a file named Scan4.cpp that reads the inventory for a hardware store from a sequential access file named scan.txt. Each line of the input file contains a string and a double separated by a blank character (you are guaranteed that the string has no embedded blanks). The string value should be interpreted as the name of a tool and the double value should be interpreted as the price of that tool. Your program should display each line of the file on the monitor using appropriate formatting. When all of the lines of the file have been processed, display the total number of tools in the file and the sum of all of the costs for all of the tools that were stored in the file. All output for this program should be displayed on the monitor. Since the input string will not contain embedded blanks, we can use the usual input operator ( >>) for input from scan.txt. Associated with this solution is the use of a List Reduction Algorithm that takes a list of 1
2 numbers and accumulates them one at a time. The algorithm requires a repetition structure so that we can visit every element in the list. It can be described in the following steps. I. initialize an accumulator to 0 II. loop to visit each list element III. update the accumulator as you visit each list element We ll use this algorithm to accumulate the double value that is stored on each line. Assignment 4 Specifications: Input Read a tool name and a tool cost from the input file scan.txt Output Display on the monitor the tool name and tool cost for each input line Output Display on the monitor the total number of tools and the total costs of all the tools Object Analysis and Algorithmic Development We ll need at least a string and a double object to read the data in from the file. In addition, we ll need an ifstream to connect to our input file. Finally, we ll need another double to accumulate the tool prices that are stored in the file as well as an int to accumulate the number of tools in the file. Let s start our algorithmic development at the usual place. 1. Input 2. Process 3. Output We ll need to do some preparation for the input in that we ll need to connect to the file and we ll also need to initialize our accumulators for the List Reduction Algorithm described above. In order to process every line within the file without knowing how many lines are in the file, we ll need to implement an end-of-file loop. This is accommodated by attempting to read the first line of the file and then entering a loop that is controlled by the ifstream.eof() function. Within that loop, we ll need to update our accumulators and display the current input line before we attempt to read another line from the file. After the loop, we simply display our accumulators with appropriate labels. Our algorithm is looking like the following sequence. 1. process initialize file and accumulator variables 2. output display a descriptive message about the program and the output headings 3. input attempt to read the string of the first item of the file 4. process determine if the end-of-file condition is true (a) input read the double value cost from the current input line (b) process to update the total cost of the tools (c) process to update the total number of tools (d) output display the tool name and cost for the current line (e) input attempt to read the string of the item from the next line of the file 2
3 5. output the total cost and the total number of tools in the file 6. process disconnect from the input file Steps 4.(a), through 4.(e) are indented since they will be repeated for each line of input in the file scan.txt. Our final algorithm, with some renumbering, will look like the following. Note that lines in blue represent areas of code that require you to modify or write code to complete the assignment. Statement Data objects 1) connect the input file object to scan.txt ifstream objects and string constants 2) initialize accumulators to 0 double and int objects and constants 3) display a descriptive message and headings string constants 4) attempt to input the first tool name from the file ifstream & string objects 5) test the ifstream.eof() condition bool method and ifstream object 6) input the cost from the file ifstream & double objects 7) update the total cost double objects 8) update the total number of tools int object and constant 9) display the current tool and its cost ifstream, string and double objects and string constants 10) attempt to read another tool name ifstream & string objects 11) display the total number of tool costs and the total double and int objects and string constants number of tools 12) disconnect from the input file ifstream object and close() method Just to clarify matters, Step 6 through Step 10 are in the while loop determined at Step 5. Coding for Compilation Logon to your csc.oakton.edu account and create a new subdirectory of the labs directory called 4 to work on your assignment. cd labs mkdir 4 cd 4 The documentation for this algorithm has already been included in the file /samples/csc/155/labs/4/scan4.cpp that you can copy over to your local directory by issuing the following cp command. cp /samples/csc/155/labs/4/scan4.cpp. emacs Scan4.cpp & Declaration of Variables The declarations of the string, double and int variables is pretty straight forward. When it comes to the ifstream objects, we ll delve into that as we discuss the pseudo-code. Follow the Pseudo Code Step 1 // connect the input file object to scan.txt We have two options within C++ for this. The first is called the initialization at declaration mechanism where we initialize the ifstream object at its declaration. This would appear as follows. 3
4 ifstream fin("scan.txt"); The other option would be to declare the ifstream object and then use the ifstream.open() method to connect to the file. ifstream fin; fin.open("scan.txt"); Code one, but not both, of these options in your program before continuing. Step 2 // initialize accumulators to 0 These are simply two assignment statements, one of which initializes the double accumulator to 0.0 and the other initializes the int accumulator to 0. Code these statements before continuing. Step 3 // display a descriptive message and the headings These are simply a output statements that describe the program as is displayed in the sample output. You should also include the headings for the data that will be printed out in the input loop at Step 5. Code these statements before continuing. Step 4 // attempt to input the first tool name from the file Each line of the input file scan.txt separates the string tool name from the double tool cost with the char value of a blank, ( ). There is a guarantee in this program that the tool s item name will not contain any embedded blanks. Anything after the blank ( ) is then guaranteed to be the cost of the item. So, our goal is to read either character data until we reach the char value of assuming that everything that was read represents the tool name. The means by which we can do this from the file is with the usual input operator >> as this does not read blanks and will stop an input operation whenever it encounters white space (i.e. a blank ( ), tab ( \t ) or newline ( \n )). We need not bother to attempt and read the cost since whenever there is an input line, any cost will be preceeded by an item. The failure of the input operation of the item will be sufficient to set the end of file bit used to determine whether there are remaining lines to process in the file. Code this statement before continuing. Step 5 // test the end of file condition The style of loop that we re interested in using at this point in our algorithm is referred to as a while statement and it has some features that are particularly attractive for this exercise. It s general format is the following. while ( bool expression ) { statement 1 ; statement 2 ; }. statement m ; 4
5 It is assumed that the bool expression is initialized before the loop (in our algorithm, this is Step 4) and is updated somewhere within the middle of the loop (in our algorithm, this is Step 10). This statement will continue to loop as long as the value returned from bool expression is true. The next 5 steps of the algorithm should be embedded within this loop. Steps 6 // input the tool cost These step is simply an input operation from the file using the traditional input operator >> into the double variable that will contain the cost of the tool. Code this input statement before continuing. Steps 7-8 // update the total cost // update the total number of tools These update operations simply increase the double accumulator by the cost of the current tool and increase the int accumulator by 1. Code these assignment statements before continuing. Step 9 // display the current tool and its cost This is simply a formatted output statement that displays the current tool and the current tool s cost. Code this statement before continuing. Step 10 // attempt to read another tool name This line is no different than the line that was written for Step 4. This is the final statement that is embedded within the loop that was started at Step 5. Code this statement before proceeding. Step 11 // display the total number of tools and the total of the costs of the tools This is a formatted output statement that displays the accumulators that were updated at Steps 7-8. Examine the sample output to inspect a full credit solution. Step 12 // disconnect from the input file The ifstream objects support a function that represents the correct means to disconnect from a file. This is more important for output files as we often need to flush data from the logical buffer into the physical file before we disconnect. However, it is good form to do so when we are done with our files. The following statement should be coded before the end of your program. fin.close() Checkpoint We re done, at this point, so save your program to disk by choosing the Save command from the Files menu of your emacs session. Then, compile your program by choosing the Compile... command from the Tools menu and change the make -k that is displayed to g++ -o Scan4 Scan4.cpp. Compiler errors can be parsed with the keystroke C-x and need to be repaired before your program can execute. When your program has compiled, 5
6 click on your xterm window to access your command line prompt, and issue the command Scan4. Once again, your output should be identical to the sample output. Testing for errors The types of errors that can occur in this program have to do with either the input or the updates to the accumulators. The most common type of error is misspelling the name of the input file scan.txt when the ifstream object fin is initialized. You might also want to use the ls command to make sure that scan.txt is in the directory that your working in. This should have happened when you issued the following command. cp /samples/csc/155/labs/4/*. We ve displayed this statement in red to indicate that you do not want to issue it more than one time. If your input file scan.txt is not in your current directory, issue the following command. cp /samples/csc/155/labs/4/scan.txt. Other areas where errors can occur have to do with the inappropriate placement of the input statements or the incorrect updates to the accumulator variables. Make sure that your code follows the algorithm that we ve discussed to correct any logic errors. Printing and submitting Once you are satisfied with the correctness of your program, print it as you did with previous assignments by using the following command that assumes that you are working in the room 1234 at Oakton. Retrieve your copy from the printer. printer 1234 Scan4.cpp Finally, submit your program with the following command that assumes that you are registered in section abc of CSC 155. submit csc155abc 4 6
Sequential Program Execution
Sequential Program Execution Quick Start Compile step once always g++ -o Realtor1 Realtor1.cpp mkdir labs cd labs Execute step mkdir 1 Realtor1 cd 1 cp../0/realtor.cpp Realtor1.cpp Submit step cp /samples/csc/155/labs/1/*.
More informationAppendix K Introduction to Microsoft Visual C++ 6.0
Appendix K Introduction to Microsoft Visual C++ 6.0 This appendix serves as a quick reference for performing the following operations using the Microsoft Visual C++ integrated development environment (IDE):
More informationLab 1 Beginning C Program
Lab 1 Beginning C Program Overview This lab covers the basics of compiling a basic C application program from a command line. Basic functions including printf() and scanf() are used. Simple command line
More informationRunning your first Linux Program
Running your first Linux Program This document describes how edit, compile, link, and run your first linux program using: - Gnome a nice graphical user interface desktop that runs on top of X- Windows
More informationName: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.
Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to
More informationLab 2 - CMPS 1043, Computer Science I Introduction to File Input/Output (I/O) Projects and Solutions (C++)
Lab 2 - CMPS 1043, Computer Science I Introduction to File Input/Output (I/O) Projects and Solutions (C++) (Revised from http://msdn.microsoft.com/en-us/library/bb384842.aspx) * Keep this information to
More informationDeposit Direct. Getting Started Guide
Deposit Direct Getting Started Guide Table of Contents Before You Start... 3 Installing the Deposit Direct application for use with Microsoft Windows Vista... 4 Running Programs in Microsoft Windows Vista...
More informationBasics of I/O Streams and File I/O
Basics of This is like a cheat sheet for file I/O in C++. It summarizes the steps you must take to do basic I/O to and from files, with only a tiny bit of explanation. It is not a replacement for reading
More informationUniversity of Hull Department of Computer Science. Wrestling with Python Week 01 Playing with Python
Introduction Welcome to our Python sessions. University of Hull Department of Computer Science Wrestling with Python Week 01 Playing with Python Vsn. 1.0 Rob Miles 2013 Please follow the instructions carefully.
More informationPIC 10A. Lecture 7: Graphics II and intro to the if statement
PIC 10A Lecture 7: Graphics II and intro to the if statement Setting up a coordinate system By default the viewing window has a coordinate system already set up for you 10-10 10-10 The origin is in the
More informationGoal: Practice writing pseudocode and understand how pseudocode translates to real code.
Lab 7: Pseudocode Pseudocode is code written for human understanding not a compiler. You can think of pseudocode as English code that can be understood by anyone (not just a computer scientist). Pseudocode
More informationC++ Input/Output: Streams
C++ Input/Output: Streams 1 The basic data type for I/O in C++ is the stream. C++ incorporates a complex hierarchy of stream types. The most basic stream types are the standard input/output streams: istream
More informationFLEETMATE. Overview. Work Order Features. CUSTOMER GUIDE: Work Orders
Overview FLEETMATE will enable you to record all maintenance and/or repair activities performed on a vehicle via a Work Order. Work orders can accommodate any number of individual Labor lines, and any
More informationAnimated Lighting Software Overview
Animated Lighting Software Revision 1.0 August 29, 2003 Table of Contents SOFTWARE OVERVIEW 1) Dasher Pro and Animation Director overviews 2) Installing the software 3) Help 4) Configuring the software
More informationMicrosoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
More informationCS170 Lab 11 Abstract Data Types & Objects
CS170 Lab 11 Abstract Data Types & Objects Introduction: Abstract Data Type (ADT) An abstract data type is commonly known as a class of objects An abstract data type in a program is used to represent (the
More informationPA2: Word Cloud (100 Points)
PA2: Word Cloud (100 Points) Due: 11:59pm, Thursday, April 16th Overview You will create a program to read in a text file and output the most frequent and unique words by using an ArrayList. Setup In all
More informationExpressShipper UK User Guide
ExpressShipper Quick User Guide ExpressShipper Section 0 Page 1 of 63 Section 1: Structure of the User Guide In this section This section contains the following topics: Topic See Page What is the purpose
More informationCS 103 Lab Linux and Virtual Machines
1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation
More informationLab 1: Introduction to C, ASCII ART and the Linux Command Line Environment
.i.-' `-. i..' `/ \' _`.,-../ o o \.' ` ( / \ ) \\\ (_.'.'"`.`._) /// \\`._(..: :..)_.'// \`. \.:-:. /.'/ `-i-->..
More informationWhat is a Loop? Pretest Loops in C++ Types of Loop Testing. Count-controlled loops. Loops can be...
What is a Loop? CSC Intermediate Programming Looping A loop is a repetition control structure It causes a single statement or a group of statements to be executed repeatedly It uses a condition to control
More informationObjectives. Python Programming: An Introduction to Computer Science. Lab 01. What we ll learn in this class
Python Programming: An Introduction to Computer Science Chapter 1 Computers and Programs Objectives Introduction to the class Why we program and what that means Introduction to the Python programming language
More informationCOMSC 100 Programming Exercises, For SP15
COMSC 100 Programming Exercises, For SP15 Programming is fun! Click HERE to see why. This set of exercises is designed for you to try out programming for yourself. Who knows maybe you ll be inspired to
More informationGetting Started with Command Prompts
Getting Started with Command Prompts Updated March, 2013 Some courses such as TeenCoder : Java Programming will ask the student to perform tasks from a command prompt (Windows) or Terminal window (Mac
More informationMember Functions of the istream Class
Member Functions of the istream Class The extraction operator is of limited use because it always uses whitespace to delimit its reads of the input stream. It cannot be used to read those whitespace characters,
More informationFirst Bytes Programming Lab 2
First Bytes Programming Lab 2 This lab is available online at www.cs.utexas.edu/users/scottm/firstbytes. Introduction: In this lab you will investigate the properties of colors and how they are displayed
More informationAlgorithm & Flowchart & Pseudo code. Staff Incharge: S.Sasirekha
Algorithm & Flowchart & Pseudo code Staff Incharge: S.Sasirekha Computer Programming and Languages Computers work on a set of instructions called computer program, which clearly specify the ways to carry
More informationCP Lab 2: Writing programs for simple arithmetic problems
Computer Programming (CP) Lab 2, 2015/16 1 CP Lab 2: Writing programs for simple arithmetic problems Instructions The purpose of this Lab is to guide you through a series of simple programming problems,
More informationReady to get started? Click the button below to tell us which account number you currently have:
We re pleased to announce the launch of your new Energy Online Account. As part of an upgrade in our customer care and billing system, all customers will need to re-register in order to use our new online
More informationSpike Records Management System. Implementation & Operation Manual
Spike Records Management System Implementation & Operation Manual Spike Records Management System: Implementation & Operation Manual Copyright 1997-2005 Economic Outlook Pty Ltd Table of Contents 1. Records
More informationProgramming Languages CIS 443
Course Objectives Programming Languages CIS 443 0.1 Lexical analysis Syntax Semantics Functional programming Variable lifetime and scoping Parameter passing Object-oriented programming Continuations Exception
More informationVim, Emacs, and JUnit Testing. Audience: Students in CS 331 Written by: Kathleen Lockhart, CS Tutor
Vim, Emacs, and JUnit Testing Audience: Students in CS 331 Written by: Kathleen Lockhart, CS Tutor Overview Vim and Emacs are the two code editors available within the Dijkstra environment. While both
More informationTCP/IP Networking, Part 2: Web-Based Control
TCP/IP Networking, Part 2: Web-Based Control Microchip TCP/IP Stack HTTP2 Module 2007 Microchip Technology Incorporated. All Rights Reserved. Building Embedded Web Applications Slide 1 Welcome to the next
More informationBasic C Shell. helpdesk@stat.rice.edu. 11th August 2003
Basic C Shell helpdesk@stat.rice.edu 11th August 2003 This is a very brief guide to how to use cshell to speed up your use of Unix commands. Googling C Shell Tutorial can lead you to more detailed information.
More informationIntroduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1
Contents 1. Introduction 1-1 Supported Operating Environments................ 1-1 System Requirements............................. 1-2 Security Requirements........................ 1-3 Installing Server
More informationC++ Programming: From Problem Analysis to Program Design, Fifth Edition. Chapter 3: Input/Output
C++ Programming: From Problem Analysis to Program Design, Fifth Edition Chapter 3: Input/Output Objectives In this chapter, you will: Learn what a stream is and examine input and output streams Explore
More informationHypercosm. Studio. www.hypercosm.com
Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks
More informationHow to output SpoolFlex files directly to your Windows server
How to output SpoolFlex files directly to your Windows server This document will quickly cover how to setup your AS/400 or iseries system to communicate with a Windows based file server. Under normal circumstances
More informationChapter 7: Software Development Stages Test your knowledge - answers
Chapter 7: Software Development Stages Test your knowledge - answers 1. What is meant by constraints and limitations on program design? Constraints and limitations are based on such items as operational,
More informationExcel Pivot Tables. Blue Pecan Computer Training Ltd - Onsite Training Provider www.bluepecantraining.com :: 0800 6124105 :: info@bluepecan.co.
Excel Pivot Tables 1 Table of Contents Pivot Tables... 3 Preparing Data for a Pivot Table... 3 Creating a Dynamic Range for a Pivot Table... 3 Creating a Pivot Table... 4 Removing a Field... 5 Change the
More informationPrinter Connection Manager
IT DIRECT Printer Connection Manager Information Technology Direct Limited PO Box 33-1406 Auckland NZ Table of Contents OVERVIEW...2 SETUP INSTRUCTIONS:...3 INSTALLATION...5 Install with New Settings.xml
More informationChapter 2: Algorithm Discovery and Design. Invitation to Computer Science, C++ Version, Third Edition
Chapter 2: Algorithm Discovery and Design Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Representing algorithms Examples of algorithmic problem
More informationHow to Use e-commerce on www.avantormaterials.com
How to Use e-commerce on www.avantormaterials.com Welcome to the Avantor Website! Setting up an account, ordering products and checking your order status have never been easier. Simply follow the instructions
More informationCode::Blocks Student Manual
Code::Blocks Student Manual Lawrence Goetz, Network Administrator Yedidyah Langsam, Professor and Theodore Raphan, Distinguished Professor Dept. of Computer and Information Science Brooklyn College of
More informationCreating a Java application using Perfect Developer and the Java Develo...
1 of 10 15/02/2010 17:41 Creating a Java application using Perfect Developer and the Java Development Kit Introduction Perfect Developer has the facility to execute pre- and post-build steps whenever the
More informationComputer Programming I & II*
Computer Programming I & II* Career Cluster Information Technology Course Code 10152 Prerequisite(s) Computer Applications, Introduction to Information Technology Careers (recommended), Computer Hardware
More informationMATLAB Functions. function [Out_1,Out_2,,Out_N] = function_name(in_1,in_2,,in_m)
MATLAB Functions What is a MATLAB function? A MATLAB function is a MATLAB program that performs a sequence of operations specified in a text file (called an m-file because it must be saved with a file
More information#include <Gamer.h> Gamer gamer; void setup() { gamer.begin(); } void loop() {
#include Gamer gamer; void setup() { gamer.begin(); void loop() { Gamer Keywords Inputs Board Pin Out Library Instead of trying to find out which input is plugged into which pin, you can use
More informationInstallation and Demonstration Manual
Installation and Demonstration Manual This manual presents the procedures for installing the program and running the demonstration programs of MakeTracks from the Main Menu Selection Getting Started Copyright
More informationPython Programming: An Introduction to Computer Science
Python Programming: An Introduction to Computer Science Chapter 1 Computers and Programs 1 Objectives To understand the respective roles of hardware and software in a computing system. To learn what computer
More informationIllustration 1: Diagram of program function and data flow
The contract called for creation of a random access database of plumbing shops within the near perimeter of FIU Engineering school. The database features a rating number from 1-10 to offer a guideline
More informationStacks. Linear data structures
Stacks Linear data structures Collection of components that can be arranged as a straight line Data structure grows or shrinks as we add or remove objects ADTs provide an abstract layer for various operations
More informationTutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
More informationTLMC WORKSHOP: THESIS FORMATTING IN WORD 2010
Table of Contents Introduction... 2 Getting Help... 2 Tips... 2 Working with Styles... 3 Applying a Style... 3 Choosing Which Styles to Use... 3 Modifying a Style... 4 Creating A New Style... 4 Setting
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationMcAfee EETech for Mac 6.2 User Guide
McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationHow to Compile, Link, and Execute C or C++ Codes Using Microsoft Visual C++
How to Compile, Link, and Execute C or C++ Codes Using Microsoft Visual C++ 1. First, you need to click Start button, Programs, and then Microsoft Visual C++ 5.0 or 6.0 to launch MS Visual C++, shown in
More informationWelcome to GAMS 1. Jesper Jensen TECA TRAINING ApS jensen@tecatraining.dk. This version: September 2006
Welcome to GAMS 1 Jesper Jensen TECA TRAINING ApS jensen@tecatraining.dk This version: September 2006 1 This material is the copyrighted intellectual property of Jesper Jensen. Written permission must
More informationMicrosoft Access Rollup Procedure for Microsoft Office 2007. 2. Click on Blank Database and name it something appropriate.
Microsoft Access Rollup Procedure for Microsoft Office 2007 Note: You will need tax form information in an existing Excel spreadsheet prior to beginning this tutorial. 1. Start Microsoft access 2007. 2.
More informationIntermediate PowerPoint
Intermediate PowerPoint Charts and Templates By: Jim Waddell Last modified: January 2002 Topics to be covered: Creating Charts 2 Creating the chart. 2 Line Charts and Scatter Plots 4 Making a Line Chart.
More information2013 Year End Procedure Notes Accounts Payable for Add-On Software 1099 Processing
2013 Year End Procedure Notes Accounts Payable for Add-On Software 1099 Processing Please read entire document prior to attempting to process any 1099 s This document applies to all versions of Accounts
More informationAssignment 09. Problem statement : Write a Embedded C program to switch-on/switch-off LED.
Assignment 09 Problem statement : Write a Embedded C program to switch-on/switch-off LED. Learning Objective: -> To study embedded programming concepts -> To study LCD control functions -> How output is
More informationUnderstanding the Boot Process and Command Line Chapter #3
Understanding the Boot Process and Command Line Chapter #3 Amy Hissom Key Terms 1. Active Partition the primary partition on the hard drive that boots the OS. Windows NT/2000/XP calls the active partition
More informationDistributing forms and compiling forms data
Distributing forms and compiling forms data Recent versions of Acrobat have allowed forms to be created which the end user can fill in with the free Adobe Reader and save what has been entered. The form
More informationManagement Utilities Configuration for UAC Environments
Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least
More informationPARTNER ACS R4.0 Remote Administration R4.0. Getting Started
PARTNER ACS R.0 Remote Administration R.0 Getting Started 8-6-66 700080 Issue May 00 Copyright 00, Avaya Inc. Document 8-6-66 All Rights Reserved 700080 Printed in USA Issue May 00 Notice Every effort
More informationIntroduction to Programming (in C++) Loops. Jordi Cortadella, Ricard Gavaldà, Fernando Orejas Dept. of Computer Science, UPC
Introduction to Programming (in C++) Loops Jordi Cortadella, Ricard Gavaldà, Fernando Orejas Dept. of Computer Science, UPC Example Assume the following specification: Input: read a number N > 0 Output:
More informationIntroduction. What is an Operating System?
Introduction What is an Operating System? 1 What is an Operating System? 2 Why is an Operating System Needed? 3 How Did They Develop? Historical Approach Affect of Architecture 4 Efficient Utilization
More informationExample. Introduction to Programming (in C++) Loops. The while statement. Write the numbers 1 N. Assume the following specification:
Example Introduction to Programming (in C++) Loops Assume the following specification: Input: read a number N > 0 Output: write the sequence 1 2 3 N (one number per line) Jordi Cortadella, Ricard Gavaldà,
More informationyour Apple warranty; see http://www.drivesavers.com/. There are two main failure modes for a mirrored RAID 1 set:
48981c03.qxd 12/6/07 8:56 PM Page 142 142 File Systems RAID set creation takes only a few moments, and once it s complete, you should see new RAID set volume in the Disk Utility list and in the Finder.
More informationOffice of History. Using Code ZH Document Management System
Office of History Document Management System Using Code ZH Document The ZH Document (ZH DMS) uses a set of integrated tools to satisfy the requirements for managing its archive of electronic documents.
More informationComparing RTOS to Infinite Loop Designs
Comparing RTOS to Infinite Loop Designs If you compare the way software is developed for a small to medium sized embedded project using a Real Time Operating System (RTOS) versus a traditional infinite
More informationEnterprise Asset Management System
Enterprise Asset Management System in the Agile Enterprise Asset Management System AgileAssets Inc. Agile Enterprise Asset Management System EAM, Version 1.2, 10/16/09. 2008 AgileAssets Inc. Copyrighted
More information3. Locate the different selections of Styles from the Home Tab, Styles Group
Outlining in MS Word 2007 Microsoft Word 2007 provides users with an Outline View and Outlining toolbar, which allows us to create outlines. Outlines in Word are based on Styles. For instance if a line
More informationSecure email Retrieval (First Time)
Department of Administration ETS is a customer based team that provides quality telecommunications & information technology services for all branches of state government. Secure email Retrieval (First
More informationThe C++ Language. Loops. ! Recall that a loop is another of the four basic programming language structures
The C++ Language Loops Loops! Recall that a loop is another of the four basic programming language structures Repeat statements until some condition is false. Condition False True Statement1 2 1 Loops
More informationDiscovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
More informationGetting Started With MySaleManager.NET
Getting Started With MySaleManager.NET Welcome to MySaleManager.NET! We are glad you chose us to be the provider for automation services at your Consignment Event. This guide is designed to help you gets
More informationLinux Overview. Local facilities. Linux commands. The vi (gvim) editor
Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful
More informationIntroduction to Visual C++.NET Programming. Using.NET Environment
ECE 114-2 Introduction to Visual C++.NET Programming Dr. Z. Aliyazicioglu Cal Poly Pomona Electrical & Computer Engineering Cal Poly Pomona Electrical & Computer Engineering 1 Using.NET Environment Start
More informationIntroduction to MIPS Programming with Mars
Introduction to MIPS Programming with Mars This week s lab will parallel last week s lab. During the lab period, we want you to follow the instructions in this handout that lead you through the process
More informationIMPORTANT Please Read Me First
IMPORTANT Please Read Me First 3/02/2006 Table of Contents Table of Contents Part 1 Mac Single User Installation 1 Part 2 Windows Single User Installation 2 Part 3 Mac Server Installation 3 Part 4 Windows
More informationUnity Error Message: Your voicemail box is almost full
Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from
More informationOnline Test Monitor Certification Course 2014-2015 Transcript
Online Test Monitor Certification Course 2014-2015 Transcript Slide # Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Minnesota Assessments Test Security Training for Districts and Schools Welcome
More informationWindows PowerShell Essentials
Windows PowerShell Essentials Windows PowerShell Essentials Edition 1.0. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights
More informationErrors That Can Occur When You re Running a Report From Tigerpaw s SQL-based System (Version 9 and Above) Modified 10/2/2008
Errors That Can Occur When You re Running a Report From Tigerpaw s SQL-based System (Version 9 and Above) Modified 10/2/2008 1 Introduction The following is an explanation of some errors you might encounter
More informationEVault Software. Course 361 Protecting Linux and UNIX with EVault
EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in
More informationCMSC 216 UNIX tutorial Fall 2010
CMSC 216 UNIX tutorial Fall 2010 Larry Herman Jandelyn Plane Gwen Kaye August 28, 2010 Contents 1 Introduction 2 2 Getting started 3 2.1 Logging in........................................... 3 2.2 Logging
More informationCPSC 226 Lab Nine Fall 2015
CPSC 226 Lab Nine Fall 2015 Directions. Our overall lab goal is to learn how to use BBB/Debian as a typical Linux/ARM embedded environment, program in a traditional Linux C programming environment, and
More informationAsset Track Getting Started Guide. An Introduction to Asset Track
Asset Track Getting Started Guide An Introduction to Asset Track Contents Introducing Asset Track... 3 Overview... 3 A Quick Start... 6 Quick Start Option 1... 6 Getting to Configuration... 7 Changing
More informationUSER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3]
Pro-curo Software Ltd USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3] CONTENTS Everyday use... 3 Logging on... 4 Main Screen... 5 Adding locations... 6 Working with locations... 7 Duplicate...
More informationModule 816. File Management in C. M. Campbell 1993 Deakin University
M. Campbell 1993 Deakin University Aim Learning objectives Content After working through this module you should be able to create C programs that create an use both text and binary files. After working
More informationIntroduction to Java Applications. 2005 Pearson Education, Inc. All rights reserved.
1 2 Introduction to Java Applications 2.2 First Program in Java: Printing a Line of Text 2 Application Executes when you use the java command to launch the Java Virtual Machine (JVM) Sample program Displays
More informationChapter One Introduction to Programming
Chapter One Introduction to Programming 1-1 Algorithm and Flowchart Algorithm is a step-by-step procedure for calculation. More precisely, algorithm is an effective method expressed as a finite list of
More informationCS 241 Data Organization Coding Standards
CS 241 Data Organization Coding Standards Brooke Chenoweth University of New Mexico Spring 2016 CS-241 Coding Standards All projects and labs must follow the great and hallowed CS-241 coding standards.
More informationLab - Dual Boot - Vista & Windows XP
Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain
More informationSources: On the Web: Slides will be available on:
C programming Introduction The basics of algorithms Structure of a C code, compilation step Constant, variable type, variable scope Expression and operators: assignment, arithmetic operators, comparison,
More information7-1. This chapter explains how to set and use Event Log. 7.1. Overview... 7-2 7.2. Event Log Management... 7-2 7.3. Creating a New Event Log...
7-1 7. Event Log This chapter explains how to set and use Event Log. 7.1. Overview... 7-2 7.2. Event Log Management... 7-2 7.3. Creating a New Event Log... 7-6 7-2 7.1. Overview The following are the basic
More informationThe Windows Command Prompt: Simpler and More Useful Than You Think
The Windows Command Prompt: Simpler and More Useful Than You Think By Ryan Dube When most people think of the old DOS command prompt window that archaic, lingering vestige of computer days gone by they
More information